• Title/Summary/Keyword: Threat Evaluation

Search Result 226, Processing Time 0.024 seconds

Digital Design Process of Marine Leisure Boat Using Human Sensibility Evaluation (해양 레저선박의 디지털 감성 디자인 프로세스)

  • Choi, Chool-Heon;Jang, Phil-Sik;Seo, Moon-Seog
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.4
    • /
    • pp.693-699
    • /
    • 2010
  • Korea has been took the top ranking in the global shipbuilding industry in terms of new orders, order backlogs and the volume of vessels for several years. However, the domestic small- and medium-scale shipbuilders currently face imminent threat from China and new challenge to focus on development of high value-added ships. So far, the marine leisure industry of Korea has been showed weak global competitiveness and there were few attempts to design and develop leisure boats and yachts. We describe the digital design process of leisure boat exterior that could reflect user's sensibilities and feelings of entire forms of the products. This design process contains stepwise sensibility evaluation via web and provides designers with various and fast feedbacks about their design outputs in each design stage.

Development of Security Level Evaluation Tool(ISSPET) Based on Information Security System (정보보호 시스템기반의 보안 수준 평가 도구(ISSPET) 개발)

  • Soh, Woo-Young;Kim, Wan-Kyung;Kim, Seak-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1911-1919
    • /
    • 2009
  • Currently, the evaluation technology for the security systems of risk analysis level measurement is maintained by only the developed countries including U.S and U.K, and the evaluation technology and its infrastructure are insufficient for the evaluation technology of security threat analysis level measurement in Korea. Therefore this paper presents the development of the security control items and the evaluation tool(ISSPET) for the security level performance. It is expected to evaluate the security management level of the current system and its security environment through analyzing the security management level of security systems using ISSPET.

A Case on TMS(Threat Management System) BMT Software Separated Acquisition (위협관리시스템(TMS) 소프트웨어 분리발주 BMT 사례)

  • Sang-Bok Lee;Hang-Sin Kwak;Seok-Kyoo Shin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.496-499
    • /
    • 2008
  • 공공부분 S/W사업은 분리발주가 원칙이고 일괄발주가 예외지만 현재 많은 공공부분 S/W사업은 일괄 발주 사업으로 진행되고 있다. 일괄발주는 SI업체가 S/W업체도 선택하여 입찰 및 개발하기 때문에 발주자가 원하는 품질 좋은 S/W를 선택할 수 없고, 발주자가 S/W를 업그레이드 및 확장할 때 SI업체에 의존하게 되는 단점이 있다. 이런 단점을 보완하고, S/W분리발주를 활성화시키기 위해 지식경제부(구 정보통신부)에서는 S/W분리발주 매뉴얼을 작성하여 보급 및 교육을 하고 있으며, 발주처에서는 품질이 우수한 S/W를 선택하기 위한 S/W분리발주 BMT를 공인된 시험기관인 한국정보통신기술협회(TTA) SW 시험인증센터에서 BMT를 실시하고 있다. 본 논문은 위협관리시스템(TMS) S/W분리발주 BMT를 공인된 국가 시험인증기관인 한국정보통신기술협회(TTA) SW시험인증센터에서 수행한 사례를 기술하였다

Unified Threat Management System Security Evaluation Model (통합보안관리 시스템 보안성 평가모델)

  • Kang, Sang-Won;Jeon, In-Oh;Yang, Hae-Sool
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.578-581
    • /
    • 2009
  • 본 논문에서는 통합보안관리 시스템에 대해서 주요 기능을 분석하고 시장동향을 조사하였으며, 기존의 소프트웨어 품질 평가 기술 및 표준화에 관한 연구를 추진하고, 통합보안관리 시스템의 보안성 품질 평가 모델을 개발하였다. 본 연구를 통하여 도출된 통합보안관리 시스템의 보안성 품질 평가 모델을 통하여 통합보안관리 시스템의 품질을 향상시키는데 중요한 역할을 할 것으로 본다.

