• 제목/요약/키워드: Security Behavior

검색결과 899건 처리시간 0.024초

도시가계의 화폐태도유형과 지출행동분석 (An Analysis of the Type of Attitudes Toward Money and Expenditure Behavior)

  • 백은영
    • 대한가정학회지
    • /
    • 제36권3호
    • /
    • pp.47-60
    • /
    • 1998
  • This Pupose of this study was to identify the type of attitudes toward money to investigate the relationship between the attitued and consumption expenditure pattern. Data were obtained from 398 household living in Seoul. Factor analysis was used for examining dimensions of attitudes toward money and cluster analysis for classifying the households by money attitudes. This study found five money attitude dimensions, i.e., the Means of Success dimension, the Means of Pleasure dimension, the Means of Security dimension, the Symbol of Anxiety dimension, and the Parsimony dimension, Based on the variation in the dimensions, five money types were identified, ie., the Means of Success, the Means of Pleasure, the Means of Security, the Symbol of Anxiety, and the Parsimony.

  • PDF

A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack

  • Kim, Jisun;Jo, Eulhan;Lee, Sungwon;Cho, Taenam
    • Journal of Information Processing Systems
    • /
    • 제17권4호
    • /
    • pp.772-786
    • /
    • 2021
  • The process of tracking suspicious behavior manually on a system and gathering evidence are labor-intensive, variable, and experience-dependent. The system logs are the most important sources for evidences in this process. However, in the Microsoft Windows operating system, the action events are irregular and the log structure is difficult to audit. In this paper, we propose a model that overcomes these problems and efficiently analyzes Microsoft Windows logs. The proposed model extracts lists of both common and key events from the Microsoft Windows logs to determine detailed actions. In addition, we show an approach based on the proposed model applied to track illegal file access. The proposed approach employs three-step tracking templates using Elastic Stack as well as key-event, common-event lists and identify event lists, which enables visualization of the data for analysis. Using the three-step model, analysts can adjust the depth of their analysis.

피드백 지연의 가상적 단축을 이용한 전송률 할당 알고리즘 연구 (A Rate Allocation Algorithm with Virtually Reduced Feedback Delay)

  • 송주석
    • 정보보호학회논문지
    • /
    • 제6권3호
    • /
    • pp.71-86
    • /
    • 1996
  • 본 논문에서는 ATM(Asynchronous Transfer Mode) 망의 ABR(Available Bit-Rate) 서비스를 위한 폭주 제어 기법 내에서 사용되는 스위치 알고리즘을 제안한다. 이 알고리즘은 명시적 전송률 할당 알고리즘으로서 셀의 전송 경로 중 피드백 지연 시간을 가상적으로 단축하여 왕복 지연이 큰 망 환경과 효율성을 유지한다는 것을 시뮬레이션을 통하여 보인다.

Continuous Human Activity Detection Using Multiple Smart Wearable Devices in IoT Environments

  • Alshamrani, Adel
    • International Journal of Computer Science & Network Security
    • /
    • 제21권2호
    • /
    • pp.221-228
    • /
    • 2021
  • Recent improvements on the quality, fidelity and availability of biometric data have led to effective human physical activity detection (HPAD) in real time which adds significant value to applications such as human behavior identification, healthcare monitoring, and user authentication. Current approaches usually use machine-learning techniques for human physical activity recognition based on the data collected from wearable accelerometer sensor from a single wearable smart device on the user. However, collecting data from a single wearable smart device may not provide the complete user activity data as it is usually attached to only single part of the user's body. In addition, in case of the absence of the single sensor, then no data can be collected. Hence, in this paper, a continuous HPAD will be presented to effectively perform user activity detection with mobile service infrastructure using multiple wearable smart devices, namely smartphone and smartwatch placed in various locations on user's body for more accurate HPAD. A case study on a comprehensive dataset of classified human physical activities with our HAPD approach shows substantial improvement in HPAD accuracy.

Dynamic Routing and Spectrum Allocation with Traffic Differentiation to Reduce Fragmentation in Multifiber Elastic Optical Networks

  • ZOUNEME, Boris Stephane;ADEPO, Joel;DIEDIE, Herve Gokou;OUMTANAGA, Souleymane
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.1-10
    • /
    • 2021
  • In recent decades, the heterogeneous and dynamic behavior of Internet traffic has placed new demands on the adaptive resource allocation of the optical network infrastructure. However, the advent of multifiber elastic optical networks has led to a higher degree of spectrum fragmentation than conventional flexible grid networks due to the dynamic and random establishment and removal of optical connections. In this paper, we propose heuristic routing and dynamic slot allocation algorithms to minimize spectrum fragmentation and reduce the probability of blocking future connection requests by considering the power consumption in elastic multifiber elastic optical networks.

