• Title/Summary/Keyword: Weapon Classification

Search Result 33, Processing Time 0.033 seconds

A Study on the Cyber Weapons Classification System (사이버무기 분류체계에 관한 시론)

  • Lee, Yongseok;Kwon, Hunyeong;Choi, Jeongmin;Lim, Jongin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.905-917
    • /
    • 2018
  • The sovereign state has the right to engage in self-defense or war with the approval of the Security Council when it receives an invasion of territory from a foreign country. War is conducted under the principle of the necessity and proportionality of self-defense. In case of cyber attack, proportional countermeasure must be made through attack means and effect analysis, and cyber weapons need to be classified for this purpose. Therefore, this study aims to provide a rational and legitimate response according to the necessity and proportionality of the self - defense right by suggesting definition and classification criteria of cyber weapons. In this study, cyber weapons were defined as "means of collecting, attacking, and protecting information using cyber technology in the cyber space according to military objectives. Based on existing weapon systems and public cyber weapons cases, cyber weapons were classified as (1) cyber weapons for information gathering, (2) cyber weapons for attack, and (3) cyber weapons for protection. We suggest the considerations for applying the proportional response according to this functional classification. In order to guarantee the principle of proportionality to cyber attacks in the future, the classification study based on the cyber weapon effect should be conducted. This study has conducted an exploratory study on the classification of cyber clusters which constitutes one axis of the proportionality principle.

A Survey Study of the Combat Effectiveness Analysis Models and Future Research Areas (전투체계 효과분석에 대한 주요 연구 리뷰 및 향후 연구방향)

  • Kim, Jun-Soo;Park, Keon-Young;Lee, Jae-Yeong;Bae, Sung-Min;Pyun, Jai-Jeong;Kim, Chong-Man
    • Korean Journal of Computational Design and Engineering
    • /
    • v.19 no.4
    • /
    • pp.305-315
    • /
    • 2014
  • It is important to predict and measure the combat effectiveness (CE) of weapons system in battlefield for acquiring efficient weapon system. Moreover, quantitative calculation of weapon effectiveness under complicated and uncertain battlefield environment is also difficult based on the future network centric warfare. Many papers used the term of combat effectiveness and tried to study a lot of related issues about it. However, there is no paper dealing with the classification of study issue about CE and what will happen in this study field. In this paper, we proposed how to classify the study issue about CE and forecast future direction of this study field. Conceptually, CE is nothing but the assessment results to measure the ability of a military weapon system to accomplish its objective. We believe that it is an appropriate time to review the literature extensively on CE analysis because the research interests and the papers of CE are rapidly growing in these days. This paper reviewed many CE analysis papers, classified them according to their research content and the research methodology applied. Additionally, a comprehensive list of future research areas is also given.

A Study on a Countermeasure Program using the Martial Arts for a Security Guard Caused by an Accidental Situation (우발상황시 경호무도 대응방안)

  • Park, Jun-Seok;Kang, Young-Gil
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.327-340
    • /
    • 2003
  • As a countermeasure under accidental occurrence situation, First, as application form of martial arts, A security guard foster ability that can protect a target person of guard and own body under accidental occurrence situation through incessant martial arts practice. To achieve this purpose, incessant training mental power and physical strength reinforcement should be kept on to prevent, therefore make a safety control function for such as weapon, small arms, explosive, vehicles terror etc. happened under accidental occurrence situation. Second, according to the contents of training based on the classification category of martial arts for security guard under accidental situation, a security guard must keep safety distance necessarily lest a target person of gurad should be attacked by attacker, therefore, intercept an attack opportunity if a safety distance between a target person of guard and attacker is not kept. Third, It is to practice confrontation techniques based on the type of attack. A security guard must develp situation disposal ability that can cope properly with the attack using empty hands, murderous weapon, small arms, explosive by case or individual or mass of threat that impose danger and injury in a target person's body of guard.