  • PDF

The Development of Vulnerable Elements and Assessment of Vulnerability of Maeul-soop Ecosystem in Korea (한국 마을숲 생태계 취약요소 발굴 및 취약성 평가)

  • Lim, Jeong-Cheol;Ryu, Tae-Bok;Ahn, Kyeong-Hwan;Choi, Byoung-Ki
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.34 no.4
    • /
    • pp.57-65
    • /
    • 2016
  • Maeul-soop(Village forest) is a key element of Korean traditional village landscape historically and culturally. However, a number of Maeul-soops have been lost or declined due to various influences since the modern age. For this Maeul-soop that has a variety of conservation values including historical, cultural and ecological ones, attention and efforts for a systematic conservation and restoration of Maeul-soop are needed. The purpose of the present study is to provide information on ecological restoration and sustainable use and management of Maeul-soops based on component plant species, habitat and location characteristics of 499 Maeul-soops spread throughout Korea. Major six categories of threat factors to Maeul-soop ecosystem were identified and the influence of each factor was evaluated. For the evaluation of weight by threat factors for the influence on the vulnerability of Maeul-soop ecosystem, more three-dimensional analysis was conducted using Analytic Hierarchy Process (AHP) analysis method. In the results of evaluation using AHP analysis method, reduction of area, among six categories, was spotted as the biggest threat to existence of Maeul-soops. Next, changes in topography and soil environment were considered as a threat factor of qualitative changes in Maeul-soop ecosystem. Influence of vegetation structure and its qualitative changes on the loss or decline of Masul-soop was evaluated to be lower than that of changes in habitat. Based on weight of each factor, the figures were converted with 100 points being the highest score and the evaluation of vulnerability of Maeul-soop was conducted with the converted figures. In the result of evaluation of vulnerability of Maeul-soops, grade III showed the highest frequency and a normal distribution was formed from low grade to high grade. 38 Maeul-soops were evaluated as grade I which showed high naturality and 10 Maeul-soops were evaluated as grade V as their maintenance was threatened. Also in the results of evaluation of vulnerability of each Maeul-soop, restoration of Maeul-soop's own area was found as top priority to guarantee the sustainability of Maeul-soops. It was confirmed that there was a need to prepare a national level ecological response strategy for each vulnerability factor of Maeul-soop, which was important national ecological resources.

Research on the application of Machine Learning to threat assessment of combat systems

  • Seung-Joon Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.47-55
    • /
    • 2023
  • This paper presents a method for predicting the threat index of combat systems using Gradient Boosting Regressors and Support Vector Regressors among machine learning models. Currently, combat systems are software that emphasizes safety and reliability, so the application of AI technology that is not guaranteed to be reliable is restricted by policy, and as a result, the electrified domestic combat systems are not equipped with AI technology. However, in order to respond to the policy direction of the Ministry of National Defense, which aims to electrify AI, we conducted a study to secure the basic technology required for the application of machine learning in combat systems. After collecting the data required for threat index evaluation, the study determined the prediction accuracy of the trained model by processing and refining the data, selecting the machine learning model, and selecting the optimal hyper-parameters. As a result, the model score for the test data was over 99 points, confirming the applicability of machine learning models to combat systems.

Electric Field Strength and Shielding Effectiveness Comparison According to the Size of Shielding Facility (방호 시설 크기에 따른 전계강도 및 차폐 효과 비교)

  • Kang, Ho-Jae;Huh, Chang-Su;Bang, Jeong-Ju;Choi, Jin-Su;Park, Woo-Chul
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.27 no.4
    • /
    • pp.221-225
    • /
    • 2014
  • In modern times, threat of high power electromagnetic wave is increasing. When the electrical grid and communication network are attacked by these high power electromagnetic wave, the whole infrastructure is paralyzed. To protect the infrastructure from these high power electromagnetic wave threat, the shielding facility that can block high power electromagnetic wave is constructed. Also shielding effectiveness evaluation about the constructed facility is important. But, because of space efficiency and saving of construction cost to construct the actual shielding facility, the shielding room wall is generally adjacent to exterior concrete structures. As space between shielding facility wall and concrete structures is very small, arranging the transmitting antenna exterior shielding facility is realistically difficult. Therefore, in this research, The shielding effectiveness measurement plan in the state of exterior narrow space of HEMP shielding facility is presented. And to apply this plan, The influence of shielding effectiveness according to the size of the shielding facility is analyzed.

