• 제목/요약/키워드: Situational awareness

Search Result 164, Processing Time 0.036 seconds

State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis

  • Kookjin Kim;Jaepil Youn;Hansung Kim;Dongil Shin;Dongkyoo Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1273-1300
    • /
    • 2024
  • In the complex virtual environment of cyberspace, comprised of digital and communication networks, ensuring the security of information is being recognized as an ongoing challenge. The importance of 'Cyber Situation Awareness (CSA)' is being emphasized in response to this. CSA is understood as a vital capability to identify, understand, and respond to various cyber threats and is positioned at the heart of cyber security strategies from a defensive perspective. Critical industries such as finance, healthcare, manufacturing, telecommunications, transportation, and energy can be subjected to not just economic and societal losses from cyber threats but, in severe cases, national losses. Consequently, the importance of CSA is being accentuated and research activities are being vigorously undertaken. A systematic five-step approach to CSA is introduced against this backdrop, and a deep analysis of recent research trends, techniques, challenges, and future directions since 2019 is provided. The approach encompasses current situation and identification awareness, the impact of attacks and vulnerability assessment, the evolution of situations and tracking of actor behaviors, root cause and forensic analysis, and future scenarios and threat predictions. Through this survey, readers will be deepened in their understanding of the fundamental importance and practical applications of CSA, and their insights into research and applications in this field will be enhanced. This survey is expected to serve as a useful guide and reference for researchers and experts particularly interested in CSA research and applications.

The design and implementation of a cockpit display with ADS-B (ADS-B가 적용된 조종석 디스플레이 기능 구현)

  • Hong, Gyo-Young;Kim, Young-In;Ahn, Dong-Man
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.18 no.2
    • /
    • pp.9-15
    • /
    • 2010
  • ADS-B(Automatic Dependent Surveillance-Broadcast) has been recognized as a key component of Surveillance and ATM in CNS/ATM System. In addition to providing surveillance for air traffic control(ATC), ADS-B also supports airborne applications such as enhanced traffic situational awareness through the display of other aircraft to pilots and flight crew. It provides the real-time and same air traffic information to pilots in the aircraft cockpit, air traffic controllers in tower and surface vehicles on the ground at the same time. Aircraft Cockpit Display Unit will display the given information precisely and accurately. This paper describes progress in the development of a Cockpit Display with ADS-B data that enable pilots to acquire, verify and maintain pre-defined spacing intervals from other aircraft for general aviation and small regional aircraft. The designed display provides analogous information in the form of traffic position, range, and ground speed, etc.

Shadow Removal Based on Chromaticity and Entropy for Efficient Moving Object Tracking (효과적인 이동물체 추적을 위한 색도 영상과 엔트로피 기반의 그림자 제거)

  • Park, Ki-Hong
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.4
    • /
    • pp.387-392
    • /
    • 2014
  • Recently, various research for intelligent video surveillance system have been proposed, but the existing monitoring systems are inefficient because all of situational awareness is judged by the human. In this paper, shadow removal based moving object tracking method is proposed using the chromaticity and entropy image. The background subtraction model, effective in the context awareness environment, has been applied for moving object detection. After detecting the region of moving object, the shadow candidate region has been estimated and removed by RGB based chromaticity and minimum cross entropy images. For the validity of the proposed method, the highway video is used to experiment. Some experiments are conducted so as to verify the proposed method, and as a result, shadow removal and moving object tracking are well performed.

Development of a method for securing the operator's situation awareness from manipulation attacks on NPP process data

  • Lee, Chanyoung;Song, Jae Gu;Lee, Cheol Kwon;Seong, Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.54 no.6
    • /
    • pp.2011-2022
    • /
    • 2022
  • According to the defense-in-depth concept, not only a preventive strategy but also an integrated cyberattack response strategy for NPPs should be established. However, there are limitations in terms of responding to penetrations, and the existing EOPs are insufficient for responding to intentional disruptions. In this study, we focus on manipulative attacks on process data. Based on an analysis of the related attack vectors and possible attack scenarios, we adopt the Kalman filter to detect process anomalies that can be caused by manipulations of process data. To compensate for these manipulations and secure MCR operators' situational awareness, we modify the Kalman filter such that it can filter out the effects of the manipulations adaptively. A case study was conducted using a hardware-in-the-loop system. The results indicated that the developed method can be used to verify whether the displayed safety-related state data are reliable and to implement the required safety response actions.