  • PDF

This Study of the Arms Used in the Three Kingdoms (삼국시대(三國時代) 병기체제(兵器體制)의 연구(硏究))

  • Kim, sung-tae
    • Korean Journal of Heritage: History & Science
    • /
    • v.34
    • /
    • pp.20-58
    • /
    • 2001
  • In order to unravel the characteristics of arms used in the 'Three Kingdoms,' Kokuryo, Silla and Paikje. the classification and the developing procedures of the arms should be first discussed. At first, the basic arms of the soldiers of Three Kingdoms were iron swords, iron spearheads, and bows. During that period, swords attached a ring pommel were commonly used. But after 5A. D. a sword with a decoration pommel appeared. Infantry generally used iron spearheads. From the late 4A. D. the long spearheads were broadly used in cavalry battles. In the late 6A. D. infantry mainly used long spearheads, and this resulted in the foundation of long spearheads units. There were two kinds of bows: Short Bow whose arch is small and Long Bow whose arch is long. It is known that the Short Bow was widely used in Kokuryo and Paikje up to 5A. D. In the early era, infantry used Long Bow, yet it was vastly used after 6A. D. when a castle's strategical value was great and defending a castle was. significant. Above mentioned, as basic combat weapons, iron spearhead and bow were fundamental. In particular, the spearhead was the essential weapon to a soldier. Yet, arrow gun and hook-shape cutters were important weapons. Especially, after 6A.D., when a castle became strategically pivotal in military, the arrow gun became the important weapon. This resulted in the foundation of arrow gun units. Hook-shape cutters were used to snatch horsemen or to climb up to fall the castle. Yet, the cutter was not the Three Kingodoms' basic weapon. In addition, the three stages of arms development in the Three Kingdoms are formation stage, development stage, and settlement stage. The formation stage was the period when premitive military unit appeared in the Three Kingdoms. It ranged from 1B. C. to the mid 3A. D. At that time according to regions. there were two weapon systems operating: North area including Kokuryo and the northern part of Paikje and South area including Silla, Kaya and the southern part of Paikje. ln North area a sword with a ring attached at the end of the holder, iron spear with neck and mid-size flat holder and iron arrowhead with an extension to fix, were used. In this period, during a war calvary units were mostly used and their weapon systems seemed possibly to succeed in that of Kochosun. In the development stage, when LoLang's influence on surroundings became weak, Koguryo, Paikjae and Silla had directly contacted each other. In the late 3A.D. to the early 6A.D., Silla achieved a drastic improvement in weapon system. This was the period when Kokuryo played a leading role in arms race. Kokuryo's arms manufacturing techniques passed onto Silla, Kaya and Paikje. In combat strategy a joint operation between infantry and calvary prevailed even if their military tactics were different. In a calvary battle heavily armed horsemen played import roles at this period. The horsemen and even horses were heavily guarded with iron armors. After all, the appearance of fully armed horsemen implies the very need of powerful destructive forces in weapon system. At that time, basic weapons were a big sword with a ring attached at the end of the holder, swallow's tail-shape spear with neck, and iron spearhead with neck and an extension. The settlement stage began at the mid 6A.D., when it was the revolutionary period in the arms development history. Of course, actual proofs and picture documents were not sufficient enough to penetrate full scale of the weapon system. But, according to historical circumstances and historic records, it is very certain that this period was the peak in arms development. In this period special military units, such as infantry-calvary companies, Archery units and Long spear units, that executed particular duties with special weapons, were founded. This became the characteristics of the settlement stage.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

An Effective Recruits' Assignment Method for Early Job Adaptation of Air-munition Maintenance Airmen Using Datamining Technique (데이터마이닝을 이용한 공군 무기정비병의 조기 숙달을 위한 배속방안 연구)

  • Kang, Kew-Young;Yoon, Bong-Kyoo
    • Journal of the military operations research society of Korea
    • /
    • v.37 no.1
    • /
    • pp.147-159
    • /
    • 2011
  • Recently, the military service period has been shortened continuously. Meanwhile, more skilled airmen are needed as the complexity of weapon systems increase. This phenomenon could lead to a disastrous result such as deteriorating the level of the readiness and the fighting power. We suggest a method to improve recruit's maintenance capability rapidly by assigning airmen to jobs appropriate to their characteristics using Datamining methods (K-menas and CART). We focus on the assigning method for air force's air-munition maintenance airmen since they are requested more skilled than other airmen. Grouping airmen with k-means method and devising classification rule with CART algorithm, we found that airmen's proficiency arrival period could be shortened by 1.79 months when they are assigned in the suggested way.

