• 제목/요약/키워드: Steal

검색결과 135건 처리시간 0.025초

피싱 공격에 대한 사용자 정보보호 방안 (Technique of Information Security for Users against Phishing Attacks)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 추계종합학술대회 B
    • /
    • pp.736-739
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attacks. To this end, AntiPhish tracks the sensitive information of a user and generates warnings whenever the user attempts to give away this information to a web site today requires only the server to be hat is considered untrusted.

  • PDF

철강산업에서 전력계통 고조파 해석 (Harmonic analysis of the steel & iron industry power system)

  • 오동환;이강완
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2001년도 추계학술대회 논문집 전력기술부문
    • /
    • pp.20-25
    • /
    • 2001
  • 본 논문은 대용량 전력을 사용하는 철강산업 전력계통에서 고조파 전압과 전류 등을 현장 실측하여 고조파 발생 설비를 모의하여 고조파를 해석한 실계통 적용 연구 사례로 전력계통 전반에 나타나는 고조파 전압과 전류 분포를 분석하고 고조파 억제용으로 설치되어있는 고조파필터용 콘덴서의 공진 가능성 등을 검토한 것이다.

  • PDF

실측치에 의한 전기아크로 고조파 해석 모델 개발 (Development of Electric Arc Furnace Model for Harmonic Analysis Using Measuring Data)

  • 오동환;장길수;이강완
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2001년도 하계학술대회 논문집 A
    • /
    • pp.298-301
    • /
    • 2001
  • This paper describes development of electric are furnace model for harmonic analysis, which is based on field data. The proposed model is used to analyze harmonics in actual power system, and the results illustrate the model's capabilities.

  • PDF

효과적인 후판의 제품번호 검출 방법 (An Effective Method of Product Number Detection from Thick Plates)

  • 박상현
    • 한국전자통신학회논문지
    • /
    • 제10권1호
    • /
    • pp.139-148
    • /
    • 2015
  • 본 논문에서는 여러 장의 후판이 포함된 영상에서 제품번호 문자열을 추출하고 문자를 분리하는 알고리즘을 제안한다. 일반적으로 후판 영상은 여러 개의 후판을 포함하고 있다. 후판의 제품번호를 추출하기 위해서는 먼저 개별 후판을 분리하여야 하며, 이를 위해 후판의 직선 에지를 검출하고 군집화를 수행한다. 다음으로 분리된 개별 후판을 대상으로 배경 정보를 제거하여 후판의 제품번호 문자열을 검출한다. 후판의 배경은 철판의 어두운 부분과 제품번호를 출력하기 위한 흰색 페인트 부분으로 구성되며, 제안하는 방법에서는 두 부분을 구분하여 두 단계로 배경을 제거한다. 배경을 제거한 영상에 대해서 후판의 제품번호 문자열의 특성을 고려하여 개별 문자열을 추출한다. 다양한 후판 영상에 대해서 실험을 수행한 결과는 제안하는 알고리즘이 전체 영상에서 각각의 후판을 효과적으로 검출하고 개별 후판 영상에서 제품번호를 정확하게 추출함을 보여준다.

전자우편을 이용한 악성코드 유포방법 분석 및 탐지에 관한 연구 (A Study on the Analysis and Detection Method for Protecting Malware Spreading via E-mail)

  • 양경철;이수연;박원형;박광철;임종인
    • 정보보호학회논문지
    • /
    • 제19권1호
    • /
    • pp.93-101
    • /
    • 2009
  • 본 논문은 해커가 정보절취 등을 목적으로 전자우편에 악성코드를 삽입 유포하는 공격 대응방안에 관한 연구로, 악성코드가 삽입된 전자우편은 정보유출 시(時) 트래픽을 암호화(Encoding)하는데 이를 복호화(Decoding) 하는 '분석모델'을 구현 및 제안한다. 또한 보안관제측면(네트워크)에서 해킹메일 감염시(時) 감염PC를 신속하게 탐지할 수 있는 '탐지기술 제작 방법론'을 연구하여 탐지규칙을 제작, 시뮬레이션 한 결과 효율적인 탐지성과를 보였다. 악성코드 첨부형 전자우편에 대한 대응책으로 공공기관이나 기업의 정보보안 담당자 PC사용자가 각자의 전산망 환경에 맞게 적용 가능한 보안정책을 제안함으로써 해킹메일 피해를 최소화하는데 도움이 되고자 한다.

