• Title/Summary/Keyword: Security limits

Search Result 162, Processing Time 0.03 seconds

Remote Reading of Surgical Monitor's Physiological Readings: An Image Processing Approach

  • Weerathunga, Haritha;Vidanage, Kaneeka
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.308-314
    • /
    • 2022
  • As a result of the global effect of infectious diseases like COVID-19, remote patient monitoring has become a vital need. Surgical ICU monitors are attached around the clock for patients in critical care. Most ICU monitor systems, on the other hand, lack an output port for transferring data to an auxiliary device for post-processing. Similarly, strapping a slew of wearables to a patient for remote monitoring creates a great deal of discomfort and limits the patient's mobility. Hence, an unique remote monitoring technique for the ICU monitor's physiologically vital readings has been presented, recognizing this need as a research gap. This mechanism has been put to the test in a variety of modes, yielding an overall accuracy of close to 90%.

Security Architecture Proposal for Threat Response of insider in SOA-based ESB Environment (SOA 기반 ESB 환경에서 내부 종단 사용자 위협 대응을 위한 보안 아키텍처 제안)

  • Oh, Shi-hwa;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.55-63
    • /
    • 2016
  • SOA(service oriented architecture) based ESB(enterprise service bus) model is widely adopted in many companies for the safe processing of enormous data and the integration of business system. The existing web service technologies for the construction of SOA, however, show unsatisfactory in practical applications though the standardization of web service security technologies is in progress due to their limitations in safe exchange of data. Internal end users using a large business system based on such environment are composed of the variety of organizations and roles. Companies might receive more serious damage from insider threat than that from external one when internal end users get unauthorized information beyond the limits of their authority for private profit and bad purposes. In this paper, we propose a security architecture capable of identifying and coping with the security threats of web service technologies arouse from internal end users.

Development Research of An Efficient Malware Classification System Using Hybrid Features And Machine Learning (하이브리드 특징 및 기계학습을 활용한 효율적인 악성코드 분류 시스템 개발 연구)

  • Yu, Jung-Been;Oh, Sang-Jin;Park, Leo-Hyun;Kwon, Tae-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1161-1167
    • /
    • 2018
  • In order to cope with dramatically increasing malware variant, malware classification research is getting diversified. Recent research tend to grasp individual limits of existing malware analysis technology (static/dynamic), and to change each method into "hybrid analysis", which is to mix different methods into one. Futhermore, it is applying machine learning to identify malware variant more accurately, which are difficult to classify. However, accuracy and scalability of trade-off problems that occur when using all kinds of methods are not yet to be solved, and it is still an important issue in the field of malware research. Therefore, to supplement and to solve the problems of the original malware classification research, we are focusing on developing a new malware classification system in this research.

A Change of Private Security Labor Market and Countermeasures by Population Aging (인구고령화에 따른 민간경비 노동시장 변화와 대응방안)

  • Park, Su Hyeon;Bae, Du Yeol
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.11-18
    • /
    • 2015
  • Our country is a nation accomplished the economic growth and democracy at the same time on the bases of human capitals. However, the laborers as human capitals are aging as well due to the population aging. These aging phenomena are impacting on our country's economy, society, and through the culture. It seems to increase the proportion of the elderly in the labor market of private security caused by continuously increasing the number of elderly employees in long-term trend and their preferences for the security services. These changes of labor market trend may result various problems including relevant laws and systems, the changes of laborers' ability, increase of crimes and so on. To prevent such potential problems, firstly the limits of maximum working hours of elderly private guards have to be set up, and the rest times for them must be secured. Furthermore, the declines of elderly laborers' abilities have to be reduced through the systematic educations relevant to their jobs to cover the rapidly declining elderly laborers' physical abilities. Lastly, the increase of crimes should be reduced through the education contents to be able to arouse their attentions by extending the time of job training and informing of criminal cases.

Spear-phishing Mail Filtering Security Analysis : Focusing on Corporate Mail Hosting Services (스피어피싱 메일 필터링 보안 기능 분석 : 기업메일 호스팅 서비스 중심으로)

  • Shin, Dongcheon;Yum, Dayun
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.61-69
    • /
    • 2020
  • Since spear-phishing mail attacks focus on a particular target persistently to collect and take advantage of information, it can incur severe damage to the target as a part of the intelligent and new attacks such as APT attacks and social engineering attacks. The usual spam filtering services can have limits in countering spear-phishing mail attacks because of different targets, goals, and methods. In this paper, we analyze mail security services of several enterprises hosted by midium and small-sized enterprises with relatively security vulnerabilities in order to see whether their services can effectively respond spear-phishing mail attacks. According to the analysis result, we can say that most of mail security hosting services lack in responding spear-phishing mail attacks by providing functions for mainly managing mails including spam mail. The analysis result can be used as basic data to extract the effective and systematic countermeasure.