A Scheme on applying IT technology for TLCSM improvements (TLCSM 개선을 위한 IT기술의 적용방안)

  • Choi, Myoungjin;Kwon, Daeil;Yang, Jeakyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.26-33
    • /
    • 2016
  • The cost of preparing munitions in weapon system operation and management has been rapidly increasing and current weapon systems have become complicated and diverse due to new warfare pattern changes and the rapid growth of advanced scientific technology. Moreover, as a part of the execution plans of creative economics, the Korean government is actively reviewing how to minimize the costs of preparing munitions. Accordingly, this study derived the issues of munitions management for decreasing munitions preparing costs. First, the issues of munitions management were introduced through review and analysis with respect to the munitions classification criteria, regulations and systems, and equipment maintenance information systems. Second, we proposed the application and necessity for the real-name system which is responsible for munitions management and the fragmentation of the maintenance instructions status classification criteria.. Also, we were analyzed that the effects depending on the application. Finally, we proposed that the linkage system which is currently military active with equipment maintenance information systems as well as the total life-cycle management system (TLCSM) improvements to the itemized data and records management system by utilizing IT technology CMB that must be done in order to improve the issues.

The Representative Technology Field Analysis of Domestic Defense Companies in Communication-electronics based on Patent Information Data (특허 자료 정보 기반 국내 통신전자 방산업체 대표 기술 분야 분석)

  • Kim, Jang-Eun;Cho, Yu-Seup
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.446-458
    • /
    • 2017
  • In order to make a decision about the acquisition of command control communication weapon systems considering the client's technology level requirements, the improvement of the domestic technology level and security of core technology, the person in charge can perform technology evaluation/analysis based on command control communication weapon system patent data. As a method of collecting such patent data, we can collect the patent data of government-designated (Defense Acquisition Program Act Article 35) companies (11 Major defense companies/9 General defense companies) through the Korea Intellectual Property Rights Information System (KIPRIS) of the Korean Intellectual Property Office (KIPO) In this way, we collected 1,526 patents and 134 International Patent Classification (IPC) types through the KIPRIS of the KIPO. Based on these data, we performed three types of analysis, General information analysis, Principal Components Analysis (PCA) and Network analysis, and extracted 27, 19 and 13 IPC types from them, respectively. Based on the above three analysis results, we confirmed 8 IPC types (F41A, F41G, G06F, G01S, H04B, H04L, H04M and H04W) as the key technologies and representative technology fields of domestic communication-electronics defense companies.

Technology Development Trends Analysis and Development Plan of Unmanned Underwater Vehicle (무인 잠수정 연구 개발 동향 분석 및 발전 방안)

  • Lee, Ji Eun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.233-239
    • /
    • 2019
  • An unmanned underwater vehicle is a major weapon system that allows surveillance and reconnaissance missions in border areas or threatening areas where enemy submarines are present. Unmanned underwater vehicles can be used to explore underwater resources, predict disasters, and survey the topography of the ocean floor in the civilian fields, while in the defense fields, it can be used for anti-submarine reconnaissance and mine countermeasures. In this paper, we first investigate the main classification of unmanned underwater vehicles, and foreign R&D trends are analyzed based on the main classification criteria by weight, such as portable, light, heavy and large-scale unmanned underwater vehicles. Then we examine the trends in the development of domestic unmanned underwater vehicles. Finally, through the analysis of both domestic and foreign unmanned underwater vehicles, we present future development trends of unmanned underwater vehicles in order to set defense goals to counter the anticipated threats and diversified potential environment.

A Taxonomy of Embedded Systems (임베디드 시스템의 분류)

  • So, Sun Sup;Son, Kyung A;Eun, Seongbae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.818-825
    • /
    • 2020
  • The embedded system can be defined as a special purpose system with a built-in computer, and has a wide variety of applications such as home appliances, office equipment, and weapon systems. A well-defined taxonomy in a specific field is advantageous for learning and education, however, the classification scheme for embedded systems is difficult to find. In this paper, we propose a taxonomy for embedded systems. First, the generalized structure of the embedded system was presented. And, it is divided into two parts: "firmware based" and "embedded OS based". In addition, according to the characteristics of embedded system applications, it is divided into two categories: "non-dependable" application and "dependable" application, which makes 4 planes. We describe the features of each quadrant and show that the classification is well suited by showing examples. Our taxonomy can be used to set teaching and learning methods of embedded systems.