• Title/Summary/Keyword: 사이버 교류

Search Result 34, Processing Time 0.024 seconds

Comparison of incremental learning method and batch learning method in Cyber ISR (사이버 ISR에서의 점진적 학습 방법과 일괄 학습 방법 비교)

  • Shin, Gyeong-Il;Yooun, Hosang;Shin, DongIl;Shin, DongKyoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.861-864
    • /
    • 2017
  • 사이버 ISR을 통하여 정보를 획득하는 과정에서 데이터를 추출하고 이를 스스로 가공하여 의사결정에 도움을 줄 수 있는 에이전트를 연구하는 과정에서 폐쇄망에 침투했을 경우 이를 효과적으로 감시 정찰할 수 있는 방법을 논의한다. 폐쇄망으로 인하여 침투한 컴퓨터에 심어진 에이전트는 C&C서버와 원활한 교류가 불가능하게 되는데, 이때 스스로 살아남아 지속적으로 데이터를 수집하며, 분석을 하기 위해서는 한정된 자원과 시간을 활용하여야 발각되지 않고 계속하여 임무를 수행할 수 있다. 특히 분석하는 과정에서 많은 자원과 시간을 활용하는 때 이를 해결하기 위해 본인은 점진적 학습방법을 이용하는 것을 제안하며, 일괄학습 방법과 함께 비교하는 실험을 해보았다.

The Study on System Log Analysis of Malicious Behavior (악성 행위에 대한 시스템 로그 분석에 관한 연구)

  • Kim, EunYoung;Lee, CheolHo;Oh, HyungGeun;Lee, JinSeok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1193-1196
    • /
    • 2004
  • 1980년 후반. MIT에 버너스 리 교수가 인터넷 상에 웹(WWW)을 창시하면서부터 우리의 일상생활은 엄청난 변화를 가져왔다. 시 공간을 초월할 수 있는 인터넷이라는 가상 세계에서는 개인뿐만 아니라 정치 경제 사회등 모든 분야에 걸쳐 인터넷을 통한 쉽고 간편하며 빠른 교류가 이루어짐으로써 이제 더 이상 네트워크를 이용하지 않는 분야는 찾아 볼 수 없을 것이다. 그러나 이러한 현실 속에서 인터넷은 항상 순기능만을 수행하지는 않는다. 특히 악성코드를 이용한 사이버 침해 행위 기술이 인터넷의 발전과 함께 동시에 발전함으로써 이제는 악성코드를 이용한 사이버 침해 행위를 방지하고자하는 노력을 해야할 것이다. 따라서 본 논문에서는 악성코드를 탐지하기 위해 실시간 시스템 모니터링 도구를 이용하여 악성코드가 시스템에 어떠한 침해행위를 행하고, 해당 침해 행위 모니터링 로그 분석을 통해 기존의 알려진 악성코드뿐만 아니라 알려지지 않은 악성코드를 탐지할 수 있는 악성 패턴 분석 및 추출에 초점을 두어 기술하였다.

  • PDF

패션 브랜드의 온라인 커뮤니티 구성요소와 현황조사

  • 장유정;박재옥;이규혜
    • Proceedings of the Costume Culture Conference
    • /
    • 2003.09a
    • /
    • pp.104-106
    • /
    • 2003
  • 현대사회는 정보의 디지털화와 컴퓨터의 급속한 보급으로 인한 네트워크 환경의 발전으로 사이버 사회로의 전환과정을 거치고 있다. 인터넷이라는 새로운 매체의 등장은 단순히 객체간에 시공을 초월한 정보전달뿐 아니라 비즈니스의 방식에도 매우 큰 변화를 가져오고 있다. 이미 인터넷을 통한 무점포 판매방식은 기존의 리테일링 개념에 혁명적인 변화를 가져오고 있고 인터넷을 통한 정보교류는 고객과의 접촉방법, 고객에 대한 정보수집 등의 과정에서 저렴한 비용으로 효과적인 마케팅을 수행할 수 있게 하고 있다. (중략)

  • PDF

A Study of Technological Standard for Sharing e-Learning Contents among Cyber Universities (원격대학간 콘텐츠 공동활용을 위한 기술 표준화 방안 연구)

  • Lee, June;Seo, YooKyeong;Cho, YongSang
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.3
    • /
    • pp.87-98
    • /
    • 2003
  • In recent years, e-Learning has taken an important position in the field of education. In turn, as the number of e-Learning contents continue to grow, many institutions are facing difficulty how to cut down the cost for content development and to reuse contents once made for the future courses. On of the way to solve this problem is to create technological standard for e-Learning contents and platform, for which e-Learning experts are actively participating around the world. The purpose of the study was to suggest technological standard for sharing e-Learning contents, especially among cyber universities which were established with the Life-long Education Act. To achieve the research objective, at first, we reviewed literatures related to the e-Learning standard, surveyed content management policies in cyber universities, and then made suggestions what to do for the standardization.