An Extended Work Architecture for Online Threat Prediction in Tweeter Dataset

  • Sheoran, Savita Kumari;Yadav, Partibha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.97-106
    • /
    • 2021
  • Social networking platforms have become a smart way for people to interact and meet on internet. It provides a way to keep in touch with friends, families, colleagues, business partners, and many more. Among the various social networking sites, Twitter is one of the fastest-growing sites where users can read the news, share ideas, discuss issues etc. Due to its vast popularity, the accounts of legitimate users are vulnerable to the large number of threats. Spam and Malware are some of the most affecting threats found on Twitter. Therefore, in order to enjoy seamless services it is required to secure Twitter against malicious users by fixing them in advance. Various researches have used many Machine Learning (ML) based approaches to detect spammers on Twitter. This research aims to devise a secure system based on Hybrid Similarity Cosine and Soft Cosine measured in combination with Genetic Algorithm (GA) and Artificial Neural Network (ANN) to secure Twitter network against spammers. The similarity among tweets is determined using Cosine with Soft Cosine which has been applied on the Twitter dataset. GA has been utilized to enhance training with minimum training error by selecting the best suitable features according to the designed fitness function. The tweets have been classified as spammer and non-spammer based on ANN structure along with the voting rule. The True Positive Rate (TPR), False Positive Rate (FPR) and Classification Accuracy are considered as the evaluation parameter to evaluate the performance of system designed in this research. The simulation results reveals that our proposed model outperform the existing state-of-arts.

Proposed RASS Security Assessment Model to Improve Enterprise Security (기업 보안 향상을 위한 RASS 보안 평가 모델 제안)

  • Kim, Ju-won;Kim, Jong-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.635-637
    • /
    • 2021
  • Cybersecurity assessment is the process of assessing the risk level of a system through threat and vulnerability analysis to take appropriate security measures. Accurate security evaluation models are needed to prepare for the recent increase in cyberattacks and the ever-developing intelligent security threats. Therefore, we present a risk assessment model through a matrix-based security assessment model analysis that scores by assigning weights across security equipment, intervals, and vulnerabilities. The factors necessary for cybersecurity evaluation can be simplified and evaluated according to the corporate environment. It is expected that the evaluation will be more appropriate for the enterprise environment through evaluation by security equipment, which will help the cyber security evaluation research in the future.

  • PDF

Assessment of Development and Opertation for Maritime Leisure in Mokpo Port using SWOT&AHP (목포항 요트산업 개발과 운영 주체 선정)

  • Jang, Woon-Jae;Keum, Jong-Soo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.29 no.1
    • /
    • pp.451-456
    • /
    • 2005
  • This paper proposes an evaluation model to assessment of development and operation for maritime leisure in Mokpo Port.. The proposed model is combination of SWOT(Strength, Weakness, Opportunity, Threat) and AHP(Analytic Hierarchy Process) to evaluate development and operation for maritime leisure. The evaluation hierarchical structure is structured by ISM(Interpretive structural modeling) and composed of five level. At the third level, It combine SWOT into the assessment system. Strength and Weakness are internal factors. Opportunities and threats are external factors. There are economic and maritime leisure development in the model. There are three development and operation investment as Third-Sector, company, local organization. According to the results, the participants perceive prefer to strength and opportunity and found that the priority for the development and operation for maritime leisure of Third-Sector.

  • PDF