• Title/Summary/Keyword: Deal source

Search Result 187, Processing Time 0.03 seconds

A Source Code Cross-site Scripting Vulnerability Detection Method

  • Mu Chen;Lu Chen;Zhipeng Shao;Zaojian Dai;Nige Li;Xingjie Huang;Qian Dang;Xinjian Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1689-1705
    • /
    • 2023
  • To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the source code. We construct a set of feature expressions to match malignant content and set a "variable conversion" method to analyze the data flow of the code that implements interactive functions. The static analysis method explores the vulnerabilities existing in the source code structure and code content. Dynamic testing aims to simulate network attacks to reflect whether there are vulnerabilities in web pages. We construct many attack vectors and implemented the test in the Selenium tool. Due to the combination of the two analysis methods, XSS vulnerability discovery research could be conducted from two aspects: "white-box testing" and "black-box testing". Tests show that this method can effectively detect XSS vulnerabilities in the source code of the power communication network.

Intelligence in the Internet Era: Understanding OSINT and Case Analysis (인터넷 시대의 정보활동: OSINT의 이해와 적용사례분석)

  • Lee, Wan-Hee;Yun, Min-Woo;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.259-278
    • /
    • 2013
  • With advances of information technology (IT) and the Internet, it became much easier to search and collect information through many different types of web search engine. Such information only restricted to the intelligence services became available to the public, and the increased open source changed the intelligence collection activities of governments. Open Source Intelligence (OSINT) was introduced to organize and analyze the large volumes of information. OSINT is actively used after the 9/11 terrorist attack, and the United States government invest a huge amount of budget to conduct research and develope technology about OSINT. Although many Western countries recognize the importance of OSINT and deal with open source as priority, South Korea has not fully understand the important role of OSINT. Therefore, this study introduces the fundamental principles of OSINT and provides practical examples of OSINT usage. OSINT is an effective source to prevent terrorist attacks as well as a variety of crimes. Extensive discussion and suggestions for future usages are provided.

  • PDF

The Effect of Cosmetics Selection Attributes Focusing on Consumer's Deal Proneness on Consumer's Purchase Propensity and Recommend Intention: Multi-Group Analysis of Information Sources (소비자 할인추구성향에 초점을 둔 화장품 선택속성이 구매의도와 추천의도에 미치는 영향: 정보원천에 대한 다중모집단분석)

  • Ganbold, Gandulam;Jang, Hyeongyu
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.81-93
    • /
    • 2021
  • This study examined the effects of cosmetic selection attributes on consumers' purchase propensity and recommend intention. In addition, the moderating effect according to the consumer's deal proneness was verified. Finally, a multi-group analysis was conducted to verify the difference in the research model path according to the information source. Through this study, the selection attributes of consumers who purchase cosmetics were clarified. This study aims to meet the needs and demands of the related industry for more detailed and effective strategic insights by clarifying the structure of the influence of these selection attributes on purchase intention and recommendation intention according to the discount purchase intention. In order to achieve the research objectives due to this necessity, a questionnaire of 258 Korean female consumers was collected and used for research. The analysis results showed that product selection attributes, purchase intention, and recommendation intention all had a positive influence. As a result of analyzing the moderation effect according to the consumer's Deal Proneness, the results showed a moderating effect between the selection attribute and the purchase propensity, the selection attribute and the recommend intention, and the purchase propensity and the recommend intention. Finally, it was partially adopted as a result of conducting a multi-group analysis to verify whether individual paths of the model differ according to information sources.

Analysis of Propagation Characteristics in Microstriplines Using the FDTD (FDTD를 사용한 마이크로스트립라인 전파특성 해석)

  • 류종인;김용진;박영태;이상설
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.869-872
    • /
    • 1999
  • As integrated circuits are developed, the crosstalk and the pulse distortion have been major problems in the design. In this paper. the PML and one-point resistive source are applied. This paper deal with the microstripline circuit which has the gap and three microstripline. Obtaining the Propagation pulse shape in microstripline, we prove that the use of the FDTD in the microstripline is valid.

  • PDF

Routing for Enhancing Source-Location Privacy in Wireless Sensor Networks of Multiple Assets

  • Tscha, Yeong-Hwan
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.589-598
    • /
    • 2009
  • In wireless sensor networks, a node that reports information gathered from adjacent assets should relay packets appropriately so that its location context is kept private, and thereby helping ensure the security of the assets that are being monitored. Unfortunately, existing routing methods that counter the local eavesdropping-based tracing deal with a single asset, and most of them suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. In this paper, we propose a routing method, greedy perimeter stateless routing-based source-location privacy with crew size w (GSLP-w), that enhances location privacy of the packet-originating node (i.e., active source) in the presence of multiple assets. GSLP-w is a hybrid method, in which the next-hop node is chosen in one of four modes, namely greedy, random, perimeter, and retreat modes. Random forwarding brings the path diversity, while greedy forwarding refrains from taking an excessively long path and leads to convergence to the destination. Perimeter routing makes detours that avoid the nodes near assets so that they cannot be located by an adversary tracing up the route path. We study the performance of GSLP-w with respect to crew size w (the number of packets being sent per path) and the number of sources. GSLP-w is compared with phantom routing-single path (PR-SP), which is a notable routing method for source-location privacy and our simulation results show that improvements from the point of the ratio of safety period and delivery latency become significant as the number of source nodes increases.