  • PDF

The Evolution of Cyber Singer Viewed from the Coevolution of Man and Machine (인간과 기계의 공진화적 관점에서 바라본 사이버가수의 진화과정)

  • Kim, Dae-Woo
    • Cartoon and Animation Studies
    • /
    • s.39
    • /
    • pp.261-295
    • /
    • 2015
  • Cyber singer appeared in the late 1990s has disappeared briefly appeared. although a few attempts in the 2000s, it did not show significant successes. cyber singer was born thanks to the technical development of the IT industry and the emergence of an idol training system in the music industry. It was developed by Vocaloid 'Seeyou' starting from 'Adam'. cyber singer that differenatiated typical digital characters in a cartoon or game may be subject to idolize to the music as a medium. They also feature forming a plurality of fandom. therefore, such attempts and repeated failures, this could be considered a fashion, but it flew content creation and ongoing attempts to take advantage of the new media, such as Vocaloid can see that there are expectations for a true Cyber-born singer. Early-Cyber singer is made only resemble human appearance, but 'Sciart' and 'Seeyou' has been evolving to becoming more like the human capabilities. in this paper, stylized cyber singer had disappeared in the past in the process of developing the technology to evolve into own artificial life does not end in failure cases, gradually led to a change in public perceptions of the image look looking machine was an attempt in that sense. With the direction of the evolution of the mechanical function to obtain a human, fun and human exchanges and mutual feelings. And it is equipped with an artificial life form that evolved with it only in appearance and function. in order to support this logic, I refer to the study of the coevolution of man and machine at every Bruce Mazlish. And, I have analyzed the evolution of cyber singer Bruce research from the perspective of the development process since the late 1990s, the planning of the eight singers who have appeared and design of the cyber character and important voices to be evaluated as a singer (vocal). The machine has been evolving coevolution with humans. cyber singer ambivalent development targets are recognized, but strive to become the new artificial creatures of horror idea of human desire and death continues. therefore, the new Cyber-organisms are likely to be the same style as 'Seeyou'. because, cartoon forms and whirring voice may not be in the form of a signifier is the real human desires, but this is because the contemporary public's desire to be desired and the technical development of this type can be created at the point where the cross-signifier.

Leisure activity and self-concept of adolescents in cyberspace: With specific focus on elementary school, middle school, high school and university students (청소년 놀이공간으로서 사이버 세계에서의 자기개념: 초, 중, 고, 대학생을 중심으로)

  • Young-Shin Park;Uichol Kim;Soo Yeon Tak
    • Korean Journal of Culture and Social Issue
    • /
    • v.17 no.1
    • /
    • pp.81-113
    • /
    • 2011
  • This study investigates leisure activity, involvement and self-concept in cyberspace of various age groups of adolescents. A total of 1,388 students (elementary school=337, middle school=326, high school=361, university=364, consisting of 696 male and 692 female) participated in the study. The results are as follows. First, although the vast majority of adolescents (96.9%) had a computer at home, majority of adolescents visited Internet cafe. Second, 70.3% of adolescents visited Internet cafe to play Internet games, followed by engaging in information search, chatting, and participated in cyber community. Third, on average adolescents spent 5.43 hours per week playing Internet games, with more males playing Internet games than female adolescents. As for information search, the weekly average was 2.60 hours, with university students spending more time than the other groups. As for chatting, the weekly average was 1.69 hours, with no significant differences among the groups. The weekly average of Internet use was 9.65 hours, with older groups spending more time. The weekly average use of computer was 10.91 hours, with older groups spending more time and more males using more computer than females. Fourth, as for self-concept in cyberspace, elementary and middle school students reported that they had fun, while high school and university students reported that they were the same as in the regular daily life. In addition, adolescents reported that they spent leisure activity in cyberspace and they become a fictional character in cyberspace. Fifth, when they played Internet games, regardless of age and gender, adolescents reported that they had fun, followed by that they were absorbed, that they became aggressive, and that they were the same as in the regular daily life. Sixth, when they chatted on Internet, regardless of age and gender, adolescents reported that they had fun, followed by that they were not interested, that they were the same as in the regular daily life, and that they do not chat on Internet. Seventh, when they interacted with their friends on Internet, regardless of age and gender, majority of adolescents reported that they had fun, followed by that they conversed, that they were the same as in the regular daily life, and that they felt closer. These results indicate that Korean adolescents view Internet as a place to spend their leisure time and that they enjoyed spending time on Internet.

