• Title/Summary/Keyword: Cyber intelligence

Search Result 232, Processing Time 0.024 seconds

Allergy checking system using artificial intelligence (인공지능 기법을 이용한 알레르기 반응 여부 판단)

  • Kim, So-Young;Lee, Yang-Gyu;Jo, Eun-Young;Weon, Ill-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.553-555
    • /
    • 2022
  • 다양한 양념과 조리법을 활용한 식품의 수는 시간이 지날수록 증가하는 추세이다. 따라서 처음 접하는 식품의 알레르기를 판단하는 연구가 필요하다. 우리는 이미지만으로 알레르기 유발 성분을 판단하는 시스템을 제안한다. 알레르기 성분으로 라벨링한 식품 이미지에 VGGNet 알고리즘을 적용하여 실험을 진행하고 제안된 시스템의 유용성을 판단하였다.

Maternal Parenting Behaviors, Children's Emotional Intelligence, and Daily Hassles According to Children's Sex and Types of Aggression (아동의 성과 공격성 유형에 따른 어머니 양육행동, 아동의 정서지능과 일상적 스트레스 수준의 차이)

  • Kim, Ji-Hyun
    • Korean Journal of Child Studies
    • /
    • v.30 no.6
    • /
    • pp.489-504
    • /
    • 2009
  • This study explored differences in maternal parenting behaviors, children's emotional intelligence, and daily hassles by children's sex and types of aggression. Subjects were 200 children in 4th, 5th, and 6th grade and their mothers from four elementary schools. Instruments were the Maternal Parenting Behaviors Scale (Kim, 2006), the Emotional Intelligence Scale (Lee, 1997), the Daily Hassles Scale(Min & Yoo, 1998), and the Peer-nomination Measure (Crick, 1995; Crick & Grotpeter, 1995). Data were subjected to descriptive statistical analysis and multivariate analysis of variance. Findings revealed that the relational aggressive group had higher emotional intelligence and more daily hassles; girls had higher level of daily hassles than boys. Maternal parenting behaviors did not differ by child's sex and type of aggression.

  • PDF

Proposal for the 『Army TIGER Cyber Defense System』 Installation capable of responding to future enemy cyber attack (미래 사이버위협에 대응 가능한 『Army TIGER 사이버방호체계』 구축을 위한 제언)

  • Byeong-jun Park;Cheol-jung Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.157-166
    • /
    • 2024
  • The Army TIGER System, which is being deployed to implement a future combat system, is expected to bring innovative changes to the army's combat methods and comabt execution capability such as mobility, networking and intelligence. To this end, the Army will introduce various systems using drones, robots, unmanned vehicles, AI(Artificial Intelligence), etc. and utilize them in combat. The use of various unmanned vehicles and AI is expected to result in the introduction of equipment with new technologies into the army and an increase in various types of transmitted information, i.e. data. However, currently in the military, there is an acceleration in research and combat experimentations on warfigthing options using Army TIGER forces system for specific functions. On the other hand, the current reality is that research on cyber threats measures targeting information systems related to the increasing number of unmanned systems, data production, and transmission from unmanned systems, as well as the establishment of cloud centers and AI command and control center driven by the new force systems, is not being pursued. Accordingly this paper analyzes the structure and characteristics of the Army TIGER force integration system and makes suggestions for necessity of building, available cyber defense solutions and Army TIGER integrated cyber protections system that can respond to cyber threats in the future.

A Study on Mechanism of Intelligent Cyber Attack Path Analysis (지능형 사이버 공격 경로 분석 방법에 관한 연구)

  • Kim, Nam-Uk;Lee, Dong-Gyu;Eom, Jung-Ho
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.93-100
    • /
    • 2021
  • Damage caused by intelligent cyber attacks not only disrupts system operations and leaks information, but also entails massive economic damage. Recently, cyber attacks have a distinct goal and use advanced attack tools and techniques to accurately infiltrate the target. In order to minimize the damage caused by such an intelligent cyber attack, it is necessary to block the cyber attack at the beginning or during the attack to prevent it from invading the target's core system. Recently, technologies for predicting cyber attack paths and analyzing risk level of cyber attack using big data or artificial intelligence technologies are being studied. In this paper, a cyber attack path analysis method using attack tree and RFI is proposed as a basic algorithm for the development of an automated cyber attack path prediction system. The attack path is visualized using the attack tree, and the priority of the path that can move to the next step is determined using the RFI technique in each attack step. Based on the proposed mechanism, it can contribute to the development of an automated cyber attack path prediction system using big data and deep learning technology.