A Study on AC/DC Converter Design of High Efficiency for Inverter Resistance Welder (인버터 저항용접기의 전력효율 향상을 위한 AC/DC 컨버터 설계에 관한 연구)

  • Kwak, D.K.;Jung, W.S.;Kang, W.C.
    • Proceedings of the KIPE Conference
    • /
    • 2016.07a
    • /
    • pp.40-41
    • /
    • 2016
  • The inverter resistance welder requires AC/DC converter of high efficiency because the converter changes a commercial ac power source to low voltage dc power source. Harmonic components that occur in the conversion process of converter decrease system power factor and deal great damage in electric power system. To improve such problems, this paper proposes a high efficiency AC/DC converter for inverter resistance welder. The switching devices in the proposed converter are operated by soft switching technique using a new quasi-resonant circuit. As a result, the proposed AC/DC converter obtains low switching power loss and high efficiency.

  • PDF

An Analysis on the KSTAR neutral beam injection line (KSTAR 중성입자빔 수송라인 해석)

  • 임기학;김진춘;권경훈;조승연
    • Journal of the Korean Vacuum Society
    • /
    • v.8 no.4B
    • /
    • pp.556-564
    • /
    • 1999
  • The analysis on heat fluxed on and transmission efficiencies by the collimators of neutral beam injection lines in KSTAR tokamak device has been carried out. And a mathematical model describing non-Gaussian beam distribution profile has been established. A neutral beam injection device is composed of 3 separate ion sources and corresponding beam transport lines, which deal with 7.8 MW of beam power, respectively. The divergence angles of ion beam are $1.2^{\circ}$and $0.5^{\circ}$, in vertical and horizontal directions, respectively. The maximum normal heat load on source exit scraper is 9.1 kW/$\textrm{cm}^2$ and net beam transmission efficiency is ~28%. The effect of misalignment of ion source and scrapers on the scraper heat load and beam transmission also has been analyzed.

  • PDF

EFFECT OF THE NUMBER OF ACTIVE SOURCES ON ABR BUFFER SIZE

  • Lee, Yu-Tae;Han, Dong-Hwan
    • Journal of applied mathematics & informatics
    • /
    • v.7 no.3
    • /
    • pp.861-873
    • /
    • 2000
  • Rate-based flow control plays an important role for efficient traffic management of Available Bit Rate(ABR) services. We deal with the problem of the buffer dimension for rate-based ABR control. In this paper, we analyze the Allowed Cell Rate(ACR) of a source and the queue size in a steady state. First, we investigate the effect of the number of active sources on the behavior of the ACR and the maximum queue size. Reflecting the effect of this real scenes, we determine the optimal buffer size and buffer threshold. Furthermore, our analytic results are compared with the case when the effect of the number of active sources is disregarded.

A Hydrological Study on Sources for Water Resoources Development in Korea. (우리나라 수자원의 근원에 대한 수문학적연구)

  • 박성우
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.12 no.4
    • /
    • pp.2063-2077
    • /
    • 1970
  • The Purpose of this study is to give the hydrologically basic data for the development of water resources in Korea and a quantity of daily average precipitation and its frequency in a year are investigated to study the presumption which is affected to river flow. Characteristics of precipitation is poor as source of water resources compared with its efficiency. So, because of such characteristics of precipitation, river flow also is in harmony and distribution of river flow comes to the result of irregularity, that is, range of river coefficiet between the quantity of maximum river flow and others river flow is big, and it is insufficient as source of water resources. Yearly river flow being expressed by daily unit indicates the ratio(%) of distribution to total yearly river flow, and the model of hydrograph is drawn up. The gives the basis to make yearly water balance sheet. This study is not completed, yet but in forth-coming days, the water will try continuously to give more correct basis for the development of water resources according to a great deal of data.

  • PDF

Sound Localization Technique for Intelligent Service Robot 'WEVER' (지능형 로봇 '웨버'를 위한 음원 추적 기술)

  • Lee, Ji-Yeoun;Hahn, Min-Soo;Ji, Su-young;Cho, Young-Jo
    • Proceedings of the KSPS conference
    • /
    • 2005.11a
    • /
    • pp.117-120
    • /
    • 2005
  • This paper suggests an algorithm that can estimate the direction of the sound source in realtime. Our intelligent service robot, WEVER, is used to implement the proposed method at the home environment. The algorithm uses the time difference and sound intensity information among the recorded sound source by four microphones. Also, to deal with noise of robot itself, the kalman filter is implemented. The proposed method takes shorter execution time than that of an existing algorithm to fit the real-time service robot. The result shows relatively small error within the range of ${\pm}$ 7 degree.

  • PDF