Modeling in System Engineering: Conceptual Time Representation

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.153-164
    • /
    • 2021
  • The increasing importance of such fields as embedded systems, pervasive computing, and hybrid systems control is increasing attention to the time-dependent aspects of system modeling. In this paper, we focus on modeling conceptual time. Conceptual time is time represented in conceptual modeling, where the notion of time does not always play a major role. Time modeling in computing is far from exhibiting a unified and comprehensive framework, and is often handled in an ad hoc manner. This paper contributes to the establishment of a broader understanding of time in conceptual modeling based on a software and system engineering model denoted thinging machine (TM). TM modeling is founded on a one-category ontology called a thimac (thing/machine) that is used to elaborate the design and analysis of ontological presumptions. The issue under study is a sample of abstract modeling domains as exemplified by time. The goal is to provide better understanding of the TM model by supplementing it with a conceptualization of time aspects. The results reveal new characteristics of time and related notions such as space, events, and system behavior.

XML기반 Windows Event Log Forensic 도구 설계 및 구현 (XML-based Windows Event Log Forensic tool design and implementation)

  • 김종민;이동휘
    • 융합보안논문지
    • /
    • 제20권5호
    • /
    • pp.27-32
    • /
    • 2020
  • Windows Event Log에는 시스템의 전반적인 동작들을 정의하고 있는 Log이며, 해당 파일에는 사용자의 여러 행위 및 이상 징후를 탐지할 수 있는 데이터가 저장되어 있다. 하지만 행위마다 Event Log가 발생함으로써, 로그들을 분석할 때, 상당한 시간이 소요된다. 따라서 본 연구에서는 NSA에서 발표한 "Spotting the Adversary with Windows Event Log Monitoring"의 주요 Event Log 목록을 바탕으로 XML 기반한 Event Log 분석 도구를 설계 및 구현 하였다.

The Role of Informal Institutions in the Development of the Financial Services Market

  • Dubyna, Maksym;Panchenko, Olena;Bazilinska, Olena;Donkohlova, Tetyana;Shpomer, Alla;Rudenko, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.207-215
    • /
    • 2021
  • The aim of the article is to study the role of informal institutions in the development of the financial services market. The study outlines the concepts of scholars to identify the main types of informal institutions. The mechanism of research of influence of the informal factor on functioning of economic object is developed. The main types of informal institutions are systematized. The main informal institutions influencing the development of the financial services market are considered. The application of a synergetic approach to the consideration of the impact of the institution of trust on the financial services market is proposed.

Methodological Fundamentals Of Application Of Competencies For Teachers Of Foreign Languages

  • Zahrebniuk, Yuliia;Zheliaskov, Vasyl;Romanyshyn, Ihor;Varekh, Nonna;Yakymenko, Polina
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.328-332
    • /
    • 2021
  • The article considers general tendencies in world and education, and also both principles and methods of forming professional, communicative, intercultural competences and in the process of teaching foreign language for professional purposes in the conditions of engineering, economic and other non-linguistic specialties at technical university. The article views some essential issues of this competence including awareness of pedagogical values, the construction of the pedagogical process, pedagogical communication and behavior; pedagogical technology, its essence, structural components, understanding of innovative components of professional activity, requirements for the design and engineering of pedagogical technologies.

Human Action Recognition Using Deep Data: A Fine-Grained Study

  • Rao, D. Surendra;Potturu, Sudharsana Rao;Bhagyaraju, V
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.97-108
    • /
    • 2022
  • The video-assisted human action recognition [1] field is one of the most active ones in computer vision research. Since the depth data [2] obtained by Kinect cameras has more benefits than traditional RGB data, research on human action detection has recently increased because of the Kinect camera. We conducted a systematic study of strategies for recognizing human activity based on deep data in this article. All methods are grouped into deep map tactics and skeleton tactics. A comparison of some of the more traditional strategies is also covered. We then examined the specifics of different depth behavior databases and provided a straightforward distinction between them. We address the advantages and disadvantages of depth and skeleton-based techniques in this discussion.