• 제목/요약/키워드: Open Security Tool

검색결과 54건 처리시간 0.032초

Social Networks As A Tool Of Marketing Communications

  • Nataliia Liashuk
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.137-144
    • /
    • 2023
  • The relevance of the research topic lies in the necessity to use social networks as innovative tools of marketing communications. A wide audience and the ability to segment the market for a specific consumer determine the construction of a corporate strategy, which will be based on using the social networking approach. The spread of the global coronavirus pandemic has led to the rapid development of remote communication channels between the company and the customer. The issue of using marketing tools in social networks acquires the most urgent importance in the modern world of the introduction and implementation of the company's marketing strategies. The purpose of the academic paper is to study the use of social networks as features of implementing the marketing campaign. Social networks are the result of the development of digital technologies and the processes of creating an information society involved in the digital space. The objectives of the research are to analyse the opportunity of using social networks as a tool for marketing communications and their implementation at the level of its widespread use by enterprises and establishments. It is significant to create an advertising campaign by defining the target audience and outlining the key aspects, on which the company is focused. The research methodology consists in determining the theoretical and methodological approaches to the essence of introducing social networks and their practical importance in the implementation of marketing activities of companies. The obtained results can significantly improve the quality of functioning of modern enterprises and organizations that plan to master a new market segment or gain competitive advantages in the existing one. The academic paper examines the essence of social networks as a tool of marketing communications. The key principles of the development of digital social platforms were revealed. The quality of implementing the advertising campaign in the social network was studied, and further prospects for the development of using social networks as a component of the marketing strategy were outlined. Therefore, the academic paper analyses the problems of using social networks as a marketing tool.

Damping Analysis using IEEEST PSS and PSS2A PSS

  • Lee Sang-Seung;Kang Sang-Hee;Jang Gwang-Soo;Li Shan-Ying;Park Jong-Keun;Moon Seung-Il;Yoon Yong-Tae
    • Journal of Electrical Engineering and Technology
    • /
    • 제1권3호
    • /
    • pp.271-278
    • /
    • 2006
  • This paper scrutinized the damping effects of installing the prototype PSSs by a transient analysis for eight buses of faults in the South Korean power system. The PSSs used have the co-PSS blocks for IEEEST model with a single input and the co+power PSS blocks for PSS2A model with dual inputs. The simulation tool was a TSAT(Transient Security Assessment Tool) developed by Powertech Labs Inc. The voltages of the transmission line for simulations were 765kV and 345kV, and the faults for eight cases were sequenced by considering the open state and the close state of the lines. In the simulations, the three-phase line to ground (L-G) fault generated different points for each region. The simulations were compared to the cases of no PSS, partial IEEEST and PSS2A, absolute IEEEST, and absolute PSS2A to show that the power system oscillation can be effectively damped by PSS modules. Simulations were conducted to confirm the effectiveness for the KEPCO (Korea Electric Power Corporation) power system.

code2vec 모델을 활용한 소스 코드 보안 취약점 탐지 (Detection of Source Code Security Vulnerabilities Using code2vec Model)

  • 양준혁;모지환;홍성문;도경구
    • 한국소프트웨어감정평가학회 논문지
    • /
    • 제16권2호
    • /
    • pp.45-52
    • /
    • 2020
  • 소스 코드의 보안 취약점을 탐지하는 전통적인 방법은 많은 시간과 노력을 필요로 한다. 만약 보안 취약점 유형들에 대한 좋은 품질의 데이터가 있다면, 이와 머신러닝 기술을 활용해 효과적으로 문제를 해결할 수 있을 것이다. 이에 본 논문은 정적 프로그램 분석에 머신러닝 기술을 활용하여 소스 코드에서 보안 취약점을 탐지하는 방법을 제시하고, 실험을 통하여 가능성을 보인다. 메소드 단위의 코드 조각의 의미를 해석하여 메소드의 이름을 예측하는 code2vec 모델을 사용하고, 모델을 생성하고 검증 및 평가를 하기 위한 데이터로 흔히 발생할 수 있는 보안 취약점을 모아놓은 Juliet Test Suite를 사용하였다. 모델 평가 결과 약 97.3%의 정밀도와 약 98.6%의 재현율로 매우 희망적인 결과를 확인하였고 오픈 소스 프로젝트의 취약점을 탐지함으로써 가능성을 보였다. 향후 연구를 통해 다른 취약점 유형과 다양한 언어로 작성된 소스 코드에 대해서 대응함으로써 기존의 분석 도구들을 대체할 수 있을 것이다.

