• Title/Summary/Keyword: Human security

Search Result 1,181, Processing Time 0.022 seconds

Recent advances in deep learning-based side-channel analysis

  • Jin, Sunghyun;Kim, Suhri;Kim, HeeSeok;Hong, Seokhie
    • ETRI Journal
    • /
    • v.42 no.2
    • /
    • pp.292-304
    • /
    • 2020
  • As side-channel analysis and machine learning algorithms share the same objective of classifying data, numerous studies have been proposed for adapting machine learning to side-channel analysis. However, a drawback of machine learning algorithms is that their performance depends on human engineering. Therefore, recent studies in the field focus on exploiting deep learning algorithms, which can extract features automatically from data. In this study, we survey recent advances in deep learning-based side-channel analysis. In particular, we outline how deep learning is applied to side-channel analysis, based on deep learning architectures and application methods. Furthermore, we describe its properties when using different architectures and application methods. Finally, we discuss our perspective on future research directions in this field.

ETRI AI Strategy #7: Preventing Technological and Social Dysfunction Caused by AI (ETRI AI 실행전략 7: AI로 인한 기술·사회적 역기능 방지)

  • Kim, T.W.;Choi, S.S.;Yeon, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.7
    • /
    • pp.67-76
    • /
    • 2020
  • Because of the development and spread of artificial intelligence (AI) technology, new security threats and adverse AI functions have emerged as a real problem in the process of diversifying areas of use and introducing AI-based products and services to users. In response, it is necessary to develop new AI-based technologies in the field of information protection and security. This paper reviews topics such as domestic and international trends on false information detection technology, cyber security technology, and trust distribution platform technology, and it establishes the direction of the promotion of technology development. In addition, the development of international trends in ethical AI guidelines to ensure the human-centered ethical validity of AI development processes and final systems in parallel with technology development are analyzed and discussed. ETRI has developed AI policing technology, information protection, and security technologies as well as derived tasks and implementation strategies to prepare ethical AI development guidelines to ensure the reliability of AI based on its capabilities.

A Study on System Development for Ship's Integrated Safety and Security

  • Yoon, Daeg-Wun;Kim, Cheol-Seung
    • Journal of Navigation and Port Research
    • /
    • v.35 no.2
    • /
    • pp.131-136
    • /
    • 2011
  • As the faithful performance of ISPS of IMO, nowadays actually applicable an integrated safety and security system in and out of vessel should be organized in views of seafarers. Therefore, this paper is aimed to design a fundamental system for ship's integrated safety and security. The system of integrated grabbing will affect efficiently in any maritime field of material and human flow. Therefore this research will be expected to affect economical side by securing all the risk of maritime issues. In addition to the passenger ship and merchant vessel, it is applicable to other public and private vessels either. As a result of this paper, the system designed collecting various data through integrating the system including RFID reader, PIR sensor, and CMOS camera by putting an individual number into each unit that could be control at easy.

A Study on the Development of the Korean Mobilization Operations Including National Emergency Provision (한국적 비상대비 동원업무 발전방안)

  • Lee Dong-Hun
    • Journal of the military operations research society of Korea
    • /
    • v.18 no.1
    • /
    • pp.15-31
    • /
    • 1992
  • Developments toward a 'the end of the Cold War' are the main factor determining the situation in the Korean Peninsula. While all the combat resources of North Korea are systematically controlled and kept available for instant mobilization even in peacetime. South Korea is inferior to North Korea in terms of mobilization system and efficiency, exercise intensity and equipments. In sum, the South faces far greater restraints in wartime conversion capability than does the North. Mobilization refers to a nation's compulsory control, management and operation of its human and material resources for the purpose of national security. The total capability for safeguarding national security must be pursued by the continuous examination and complementation of our mobilization system and capability. This paper proposes an efficient management of national mobilization system that can be instantly operated on the whole in time of national emergency. Therefore, the actual operation of National Security Council is suggested to prepare operations against the emergencies and establish the foundation for national security.

  • PDF

ROSS: Low-Cost Self-Securing VoIP Communication Framework

  • Syafalni, Alfin;Samsudin, Azman;Jaafar, Yazid;Omar, Mohd. Adib
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3366-3383
    • /
    • 2012
  • Reliance on the Internet has introduced Voice over Internet Protocol (VoIP) to various security threats. A reliable security protocol and an authentication scheme are thus required to prevent the aforementioned threats. However, an authentication scheme often demands additional cost and effort. Accordingly, a security framework for known participants in VoIP communication is proposed in this paper. The framework is known as Randomness-Optimized Self-Securing (ROSS), which performs authentication automatically throughout the session by optimizing the uniqueness and randomness of the communication itself. Elliptic Curve Diffie-Hellman (ECDH) key exchange and Salsa20 stream cipher are utilized in the framework correspondingly to secure the key agreement and the communication with low computational cost. Human intelligence supports ROSS authentication process to ensure participant authenticity and communication regularity. The results show that with marginal overhead, the proposed framework is able to secure VoIP communication by performing reliable authentication.