Security Cost Analysis with Linear Ramp Model using Contingency Constrained Optimal Power Flow

  • Lyu, Jae-kun;Kim, Mun-Kyeom;Park, Jong-Keun
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.3
    • /
    • pp.353-359
    • /
    • 2009
  • This paper proposes a novel technique for calculating the security costs that properly includes ramping constraints in the operation of a deregulated power system. The ramping process is modeled by a piecewise linear function with certain assumptions. During this process, a ramping cost is incurred if the permissible limits are exceeded. The optimal production costs of the power producers are calculated with the ramping cost included, considering a time horizon with N-1 contingency cases using contingency constrained optimal power flow (CCOPF), which is solved by the primal-dual interior point method (PDIPM). A contingency analysis is also performed taking into account the severity index of transmission line outages and its sensitivity analysis. The results from an illustrative case study based on the IEEE 30-bus system are analyzed. One attractive feature of the proposed approach is that an optimal solution is more realistic than the conventional approach because it satisfies physical constraints, such as the ramping constraint.

Airport Security Process Improving for Advanced Operation and Smart Airport Framework Design (공항 운영 효율성 향상을 위한 보안검색 프로세스 개선 및 스마트 공항 프레임워크 설계)

  • Lee, Jaewhan;Im, Hyeonu;Sohn, Seichang;Ko, Seungyoon;Hong, Ki-Sung;Choi, Sanggyun;Seo, Sangwon;Lee, Chulung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.2
    • /
    • pp.129-134
    • /
    • 2013
  • The airport processes are restricted by some limits of performance objects as size of airport, ability of human resources, capacity of facilities and operational rules. These limitations make passenger handling difficult when passenger numbers increase. In order to solve this problem, we modeled the airport process and analyzed departure passenger arrival, scheduled security manpower under specific customer service level maintenance with mixed integer programming and validate the efficiency with simulation with adapting smart airport framework. We concluded that the airport management with information techniques can reduce waiting time within security and immigration process.

Study On Integrating Internet and Intranet based on IPSec and IMA Technology (IPSec과 IMA를 이용한 인터넷과 내부 망 통합에 관한 연구)

  • Cho, Yong-Gun
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.71-78
    • /
    • 2008
  • This research is on the study of integrating internet and intranet that was built for their own enterprise into one network system that promises a more economic and secure use. Compared to this system, the traditional network conversion device not only has its mechanical limits, but also requires a separate network set up. This raises both interoperability and security problems and results in a higher cost. Therefore, I propose dual defence system based on the inverse multiplexing of ATM Forum and IPSec to improve network ability and deliver enhanced system reliability while reducing cost. Furthermore, I also addressed some of the weaknesses of the Scanning Attacking Method, SNMP and Spooler Port and proposed counter measures that will deal with these weakness at the dual defence system.

  • PDF

Windows Program Package Development for Optimal Pourer Flour Analysis (최적전력조류 해석을 위한 원도우프로그램 팩키지 개발)

  • Kim, Gyu-Ho;Lee, Sang-Bong;Lee, Jae-Gyu;Yu, Seok-Gu
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.50 no.12
    • /
    • pp.584-590
    • /
    • 2001
  • This paper presents a windows program package for solving security constrained OPF in interconnected Power systems, which is based on the combined application of evolutionary programming(EP) and sequential quadratic programming(SQP). The objective functions are the minimization of generation fuel costs and system power losses. The control variables are the active power of the generating units, the voltage magnitude of the generator, transformer tap settings and SYC setting. The state variables are the bus voltage magnitude, the reactive power of the generating unit, line flows and the tie line flow In OPF considering security, the outages are selected by contingency ranking method. The resulting optimal operating point has to be feasible after outages such as any single line outage(respect of voltage magnitude, reactive power generation and power flow limits). The OPF package proposed is applied to IEEE 14 buses and 10 machines 39 buses model system.

  • PDF

A Scientific Consideration of Military Thought (군사사상의 학문적 고찰)

  • Jin, Seok-Yong
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.1-24
    • /
    • 2009
  • This article deals with military thought in general. First I tried to distinguish 'thought' from 'theory', 'philosophy', and 'principle'. Thought means the act of thinking about or considering something, an idea or opinion, or a set of ideas about a particular subject, e.g. military affairs in the present discussion. Theory means a formal statement of the rules on which a subject of study is based or of ideas which are suggested to explain a fact or event or, more generally, an opinion or explanation. Philosophy means the use of reason in understanding such things as the nature of reality and existence, the use and limits of knowledge. Principle means a basic idea or rule that explains or controls how something happens or works. Chapter 3 summarized the characteristics of military thoughts into five points', (i) it is closely related with concrete experiences of a nation; (ii) it includes philosophical and logical arguments; (iii) it relies heavily on the political thought of a nation; (iv) it includes necessarily value-judgments; (v) it contains visions of a nation which are not only descriptions or explanations of military affairs, but also evaluations and advocacies. Chapter 4 considers the relation of international political thoughts to military thought. Throughout the history of the modem states system there have been three competing traditions of thought: the Hobbesian or realist tradition, which views international politics as a state of war; the Kantian or universalist tradition, which sees at work in international politics a potential community of mankind; and the Grotian or internationalist tradition, which views international politics as taking place within an international society. Chapter 5 considers the law of war, which is a body of law concerning acceptable justifications to engage in war (jus ad bellum) and the limits to acceptable wartime conduct (jus in bello). Among other issues, modem laws of war address declarations of war, acceptance of surrender and the treatment of prisoners of war, military necessity along with distinction and proportionality, and the prohibition of certain weapons that may cause unnecessary suffering.

  • PDF