소형 공동주택 단위주거의 친환경성에 관한 사례분석연구 (A Study on the Analysis of Ecologically Friendly Features in Recently Developed Public Housing)

  • 임정은;이현정;이연숙;조지연;이정미
    • 한국실내디자인학회:학술대회논문집
    • /
    • 한국실내디자인학회 2005년도 춘계학술발표대회 논문집
    • /
    • pp.106-109
    • /
    • 2005
  • The awareness of ecological friendliness has been emerging in the recent years, and the application to housing is quite notable. The purpose of this study was to examine multi-family housing that has recently developed with the idea of ecological friendliness, and to investigate the residents' attitudes toward and their preferences for the features. The research utilized in-depth interviews and site visits, and seven residents in the studied housing developments participated in the study. The analytical tool used in the interview was reviewed by a panel of professionals and included five aspects of ecologically friendliness: residential comfort, energy saving, open housing, storage, and safety and security. The respondents pointed out that south-facing housing in relation to residential comfort was most favorable. With regard to energy-saving, water-saving features and dehydrator of food waste were most needed features. As for open housing-related features, flexibility in spatial configuration was necessary, and efficient storage was regarded as important. Also, the respondents mentioned the preference for flooring preventing slippery in bathroom for the safety of family member.

  • PDF

A GQM Approach to Evaluation of the Quality of SmartThings Applications Using Static Analysis

  • Chang, Byeong-Mo;Son, Janine Cassandra;Choi, Kwanghoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권6호
    • /
    • pp.2354-2376
    • /
    • 2020
  • SmartThings is one of the most popular open platforms for home automation IoT solutions that allows users to create their own applications called SmartApps for personal use or for public distribution. The nature of openness demands high standards on the quality of SmartApps, but there have been few studies that have evaluated this thoroughly yet. As part of software quality practice, code reviews are responsible for detecting violations of coding standards and ensuring that best practices are followed. The purpose of this research is to propose systematically designed quality metrics under the well-known Goal/Question/Metric methodology and to evaluate the quality of SmartApps through automatic code reviews using a static analysis. We first organize our static analysis rules by following the GQM methodology, and then we apply the rules to real-world SmartApps to analyze and evaluate them. A study of 105 officially published and 74 community-created real-world SmartApps found a high ratio of violations in both types of SmartApps, and of all violations, security violations were most common. Our static analysis tool can effectively inspect reliability, maintainability, and security violations. The results of the automatic code review indicate the common violations among SmartApps.

The French Underground Research Laboratory in Bure: An Essential Tool for the Development and Preparation of the French Deep Geological Disposal Facility Cigéo

  • Pascal Claude LEVERD
    • 방사성폐기물학회지
    • /
    • 제21권4호
    • /
    • pp.489-502
    • /
    • 2023
  • This article presents the crucial role played by the French underground research laboratory (URL) in initiating the deep geological repository project Cigéo. In January 2023, Andra finalized the license application for the initial construction of Cigéo. Depending on Government's decision, the construction of Cigéo may be authorized around 2027. Cigéo is the result of a National program, launched in 1991, aiming to safely manage high-level and intermediate level long-lived radioactive wastes. This National program is based on four principles: 1) excellent science and technical knowledge, 2) safety and security as primary goals for waste management, 3) high requirements for environment protection, 4) transparent and open-public exchanges preceding the democratic decisions and orientations by the Parliament. The research and development (R&D) activities carried out in the URL supported the design and the safety demonstration of the Cigéo project. Moreover, running the URL has provided an opportunity to gain practical experience with regard to the security of underground operations, assessment of environmental impacts, and involvement of the public in the preparation of decisions. The practices implemented have helped gradually build confidence in the Cigéo project.

LoGos: Internet-Explorer-Based Malicious Webpage Detection

  • Kim, Sungjin;Kim, Sungkyu;Kim, Dohoon
    • ETRI Journal
    • /
    • 제39권3호
    • /
    • pp.406-416
    • /
    • 2017
  • Malware propagated via the World Wide Web is one of the most dangerous tools in the realm of cyber-attacks. Its methodologies are effective, relatively easy to use, and are developing constantly in an unexpected manner. As a result, rapidly detecting malware propagation websites from a myriad of webpages is a difficult task. In this paper, we present LoGos, an automated high-interaction dynamic analyzer optimized for a browser-based Windows virtual machine environment. LoGos utilizes Internet Explorer injection and API hooks, and scrutinizes malicious behaviors such as new network connections, unused open ports, registry modifications, and file creation. Based on the obtained results, LoGos can determine the maliciousness level. This model forms a very lightweight system. Thus, it is approximately 10 to 18 times faster than systems proposed in previous work. In addition, it provides high detection rates that are equal to those of state-of-the-art tools. LoGos is a closed tool that can detect an extensive array of malicious webpages. We prove the efficiency and effectiveness of the tool by analyzing almost 0.36 M domains and 3.2 M webpages on a daily basis.

