• Title/Summary/Keyword: Sensitive data

Search Result 2,507, Processing Time 0.025 seconds

Enhancing the Cybersecurity Checklist for Mobile Applications in DTx based on MITRE ATT&CK for Ensuring Privacy

  • Gee-hee Yun;Kyoung-jin Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.15-24
    • /
    • 2023
  • Digital therapeutics (DTx) are utilized to replace or supplement drug therapy to treat patients. DTx are developed as a mobile application for portability and convenience. The government requires security verification to be performed on digital medical devices that manage sensitive information during the transmission and storage of patient data. Although safety verification is included in the approval process for DTx, the cybersecurity checklist used as a reference does not reflect the characteristics of mobile applications. This poses the risk of potentially overlooking vulnerabilities during security verification. This study aims to address this issue by comparing and analyzing existing items based on the mobile tactics, techniques, and procedures of MITRE ATT&CK, which manages globally known and occurring vulnerabilities through regular updates. We identify 16 items that require improvement and expand the checklist to 29 items to propose improvement measures. The findings of this study may contribute to the safe development and advancement of DTx for managing sensitive patient information.

An Improved Automated Spectral Clustering Algorithm

  • Xiaodan Lv
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.185-199
    • /
    • 2024
  • In this paper, an improved automated spectral clustering (IASC) algorithm is proposed to address the limitations of the traditional spectral clustering (TSC) algorithm, particularly its inability to automatically determine the number of clusters. Firstly, a cluster number evaluation factor based on the optimal clustering principle is proposed. By iterating through different k values, the value corresponding to the largest evaluation factor was selected as the first-rank number of clusters. Secondly, the IASC algorithm adopts a density-sensitive distance to measure the similarity between the sample points. This rendered a high similarity to the data distributed in the same high-density area. Thirdly, to improve clustering accuracy, the IASC algorithm uses the cosine angle classification method instead of K-means to classify the eigenvectors. Six algorithms-K-means, fuzzy C-means, TSC, EIGENGAP, DBSCAN, and density peak-were compared with the proposed algorithm on six datasets. The results show that the IASC algorithm not only automatically determines the number of clusters but also obtains better clustering accuracy on both synthetic and UCI datasets.

Development of Energy-sensitive Cluster Formation and Cluster Head Selection Technique for Large and Randomly Deployed WSNs

  • Sagun Subedi;Sang Il Lee
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.1
    • /
    • pp.1-6
    • /
    • 2024
  • Energy efficiency in wireless sensor networks (WSNs) is a critical issue because batteries are used for operation and communication. In terms of scalability, energy efficiency, data integration, and resilience, WSN-cluster-based routing algorithms often outperform routing algorithms without clustering. Low-energy adaptive clustering hierarchy (LEACH) is a cluster-based routing protocol with a high transmission efficiency to the base station. In this paper, we propose an energy consumption model for LEACH and compare it with the existing LEACH, advanced LEACH (ALEACH), and power-efficient gathering in sensor information systems (PEGASIS) algorithms in terms of network lifetime. The energy consumption model comprises energy-sensitive cluster formation and a cluster head selection technique. The setup and steady-state phases of the proposed model are discussed based on the cluster head selection. The simulation results demonstrated that a low-energy-consumption network was introduced, modeled, and validated for LEACH.

Regulation of Insulin-Sensitive Cyclic Nucleotide Phosphodiesterase in Adipocytes of Streptozotocin-Induced Diabetic Rats (Streptozotocin으로 당뇨병을 유발시킨 흰쥐의 지방세포에서 일어나는 Insulin-Sensitive Phosphodiesterase의 조절에 관한 연구)

  • Park, Kyung-Sun;Lee, Myung-Soon;Kim, Kyung-Hwan
    • The Korean Journal of Pharmacology
    • /
    • v.29 no.2
    • /
    • pp.253-261
    • /
    • 1993
  • Possible changes in the role of insulin-sensitive cyclic nucleotide phosphodiesterase(PDE) in mediating the antilipolytic action of insulin were investigated in adipocytes from streptozotocin-induced diabetic rats. Isolated adipocytes prepared from epididymal adipose tissue were incubated, with or without insulin, at $37^{\circ}C$ for 15 min following pretreatment with various drugs or toxins, and three (plasma membranes, microsomal membranes, and cytosol) fractions prepared by differential centrifugation were then assayed for cAMP phosphodiesterase activity. The PDE activities only in the crude microsomal (P2) fractions were activated by insulin both in diabetic and control rats. The basal PDE activities in P2 fractions of adipocytes from diabetic rats were higher than those from control rats, although the maximal effects observed at 2 nM of insulin, $100\;{\mu}M$ of isoproterenol or the combination of both were not significantly different from each other. The insulin-stimulated PDE activities in P2 fractions of adipocytes from diabetic rats were not changed by PIA, a $A_{1}$ adenosine receptor agonist, whereas they were decreased to the basal PDE activities in those from control rats. In addition, the adipocytes from diabetic rats showed an increased sensitivity to pertussis toxin compared to those from controls. There were no differences between diabetic and control rats in the sensitivity of adipocytes to cholera toxin. These data indicate that the impaired signalling through inhibitory receptors such as adenosine receptors in adipocytes from streptozotocin-induced diabetes relates to the loss or the decreased function of $G_i$ proteins, and leads to the increased activity of the insulin-dependent PDE at the basal states.

