• 제목/요약/키워드: Security Tactics

검색결과 53건 처리시간 0.023초

탄약종합군수지원 업무체계 발전에 관한 연구 (A Study for Ammunition Integrated Logistics Support System Development)

  • 한호석;이영욱
    • 융합보안논문지
    • /
    • 제15권3_1호
    • /
    • pp.23-30
    • /
    • 2015
  • 종합군수지원은 미래전쟁에 효과적으로 대응하고 원활한 군수지원 활동을 통해 전쟁을 승리로 이끄는데 기여하기 위함에 있다. 미래전쟁은 현대전에 비해 매우 복잡하고 고도의 전략과 전술을 구사하며 첨단무기체계를 동원한 강도 높은 전쟁으로 발전할 것으로 예상된다. 따라서, 본 연구에서는 종합군수지원의 한 분야인 탄약종합군수지원의 발전을 통해 효과적인 군수지원이 이루어지기를 바라고, 단계별 업무체계와 수행업무, 탄약종합군수 지원요소에 대해 고찰하고, 탄약종합군수지원업무와 관련한 문제점을 도출하여 발전방향을 제시하고자 한다.

Wellness Prediction in Diabetes Mellitus Risks Via Machine Learning Classifiers

  • Saravanakumar M, Venkatesh;Sabibullah, M.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.203-208
    • /
    • 2022
  • The occurrence of Type 2 Diabetes Mellitus (T2DM) is hoarding globally. All kinds of Diabetes Mellitus is controlled to disrupt over 415 million grownups worldwide. It was the seventh prime cause of demise widespread with a measured 1.6 million deaths right prompted by diabetes during 2016. Over 90% of diabetes cases are T2DM, with the utmost persons having at smallest one other chronic condition in UK. In valuation of contemporary applications of Big Data (BD) to Diabetes Medicare by sighted its upcoming abilities, it is compulsory to transmit out a bottomless revision over foremost theoretical literatures. The long-term growth in medicine and, in explicit, in the field of "Diabetology", is powerfully encroached to a sequence of differences and inventions. The medical and healthcare data from varied bases like analysis and treatment tactics which assistances healthcare workers to guess the actual perceptions about the development of Diabetes Medicare measures accessible by them. Apache Spark extracts "Resilient Distributed Dataset (RDD)", a vital data structure distributed finished a cluster on machines. Machine Learning (ML) deals a note-worthy method for building elegant and automatic algorithms. ML library involving of communal ML algorithms like Support Vector Classification and Random Forest are investigated in this projected work by using Jupiter Notebook - Python code, where significant quantity of result (Accuracy) is carried out by the models.

영화 추천 시스템을 위한 연구: 한계점 및 해결 방법 (Survey for Movie Recommendation System: Challenge and Problem Solution)

  • 초느에진랏;마리즈아길랄;무함마드 필다우스;강성원;이경현
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2022년도 춘계학술발표대회
    • /
    • pp.594-597
    • /
    • 2022
  • Recommendation systems are a prominent approach for users to make informed automated judgments. In terms of movie recommendation systems, there are two methods used; Collaborative filtering, which is based on user similarities; and Content-based filtering which takes into account specific user's activity. However, there are still issues with these two existing methods, and to address those, a combination of collaborative and content-based filtering is employed to produce a more effective system. In addition, various similarity methodologies are used to identify parallels among users. This paper focuses on a survey of the various tactics and methods to find solutions based on the problems of the current recommendation system.

Performance Analysis of Perturbation-based Privacy Preserving Techniques: An Experimental Perspective