Abusive Supervision: Domestic Research Trends and Future Research Directions: Focusing on Antecedents and Outcome Variables (비인격적 감독의 국내 연구 동향과 향후 방향성: 선행요인과 결과변수를 중심으로)

  • Bae, Il-Han;Park, Ji-Sung
    • Asia-Pacific Journal of Business
    • /
    • v.12 no.3
    • /
    • pp.295-328
    • /
    • 2021
  • Purpose - This study reviewed domestic empirical studies on abusive supervision published from 2009 to 2020 and summarized the accumulated results. In particular, this study classified previous studies on abusive supervision as antecedents (supervisor characteristics, subordinate characteristics, and contextual factors) and outcome variables (cognition/awareness, affection/emotion, attitude, behavior, and others). Based on the results, this study suggested potential issues of previous studies and future directions for abusive supervision. In addition, this study proposed the academic and practical implications and limitations. Design/methodology/approach - The domestic studies on abusive supervision can be divided into antecedents and outcome variables, and each study was organized into the characteristics of the supervisor, subordinate, and situational characteristics, and the resultant variables were divided into cognition/awareness, affection/emotion, attitude, behavior, and others. Finding - Prior studies on abusive supervision had several limitations in obtaining clear results with individual characteristics or fragmented approaches at the organizational level. In the future, more comprehensive approaches will be needed. Research implications or Originality - This study will provide academic and practical implications for future research on abusive supervision by deepening an understanding of the negative consequences of abusive supervision.

Design of Image Distortion Restoration Algorithm (영상왜곡 보정 알고리즘 설계)

  • Kim, Byung Hwan;Choi, Yong Gyu
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.4
    • /
    • pp.317-321
    • /
    • 2013
  • Due to growth of electronics and control devices, automation and situational awareness systems have been applied by automobile. Vision systems with the introduction of unmanned system were being actively developed. In this paper, the distortion in the 7-inch LCD screen for the treatment process are divided into Online and Offline processing. Offline processing based on the image signal processing and for generating LUT Online to Offline generated by processing the distortion is applied to the LUT. LUT is applied to distort the image processing in real time, so that distortion correction is made for the purpose of setting.

A Study on the Conceptual Bridge Design based on the Ergonomic Background (인간공학적 선교설계에 관한 기초연구)

  • 하원재;나송진;김상수;이형기;정재용
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.8 no.1
    • /
    • pp.53-59
    • /
    • 2002
  • A correctly designed bridge offers improved operational safety in terms of increased vigilance, flexibility of operation, precision of control and operator's situational awareness. According1y to design human centered bridge, the consideration shall be given to the man-machine interface, location and interrelation of workstation, configuration of console, windows. field of vision and bridge working environment. The state-of-the-art suits for one-man operation by integration of conning information and central information presentation. Further, it is desirable to enable two man ship operation for emergency operations, training purposes and redundancy. In this point of view, this thesis would like to design a conceptual bridge.

  • PDF

Method of Format Conversion Between Link-K and KMTF Messages (Link-K와 KMTF 메시지 간 포맷 변환 방법)

  • Kim, Wan-Sik;Lee, Min-Sik;Kim, Sang-Jun;Park, Ji-Hyeon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.264-271
    • /
    • 2017
  • Link-K message is the Tactical Data Link message standard developed by the Agency for Defense Development which is optimized for the Joint Operation of ROK Armed Force. KMTF message is the standard message format of Battle Management Information System. Interconversion and propagation between these messages are definitely needed to have efficient warfare such as situation data propagation using network, the convergence of collected situation data, common situational awareness, cooperative engagement. Therefore, this study suggests a way of rule and process for format conversion between Link-K and KMTF messages.

Standalone Maritime Aids-To-Navigation AIS Mobile Station

  • Lee, Chee-Cheong;Park, Soo-Hong
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.3
    • /
    • pp.297-303
    • /
    • 2009
  • Automatic Identification System (AIS) is a VHF radio broadcasting system where transmits packets of data via VHF data link. It enables vessels and coastal-based station that equipped with AIS equipment to send and receive useful information. This information can be help in situational awareness and provide a means to assist in collision avoidance. In addition, AIS can be use as Aid-To-Navigation, by providing the location and additional information on buoys and lights. Besides, it can also contain details information in meteorological status of a particular ship location. This paper presents the standalone AIS system that able to receive and report own ship location, meteorological data collection and broadcast safety related information if necessary. With the unique ship's MMSI number, all the information of that particular ship can be monitor by using AIS program written in C++ programming language.

A Study on the Implementation of the Independent Tactical Data Link System for ROK Army (한국형 육군 전술데이터 링크체계 구현 방향 연구)

  • Jung Jae-Hyun;Kwon Tae-Hwan
    • Journal of the military operations research society of Korea
    • /
    • v.30 no.2
    • /
    • pp.32-49
    • /
    • 2004
  • The Tactical Data Link System is a standardized communication link to exchange and interface positional, situational information, command and control in real time. It has been evaluated that this Link would play an important role for tactical interoperability, situation awareness, and execution of joint operations in the future war. But considering the rapidly changing war situations, even though being admitted the necessity of the Tactical Data Link System of Army helicopter, one of superpowers in the Army, substantially we don't still have any concrete concept to build it. Therefore, this work presents how to embody the Tactical Data Link System through computer-aided system engineering on the base of Tactical Data Link System operating concept analysis of helicopters-ground units.