Principles and Conceptual Framework for the Introduction of Korean Sickness Benefit (한국형 상병수당 도입을 위한 제도 설계의 원칙과 개념적 틀)

  • Kang, Hee-Chung
    • Health Policy and Management
    • /
    • v.31 no.1
    • /
    • pp.5-16
    • /
    • 2021
  • Both access to healthcare services and income security in case of personal illness are being needed to achieve universal health coverage, which is enshrined in the human rights to health and social security and international standards on social protection. Income security acts on both the social determinants and the adverse consequences of ill health and thus would break the vicious disease-poverty cycle. The government is supposed to implement a demonstration project of sickness benefit in 2022 and to publicize its more specific blueprint for all workers. This study is to suggest basic principles and a framework to design a new sickness benefit for universal health coverage, which is based on reviews on previous studies, related issues, and institutional conditions. This is to provide a theoretical basis to promote further discussion and to support its decision-making.

A new method to detect attacks on the Internet of Things (IoT) using adaptive learning based on cellular learning automata

  • Dogani, Javad;Farahmand, Mahdieh;Daryanavard, Hassan
    • ETRI Journal
    • /
    • v.44 no.1
    • /
    • pp.155-167
    • /
    • 2022
  • The Internet of Things (IoT) is a new paradigm that connects physical and virtual objects from various domains such as home automation, industrial processes, human health, and monitoring. IoT sensors receive information from their environment and forward it to their neighboring nodes. However, the large amounts of exchanged data are vulnerable to attacks that reduce the network performance. Most of the previous security methods for IoT have neglected the energy consumption of IoT, thereby affecting the performance and reducing the network lifetime. This paper presents a new multistep routing protocol based on cellular learning automata. The network lifetime is improved by a performance-based adaptive reward and fine parameters. Nodes can vote on the reliability of their neighbors, achieving network reliability and a reasonable level of security. Overall, the proposed method balances the security and reliability with the energy consumption of the network.

The Qualitative Study on the Triggering Factors of Private Security Guards' Stress (민간경호원의 스트레스 유발요인에 관한 질적연구)

  • Kim, Jin-Hwan
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.89-105
    • /
    • 2008
  • The aim of this study is to examine the primary causes of security guard's stress by conducting a survey of 50 guards engaging in security companies in Seoul and Gyeonggido. The following results are attained by an inductive content analysis of conviction interview data through in-depth interview of qualitative study method. 1. Factors of stress related to personal problems. The stress by personal problems is resulted from two factors. One is the physical strength inferiority, which leads to negative thoughts, dismay, mental conflict and tension. The other is complex about not-specializing security, which causes discord with his/her supervisor or co-workers and a feeling of uneasiness. 2. Factors of stress related to human relationship. The stress due to human relations is constantly resulted from discord with his/her supervisor and inclined to be accumulated. The mental conflict is elated in feeling that the manager's instructions are not right. So this factor makes them want change of occupation. Also working conditions are different from those of their friends, which causes them not to spend a lot of time with their friends. 3. Factors of stress related to domestic life It appears that most security guards are under stress due to their spouses' discontent with a small number of wages. Also it is reported that male guards are under stress in case of unhappy conjugal relations. And security guard's life is restricted much more than that of workers in a general occupation because of standing ready for mobilization and 24-hour service. So some of male guards experienced an early symptoms of a morbid suspicion about their wife's chastity and are suffering from insomnia as an occupational disease.

  • PDF

The Effect of Job Satisfaction of Casino Security Employees on Organizational Commitment and Turnover Intention (카지노 시큐리티 종사원의 직무만족이 조직몰입 및 이직의도에 미치는 영향)

  • Lee, Seok-Man;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.161-184
    • /
    • 2017
  • In general, security employees are more vulnerable to the risk of various incidents and accidents due to the specificity of their work, and they are less exposed to job satisfaction due to irregular working hours such as night shifts and physical labor. There is a concern that conflicts over turnover will be intensified. Therefore, companies should pay attention to job satisfaction, organizational commitment and turnover intention through effective human resource management of security employees who have influence on company's profit creation, so that companies should strive for competitiveness and development. The purpose of this study is to investigate the effect of casino security employee's job satisfaction on organizational commitment and turnover intentions in a questionnaire survey of security employees at Grand Korea Leisure Corporation. Frequency analysis, factor analysis, reliability analysis and multiple regression analysis were performed using SPSS 24.0. As a result of this study, it can be concluded that the higher the job satisfaction of the public enterprise security workers, the higher the organizational commitment and the lower the turnover intention. Therefore, if the company has competitiveness through effective human resource management that affects the wage satisfaction, promotion satisfaction, boss satisfaction and turnover intention affecting the organizational commitment, This study can be applied in the sense that it is possible to give.

  • PDF

People Tracking Method with Distributed Laser Scanner and Its Application to Entrance Monitoring System (분산배치된 레이저 스캐너를 이용한 사람추적방법 및 출입감시시스템에의 응용)

  • Lee, Jae-Hoon;Kim, Yong-Shik;Kim, Bong-Keun;Ohba, Kohtaro;Kawata, Hirohiko;Ohya, Akihisa;Yuta, Shin'ich
    • The Journal of Korea Robotics Society
    • /
    • v.4 no.2
    • /
    • pp.130-138
    • /
    • 2009
  • Recently, people tracking technology is being required to various area including security application. This paper suggests a method to track people with multiple laser scanners to detect the waist part of human. Multi-target model and Kalman filter based estimation are employed to track the human movement. The proposed method is applied to a novel system to monitor the entrance area and to filter out the trespasser to pass through the door without identification. Experiments for various cases are performed to verify the usefulness of the developed system.

  • PDF