  • Ritu Ratra;Preeti Gulia;Nasib Singh Gill
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.81-88
    • /
    • 2023
  • In the present scenario, enormous amounts of data are produced every second. These data also contain private information from sources including media platforms, the banking sector, finance, healthcare, and criminal histories. Data mining is a method for looking through and analyzing massive volumes of data to find usable information. Preserving personal data during data mining has become difficult, thus privacy-preserving data mining (PPDM) is used to do so. Data perturbation is one of the several tactics used by the PPDM data privacy protection mechanism. In Perturbation, datasets are perturbed in order to preserve personal information. Both data accuracy and data privacy are addressed by it. This paper will explore and compare several perturbation strategies that may be used to protect data privacy. For this experiment, two perturbation techniques based on random projection and principal component analysis were used. These techniques include Improved Random Projection Perturbation (IRPP) and Enhanced Principal Component Analysis based Technique (EPCAT). The Naive Bayes classification algorithm is used for data mining approaches. These methods are employed to assess the precision, run time, and accuracy of the experimental results. The best perturbation method in the Nave-Bayes classification is determined to be a random projection-based technique (IRPP) for both the cardiovascular and hypothyroid datasets.

Analysis of Iran's Air Defense Network and Implications for the Development of South Korea's Air Defense Network

  • Hwang Hyun-Ho
    • International Journal of Advanced Culture Technology
    • /
    • 제12권2호
    • /
    • pp.249-257
    • /
    • 2024
  • This study analyzes the current status and prospects of Iran's air defense network, focusing on the Russian-made S-300 system, and derives implications for the development of South Korea's air defense network. Iran's air defense network exhibits strengths such as long-range detection and interception capabilities, multi-target processing, high-altitude interception, and electronic warfare response. However, it also reveals weaknesses, including lack of mobility, difficulty in detecting low-altitude targets, obsolescence, training level of operating personnel, and vulnerability to electronic warfare. Real-world cases confirm these weaknesses, making the system susceptible to enemy evasion tactics, swarm drone attacks, and electronic warfare. Drawing from Iran's case, South Korea should establish a multi-layered defense system, strengthen low-altitude air defense and electronic warfare capabilities, foster the domestic defense industry for technological self-reliance, and enhance international cooperation. By addressing these aspects, South Korea can establish a robust air defense network and firmly protect its national security. Future research should aim to secure and analyze materials from the Iranian perspective for a more objective evaluation of Iran's air defense network and continuously track Iran's efforts to improve its air defense network and the trend of strengthening drone forces to predict changes in the Middle East security situation.

How do Citrus Crops Cope with Aluminum Toxicity?

  • Arunakumara, K.K.I.U.;Walpola, Buddhi Charana;Yoon, Min-Ho
    • 한국토양비료학회지
    • /
    • 제45권6호
    • /
    • pp.928-935
    • /
    • 2012
  • World Agriculture faces daunting challenges in feeding the growing population today. Reduction in arable land extent due to numerous reasons threatens achievement of food and nutritional security. Under this back ground, agricultural use of acidic soils, which account for approximately 40 % of the world arable lands is of utmost important. However, due to aluminum (Al) toxicity and low available phosphorous (P) content, crop production in acidic soils is restricted. Citrus, in this context, gains worldwide recognition as a crop adapted to harsh environments. The present paper reviewed Al toxicity and possible toxicity alleviation tactics in citrus. As reported for many other crops, inhibition of root elongation, photosynthesis and growth is experienced in citrus also due to Al toxicity. Focusing at toxicity alleviation, interaction between boron (B) and Al as well as phosphorus and Al has been discussed intensively. Al toxicity in citrus could be alleviated by P through increasing immobilization of Al in roots and P level in shoots rather than through increasing organic acid secretion, which has been widely reported in other crops. Boron-induced changes in Al speciation and/or sub-cellular compartmentation has also been suggested in amelioration of root inhibition in citrus. Despite the species-dependent manner of response to Al toxicity, many commercially important citrus species can be grown successfully in acidic soils, provided toxicity alleviation Agro-biological tactics such as addition of phosphorous fertilizers are used properly.