A Systematic Design Automation Method for RDA-based .NET Component with MDA

  • Kum, Deuk Kyu
    • 인터넷정보학회논문지
    • /
    • 제20권2호
    • /
    • pp.69-76
    • /
    • 2019
  • Recent Enterprise System has component driven real-time distributed architecture (RDA) and this kind of architecture should performed with satisfying strict constraints on life cycle of object and response time such as synchronization, transaction and so on. Microsoft's .NET platform supports RDA and is able to implement services including before mentioned time restriction and security service by only specifying attribute code and maximizing advantages of OMG's Model Driven Architecture (MDA). In this study, a method to automatically generate an extended model of essential elements in an enterprise-system-based RDA as well as the platform specific model (PSM) for Microsoft's .NET platform are proposed. To realize these ideas, the functionalities that should be considered in enterprise system development are specified and defined in a meta-model and an extended UML profile. In addition, after defining the UML profile for .NET specification, these are developed and applied as plug-ins of the open source MDA tool, and extended models are automatically generated using this tool. Accordingly, by using the proposed specification technology, the profile and tools can easily and quickly generate a reusable extended model even without detailed coding-level information about the functionalities considered in the .NET platform and RDA.

지반굴착 시나리오 기반의 다공성 매질에 대한 3차원 유동해석모델 구축 (Development of 3-D Flow Model for Porous Media with Scenario-based Ground Excavation)

  • 차장환;이재영;김우석
    • 한국방재안전학회논문집
    • /
    • 제10권1호
    • /
    • pp.19-27
    • /
    • 2017
  • 최근 도심지에서 상하수도 등의 지중매설관 노후 및 접합 불량에 따른 누수에 의해 일어나거나, 터널굴착 및 지하구조물 시공 시 부실시공 또는 관리 부실로 인한 지하수의 유입으로 지중공동이 발생하고 이로 인하여 지반침하가 빈번하게 발생하고 있다. 이에 본 연구에서는 포화-불포화 다공성 매질에 대한 지하수 변동을 예측할 수 있는 수치모델(SEEFLOW3D)을 개발하였으며 개착식 및 비개착식 굴착 시나리오를 구성하여 지반굴착에 따른 영향을 모사하였다. 또한, 개발모델의 검증을 위해 범용수치해석 프로그램(Visual MODFLOW)과 비교 분석을 수행하였다. 그 결과 평균 오차는 -3.95~5.72%이며 정규화 된 RMSE는 0.56~4.62%로 나타났다. 향후 본 연구의 개발모델은 지반굴착 공사 시 지하수 유출량을 예측하고 이에 따른 차수벽의 최적 설계 등을 위한 해석툴로 활용 가능할 것으로 기대된다.

Performance Evaluation of SDN Controllers: RYU and POX for WBAN-based Healthcare Applications

  • Lama Alfaify;Nujud Alnajem;Haya Alanzi;Rawan Almutiri;Areej Alotaibi;Nourah Alhazri;Awatif Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.219-230
    • /
    • 2023
  • Wireless Body Area Networks (WBANs) have made it easier for healthcare workers and patients to monitor patients' status continuously in real time. WBANs have complex and diverse network structures; thus, management and control can be challenging. Therefore, considering emerging Software-defined networks (SDN) with WBANs is a promising technology since SDN implements a new network management and design approach. The SDN concept is used in this study to create more adaptable and dynamic network architectures for WBANs. The study focuses on comparing the performance of two SDN controllers, POX and Ryu, using Mininet, an open-source simulation tool, to construct network topologies. The performance of the controllers is evaluated based on bandwidth, throughput, and round-trip time metrics for networks using an OpenFlow switch with sixteen nodes and a controller for each topology. The study finds that the choice of network controller can significantly impact network performance and suggests that monitoring network performance indicators is crucial for optimizing network performance. The project provides valuable insights into the performance of SDN-based WBANs using POX and Ryu controllers and highlights the importance of selecting the appropriate network controller for a given network architecture.