In-Depth Relationships between Emotional Intelligence and Personality Traits in Meditation Practitioners

  • Choi, Soo-Hee;An, Seung Chan;Lee, Ul Soon;Yun, Je-Yeon;Jang, Joon Hwan;Kang, Do-Hyung
    • Clinical Psychopharmacology and Neuroscience
    • /
    • v.16 no.4
    • /
    • pp.391-397
    • /
    • 2018
  • Objective: Meditation can elicit trait-like changes in psychological and social styles, as well as enhancement of emotional regulatory capacity. We investigated the relation between personality traits and emotional intelligence in meditation practitioners. Methods: Seventy-two long-term practitioners of mind-body training (MBT) and 62 healthy comparative individuals participated in the study. The participants completed emotional intelligence questionnaires and the Myers-Briggs Type Indicator (MBTI). Results: The MBT group revealed higher scores on all five emotional intelligence factors than did those in the control group, such as emotional awareness and expression, empathy, emotional thinking, emotional application, and emotional regulation (all $p{\leq}0.001$). MBT practitioners also had higher scores on the intuition of perceiving function (t=-2.635, p=0.010) and on the feeling of the judging function (t=-3.340, p=0.001) of the MBTI compared with those in the control group. Only the MBT group showed a robust relationship with every factor of emotional intelligence and MBTI-defined intuitive styles, indicating that higher scores of emotional intelligence were related to higher scores for intuition. Conclusion: Emotional intelligence of meditation practitioners showed notable relationships with some features of personality trait. In-depth associations between emotional intelligence and personality traits would help to foster psychological functions in meditation practitioners.

A Study Covering the Comparative Analysis of Educational Systems in Major Countries for Regular Cybersecurity Education (사이버보안 정규교육화를 위한 주요국 교육체계 비교분석 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.397-405
    • /
    • 2021
  • With the recent phenomenon of the Intelligence Information Society, the cyber security paradigm has begun to change. In particular, the increase of the interconnectedness of the hyperlinked society has extended the scope of damage that can be caused by cyber threats to the real world. In addition to that, it can also be a risk to any given individual who could accompany a crisis that has to do with public safety or national security. Adolescents who are digital natives are more likely to be exposed to cyber threats, which is mainly due to the fact that they are significantly more involved in cyber activities and they also possess insufficient security comprehension and safety awareness. Therefore, it is necessary to strengthen cyber security capabilities of every young individual, so that they can effectively protect themselves against cyber threats and better manage their cyber activities. It examines the changes of the security paradigm and the necessity for cyber security education, which is in direct accordance to the characteristics of a connected society that further suggests directions and a basic system of cyber security education, through a detailed analysis of the current state of Domestic and Overseas Cyber Security Education. The purpose of this study was to define cybersecurity competencies that are necessary within an intelligent information society, and to propose a regular curriculum for strengthening cybersecurity competencies, through the comparison and meticulous analysis of both domestic and overseas educational systems that are pertinent to cybersecurity competencies. Accordingly, a cybersecurity competency system was constructed, by reflecting C3-Matrix, which is a cyber competency system model of digital citizens. The cybersecurity competency system consists of cyber ethics awareness, cyber ethics behavior, cyber security and cyber safety. In addition to this, based on the basic framework of the cybersecurity competency system, the relevant education that is currently being implemented in the United States, Australia, Japan and Korea were all compared and analyzed. From the insight gained through the analysis, the domestic curriculum was finally presented. The main objective of this new unified understanding, was to create a comprehensive and effective cyber security competency curriculum.

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak;Bobby Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.190-194
    • /
    • 2023
  • By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

Mediating Effect of Child-Teacher Relationships on the Relationship of Preschooler's Emotional Intelligence and Social Competence (유아의 정서지능과 사회적 유능성의 관계에서 유아-교사 관계의 매개효과)

  • Kim, Gil Sook;Kim, Tae Eun
    • Human Ecology Research
    • /
    • v.53 no.3
    • /
    • pp.241-251
    • /
    • 2015
  • This study examined the effect of preschooler's emotional intelligence, child-teacher relationships (intimacy, conflict and dependency) on children's social competence. A sample of 269 children (142 boys and 127 girls) aged 3 to 6 in Seoul or Gyeonggi-do participated in the Emotional Intelligence Scale, the Child-Teacher Relationships Scale and Social Competence Scale by teachers. Descriptive statistics, t -test, Pearson's correlation analysis and regression analysis analyzed data via SPSS ver. 20.0. This study followed a mediated effect model. The results showed that: (1) The emotional intelligence of girls was significantly higher than boys. However, the child-teacher relationship and children's social competence had no significant difference relationship to gender. (2) There was a mediating effect of child-teacher relationships between preschooler's emotional intelligence and social competence. The effect of emotional intelligence on social competence was partially mediated by intimate relationship, conflict relationship and dependency relationship. The degree of mediating effect was investigated in regards to conflict relationship, dependency relationship and intimate relationship. This study demonstrated that child-teacher relationships mediate the relationship between emotional intelligence and social competence of preschoolers.

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.