사이버공격 의도분석을 통한 공격유형 분류에 관한 연구 - 사이버공격의 정치·경제적 피해분석을 중심으로 - (Study On Identifying Cyber Attack Classification Through The Analysis of Cyber Attack Intention)

  • 박상민;임종인
    • 정보보호학회논문지
    • /
    • 제27권1호
    • /
    • pp.103-113
    • /
    • 2017
  • 사이버공격은 목적 및 의도에 따라 사이버 전쟁, 테러, 범죄 등의 유형으로 분류할 수 있고 해킹 DDoS 선전 등 다양한 전략과 전술이 동원된다. 사이버공격으로 발생한 피해는 경제 사회 군사 및 물리 정보 인식 등 다양한 범주에서 발생하고 공격주체 식별을 위해 통상 IP ID URL 등 사례기반분석이 이용된다. 그러나 최근 사이버공격은 디지털 정보의 조작을 통해 의도와 주체를 은폐하며 클라우드 기반의 사이버환경이 등장함에 따라 공격유형의 분류 및 대응전략 수립이 제한됨에 따라 피해기반분석의 필요성이 대두되고 있다. 이에 본 논문에서는 사이버공격시 발생한 피해를 경제 정치적 관점에서 분석하고 공격의도를 추론함으로써 사이버공격 유형을 분류하고자 한다.

산업제어시스템을 위한 인공지능 보안 기술 (AI-based Cybersecurity Solution for Industrial Control System)

  • 조부성;김문석
    • 인터넷정보학회논문지
    • /
    • 제23권6호
    • /
    • pp.97-105
    • /
    • 2022
  • 본 논문에서는 산업제어시스템(Industrial Control System, ICS)을 위한 보안기술의 동향과 인공지능 활용을 설명한다. 산업제어시스템은 대규모의 국가적 주요기반 및 산업분야에 적용되어 사용되기 때문에 사이버 공격에 의한 사소한 문제라도 막대한 경제적 비용을 발생 시킬 수 있다. 산업제어시스템은 기존의 IT (Information Technology) 시스템과는 다른 특성을 가지고 있기 때문에 최신 보안기술 개발을 위해서는 산업제어시스템에 맞는 보안위험요소를 고려해야한다. 산업제어시스템에서 최근에 발생되었던 사이버 공격의 방법, 기술을 분석한 프레임워크를 설명한다. 또한, 산업제어시스템의 보안을 위한 대표적인 기술인 침입탐지시스템의 동향을 알아보고 침입탐지시스템에 활용된 인공지능 기술을 분석한다. 구체적으로 침입탐지를 위한 인공지능 기술 적용을 위해 필요한 데이터 수집 및 분석, 인공지능 모델, 인공지능 모델 성능평가를 위한 기법을 설명한다.

사이버전 훈련을 위한 ATT&CK 기반 모의 위협 발생기 설계 및 구현 (The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training)

  • 홍수연;김광수;김태규
    • 한국군사과학기술학회지
    • /
    • 제22권6호
    • /
    • pp.797-805
    • /
    • 2019
  • Threats targeting cyberspace are becoming more intelligent and increasing day by day. To cope with such cyber threats, it is essential to improve the coping ability of system security officers. In this paper, we propose a simulated threat generator that automatically generates cyber threats for cyber defense training. The proposed Simulated Threat Generator is designed with MITRE ATT & CK(Adversarial Tactics, Techniques and Common Knowledge) framework to easily add an evolving cyber threat and select the next threat based on the threat execution result.

Future Trends of AI-Based Smart Systems and Services: Challenges, Opportunities, and Solutions

  • Lee, Daewon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제15권4호
    • /
    • pp.717-723
    • /
    • 2019
  • Smart systems and services aim to facilitate growing urban populations and their prospects of virtual-real social behaviors, gig economies, factory automation, knowledge-based workforce, integrated societies, modern living, among many more. To satisfy these objectives, smart systems and services must comprises of a complex set of features such as security, ease of use and user friendliness, manageability, scalability, adaptivity, intelligent behavior, and personalization. Recently, artificial intelligence (AI) is realized as a data-driven technology to provide an efficient knowledge representation, semantic modeling, and can support a cognitive behavior aspect of the system. In this paper, an integration of AI with the smart systems and services is presented to mitigate the existing challenges. Several novel researches work in terms of frameworks, architectures, paradigms, and algorithms are discussed to provide possible solutions against the existing challenges in the AI-based smart systems and services. Such novel research works involve efficient shape image retrieval, speech signal processing, dynamic thermal rating, advanced persistent threat tactics, user authentication, and so on.