  • PDF

A Medium Access Control Protocol for Voice/Data Integrated Wireless CDMA Systems

  • Lim, In-Taek
    • ETRI Journal
    • /
    • v.23 no.2
    • /
    • pp.52-60
    • /
    • 2001
  • In this paper, a medium access control protocol is proposed for integrated voice and data services in wireless local networks. Uplink channels for the proposed protocol are composed of time slots with multiple spreading codes per slot based on slotted code division multiple access (CDMA) systems. The proposed protocol uses spreading code sensing and reservation schemes. This protocol gives higher access priority to delay-sensitive voice traffic than to data traffic. The voice terminal reserves an available spreading code to transmit multiple voice packets during a talkspurt. On the other hand, the data terminal transmits a packet without making a reservation over one of the available spreading codes that are not used by voice terminals. In this protocol, voice packets do not come into collision with data packets. The numerical results show that this protocol can increase the system capacity for voice service by applying the reservation scheme. The performance for data traffic will decrease in the case of high voice traffic load because of its low access priority. But it shows that the data traffic performance can be increased in proportion to the number of spreading codes.

  • PDF

Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption

  • Babamir, Faezeh Sadat;Eslami, Ziba
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2940-2955
    • /
    • 2012
  • In this paper, we propose aggregate signcryption for achieving data security in UWSNs. The main challenge of these networks established in sensitive environments is offline sink visiting. Moreover, the sensors must retain collected data for long enough time to offload them onto the itinerant sink. Thus, the unattended nature of data collection intervals might offer the adversary the opportunity to apply various attacks without detection. In this paper, employing low order operations (in time and space), we propose a new secure scheme in which various security goals such as confidentiality (through encrypting), authentication and integrity (through signing) are achieved. In addition, the aggregation process of our scheme reduces the space and communication overheads both for sensors and sink, i.e. the proposed technique efficiently enables the sensors and sink to protect, verify and recover all the related data. We further compare our scheme with the best alternative work in the literature.

Variable Arrangement for Data Visualization

  • Huh, Moon Yul;Song, Kwang Ryeol
    • Communications for Statistical Applications and Methods
    • /
    • v.8 no.3
    • /
    • pp.643-650
    • /
    • 2001
  • Some classical plots like scatterplot matrices and parallel coordinates are valuable tools for data visualization. These tools are extensively used in the modern data mining softwares to explore the inherent data structure, and hence to visually classify or cluster the database into appropriate groups. However, the interpretation of these plots are very sensitive to the arrangement of variables. In this work, we introduce two methods to arrange the variables for data visualization. First method is based on the work of Wegman (1999), and this is to arrange the variables using minimum distance among all the pairwise permutation of the variables. Second method is using the idea of principal components. We Investigate the effectiveness of these methods with parallel coordinates using real data sets, and show that each of the two proposed methods has its own strength from different aspects respectively.

  • PDF

A channel assignment scheme considering traffic characteristics in the CDMA cellular system (트래픽 특성을 고려한 CDMA 셀룰러 시스템에서의 채널 할당 방법)

  • 권수근;조무호;전형구;안지환;조경록
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.11
    • /
    • pp.2817-2827
    • /
    • 1996
  • In this paper, we propose a new channel assignment scheme considering traffic characteristics in the CDMA cellular system. The object of proposed method is to reduce the hard handoff of data calls which are very sensitive to transmission errors. In this algorithm, we use three channel assignment policies. First, all of the data calls are assigned to the primary CDMA channel if possible. Second, priority for primary CDMA channel is given to data calls by assigning some primary CDMA traffic channels exclusively for data calls. Third, data calls are assigned to the CDMA channel most served by neighbor cells, when all of the primary CDMA traffic channels are used. A performance analysis shows the minimum soft handoff probability of data calls in handoff which is guarantied any cellconfiguration is increased above 40% by the adopting proposed algorithm.

  • PDF

Classification of Class-Imbalanced Data: Effect of Over-sampling and Under-sampling of Training Data (계급불균형자료의 분류: 훈련표본 구성방법에 따른 효과)

  • 김지현;정종빈
    • The Korean Journal of Applied Statistics
    • /
    • v.17 no.3
    • /
    • pp.445-457
    • /
    • 2004
  • Given class-imbalanced data in two-class classification problem, we often do over-sampling and/or under-sampling of training data to make it balanced. We investigate the validity of such practice. Also we study the effect of such sampling practice on boosting of classification trees. Through experiments on twelve real datasets it is observed that keeping the natural distribution of training data is the best way if you plan to apply boosting methods to class-imbalanced data.

Real Time Tilt Servo Control of The Holographic Data Storage System (홀로그래픽 정보 저장 장치에서의 실시간 틸트 서보 제어)

  • Moon, Jae-Hee;Kim, Sang-Hoon;Yang, Jun-Ho;Yang, Hyun-Seok;Park, No-Cheol
    • Transactions of the Society of Information Storage Systems
    • /
    • v.3 no.1
    • /
    • pp.13-16
    • /
    • 2007
  • The purpose of this paper is real time tilt servo control of the holographic data storage system. Holographic data storage device is a next generation data storage device with high storage density, high transfer rate and short access time. This device is very sensitive to a disturbance due to the enormous storage density. As to the recording material changed disc type, the media continuously vibrates as the disc rotates. When disc rotates, deviation, eccentricity and unbalance disturbance are occurred. This disturbances cause disc tilt, finally reference beam does not illuminates to correct incidence angle. Therefore real time tilt servo control is essential. In this paper, the algorithm is proposed to make real time tilt detection in angle multiplexing of the holographic data storage system with an additional servo beam and the experiments are performed.

  • PDF