  • PDF

Development Strategy of Information Security Industry (정보보호산업 발전전략)

  • 박성욱;고성혁;이현우;김현종
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.439-442
    • /
    • 2002
  • As Information security businesses has just emerged in Korea, they have several weakness like small size, lack of resources, the urgent need of qualified R&D personnels to compete in global markets. The purpose of this study is to explore the present situation of Korean information security industry and develop supportive strategies of the government for the internationalization of them.

  • PDF

The Study on The Cyber Communities of Migrant Workers in Korea (한국 이주 노동자의 '사이버 공동체'에 관한 연구)

  • Lee, Jeong Hyang;Kim, Yeong Kyeong
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.2
    • /
    • pp.324-339
    • /
    • 2013
  • This study aims to investigate the characteristics of cyber communities composed of migrant workers from communities without propinquity in Korea. Its methods are both qualitative and quantitative. It further seeks to discover the relationship between the social capital formed and reproduced within these cyber communities and participants' cultural adaptation to Korean society. The study revealed that ethnic and non-ethnic communities differed in terms of strength of cohesion, space constraints, and links with the outside world. The former showed characteristics of a localized community type. The main motivations for migrant workers' participation in the ethnic cyber community were communication and friendship rather than cooperation and sharing among members. They usually used cyber communication media to communicate with one another. Conversely, the latter showed characteristics of an integrative type. Despite the difficulties in applying for membership and information provided in Korean, a high percentage of migrant workers participated in the community to obtain crucial information. The results did not show a significant correlation between social capital and migrant workers' traits within the cyber community, while a strong correlation emerged among four factors of social capital: faith, norms, networking, and political participation. The study showed that social capital in the cyber community was in direct proportion to an integrative type of cultural adaptation to Korean society. In particular, there was a strong connection between the cultural adaptation exhibited by members of the migrant subculture and their participation in discussions on political issues and human rights, with some migrants even functioning as agents of social change as participants in citizens' movements. The findings suggest that the cyber community facilitates the migrant subculture's communication with and integration into the indigenous Korean culture. Migrant workers' participation in the cyber community is therefore validated as an instrumental practice for members of this subculture to adapt to Korean society.

  • PDF

A Study on Domestic Information Security Education System (국내 정보보호 교육체계 연구)

  • Kim, Dong-Woo;Chai, Seung-Woan;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.545-559
    • /
    • 2013
  • There is a limitation on counteracting recent cyber-attacks with only technical security measures because they become more intelligent and large-scale to aim at employees instead of systems directly or to be conducted with unspecified multiple PCs. Thus, comprehensive measures revolved around related manpower are necessary to deal with them. However, domestic information security education system which is the base of professional manpower training lacks medium-and long-term plans for information security education, verification of education programs, and information sharing among educational institutions. This paper suggests information security education development plans for resolving problems on domestic education systems and improving cyber information security environment such as a national information security education master plan, certification system introduction of education programs, and professional manpower database management.

An analysis study on the quality of article to improve the performance of hate comments discrimination (악성댓글 판별의 성능 향상을 위한 품사 자질에 대한 분석 연구)

  • Kim, Hyoung Ju;Min, Moon Jong;Kim, Pan Koo
    • Smart Media Journal
    • /
    • v.10 no.4
    • /
    • pp.71-79
    • /
    • 2021
  • One of the social aspects that changes as the use of the Internet becomes widespread is communication in online space. In the past, only one-on-one conversations were possible remotely, except when they were physically in the same space, but nowadays, technology has been developed to enable communication with a large number of people remotely through bulletin boards, communities, and social network services. Due to the development of such information and communication networks, life becomes more convenient, and at the same time, the damage caused by rapid information exchange is also constantly increasing. Recently, cyber crimes such as sending sexual messages or personal attacks to certain people with recognition on the Internet, such as not only entertainers but also influencers, have occurred, and some of those exposed to these cybercrime have committed suicide. In this paper, in order to reduce the damage caused by malicious comments, research a method for improving the performance of discriminate malicious comments through feature extraction based on parts-of-speech.