Image Encryption Using Phase-Based Virtual Image and Interferometer

  • Seo, Dong-Hoan;Kim, Soo-Joong
    • Journal of the Optical Society of Korea
    • /
    • 제6권4호
    • /
    • pp.156-160
    • /
    • 2002
  • In this paper, we propose an improved optical security system using three phase-encoded images and the principle of interference. This optical system based on a Mach-Zehnder interferometer consists of one phase-encoded virtual image to be encrypted and two phase-encoded images, en-crypting image and decrypting image, where every pixel in the three images has a phase value of '0'and'$\pi$'. The proposed encryption is performed by the multiplication of an encrypting image and a phase-encoded virtual image which dose not contain any information from the decrypted im-age. Therefore, even if the unauthorized users steal and analyze the encrypted image, they cannot reconstruct the required image. This virtual image protects the original image from counterfeiting and unauthorized access. The decryption of the original image is simply performed by interfering between a reference wave and a direct pixel-to-pixel mapping image of the en crypted image with a decrypting image. Computer simulations confirmed the effectiveness of the proposed optical technique for optical security applications.

Hemodynamics of a Connecting conduit Between the Left Ventricle and the Left Decending Coronary Artery

  • Shim, Eun-Bo;Sah, Jong-Yub
    • International Journal of Vascular Biomedical Engineering
    • /
    • 제1권2호
    • /
    • pp.20-29
    • /
    • 2003
  • A new treatment for coronary artery occlusive disease is being developed in which a shunt or conduit is placed directly connecting the left ventricle with the diseased artery at a point distal to the obstruction. To aid in assessing and optimizing its benefit, a computational model of the cardiovascular system was developed and used to explore various design conditions. Simulation results indicate that in complete LAD occlusion, flow can be returned to approximately 65% of normal if the conduit resistance is equal for forward and reverse flow, increasing to 80% in the limit in which backflow resistance is infinite. Increases in flow rate produced by asymmetric flow resistance are considerably enhanced in the case of a partial LAD obstruction since the primary effect of resistance asymmetry is to prevent leakage back into the ventricle("steal") during diastole. Increased arterial compliance has little effect on net flow with a symmetric shunt, but leads to considerable augmentation when the resistance is asymmetric. These results suggest that an LV-LAD conduit will be beneficial when stenosis resistance(Rst) > 27 PRU if resistance is symmetric.

  • PDF

웹페이지의 피싱 차단 탐지 기술에 대한 분석 (Analyses of Detection and Protection for Phishing on Web page)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 춘계종합학술대회 A
    • /
    • pp.607-610
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, Many Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attack.

  • PDF

무자각 지속인증 기술 동향 (Trends in Implicit Continuous Authentication Technology)

  • 김승현;김수형;진승헌
    • 전자통신동향분석
    • /
    • 제33권1호
    • /
    • pp.57-67
    • /
    • 2018
  • Modern users are intensifying their use of online services every day. In addition, hackers are attempting to execute advanced attacks to steal personal information protected using existing authentication technologies. However, existing authentication methods require an explicit authentication procedure for the user, and do not conduct identity verification in the middle of the authentication session. In this paper, we introduce an implicit continuous authentication technology to overcome the limitations of existing authentication technology. Implicit continuous authentication is a technique for continuously authenticating users without explicit intervention by utilizing their behavioral and environmental information. This can improve the level of security by verifying the user's identity during the authentication session without the burden of an explicit authentication procedure. In addition, we briefly introduce the definition, key features, applicable algorithms, and recent research trends for various authentication technologies that can be used as an implicit continuous authentication technology.

Aluminum 합금재 Frame을 이용한 벽체거푸집공법의 성능평가에 관한 연구 (A Study on the Performance Evaluation of Form Using the Aluminum Alloy Frame Reinforced Panel)

  • 안재철;오상균;강병희
    • 한국건축시공학회지
    • /
    • 제1권1호
    • /
    • pp.135-142
    • /
    • 2001
  • This study is for the investigation of form using the aluminum-compound metal frame(Aluminum frame reinforced panel : AFR panel) which is improved in the capacity in the wall-concrete structure in steal of using the existing form which has problems such as, excessive exposure of cement, the loss of labor when it is constructed or disjointed, and it's economical efficiency compared with that of EURO Form. AFR panel passes the KS F 8006 test, and as a result of field test, it's displacement is satisfied with Specification. And using AFR panel is more economical than that of EURO Form because saving labor cost which plays a major part in cost saving in formwork is more effective in retrenching total cost than increment of material cost.

  • PDF