• Title/Summary/Keyword: attacks

Search Result 3,689, Processing Time 0.03 seconds

Estimation of Adult Season of Occurrence and Annual Generation Numbers of the Asiatic Pink Stem Borer, Sesamia inferens (Walker, 1856) (Lepidoptera: Noctuidae) (벼밤나방(Sesamia inferens (Walker, 1856))(나비목: 밤나방과) 성충 발생시기와 연중 세대수 추정)

  • Eun Young Kim;Young-Mi Park;Soon Do Bae;Gwan-Seok Lee;Chae-Hoon Paik;Do-Ik Kim;Wonhoon Lee;Jin Kyo Jung;Bo Yoon Seo
    • Korean journal of applied entomology
    • /
    • v.62 no.4
    • /
    • pp.227-243
    • /
    • 2023
  • The Asiatic pink stem borer, Sesamia inferens (Walker, 1856) (Lepidoptera: Noctuidae) is a pest that attacks rice stems. In this study, we estimated the annual generation of insect in several regions of the Republic of Korea. Adult trapping using a sex pheromone trap detected the occurrence of S. inferens adults in the three northernmost areas around 38° latitude and showed that the insect inhabits all of Korea. In most areas investigated, the seasons of the adult generations estimated using the single-sine degree-day model did not deviate from the corresponding observed seasons of adult occurrence. We estimated that the overwintering larvae hypothetically-estimated using the model could be originated from the last generation of adults. When larvae collected in paddy fields during the autumn season in a few middle and southern areas were reared at 25℃, ca. 70% of pupae did not show additional larval molting before their pupation. All larvae collected in early March in a southern area (Goseong, Gyeongsangnam-do) pupated without additional larval molting when reared at 25℃. Based on these results, we presumed that S. inferens could overwinter as mainly the last instar larval stage in the area. Taken together, we conclude that S. inferens primarily has two generations per year in areas around 38° latitude, and three generations in the areas between 35.3° and 37.3° latitude. In addition, approximately 35% of insects captured by the sex pheromone trap were species other than S. inferens, as determined by analyzing the nucleotide sequences of the cytochrome c oxidase 1 gene. These species were not morphologically misidentified as S. inferens.

Analysis of Domestic and International Patent Trends in Anti-drone Technology through Patent Application Status Survey (특허 출원 현황조사를 통한 안티드론 기술의 국내외 특허 동향 분석)

  • Jae-Hyo Hwang;Ki-Jung Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1217-1228
    • /
    • 2023
  • In this paper, technical and patent analysses of anti-drone technology, which aim to neutralize drone attacks are conducted. We conducted research on the technical definition of anti-drone, the technical elements of anti-drone systems, and investigated the patents related to anti-drone and drone filed domestically and internationally over the past 10 years, starting from 2011. For domestic patents, we examined the number of patent applications related to anti-drone and the overall domestic patent applications over the past 10 years. Regarding international filings, we investigated the patent applications related to anti-drone filed in the United States, Europe, Japan, China, and under the PCT system in the past 10 years. We conducted a search for patents related to anti-drone, including neutralization techniques identified under the keyword "anti-drone," patents related to drone detection and identification techniques, and patents related to drone neutralization techniques. Through the conducted research, a total of 91 patents were filed for drone detection techniques. Out of these, 5 patents, accounting for 5.5%, were filed by public institutions. In the case of patents filed for drone identification techniques, there were a total of 174 patents. Among these, 4 patents, which is 2.3%, were filed by public institutions.

Design of Authentication Mechinism for Command Message based on Double Hash Chains (이중 해시체인 기반의 명령어 메시지 인증 메커니즘 설계)

  • Park Wang Seok;Park Chang Seop
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.51-57
    • /
    • 2024
  • Although industrial control systems (ICSs) recently keep evolving with the introduction of Industrial IoT converging information technology (IT) and operational technology (OT), it also leads to a variety of threats and vulnerabilities, which was not experienced in the past ICS with no connection to the external network. Since various control command messages are sent to field devices of the ICS for the purpose of monitoring and controlling the operational processes, it is required to guarantee the message integrity as well as control center authentication. In case of the conventional message integrity codes and signature schemes based on symmetric keys and public keys, respectively, they are not suitable considering the asymmetry between the control center and field devices. Especially, compromised node attacks can be mounted against the symmetric-key-based schemes. In this paper, we propose message authentication scheme based on double hash chains constructed from cryptographic hash function without introducing other primitives, and then propose extension scheme using Merkle tree for multiple uses of the double hash chains. It is shown that the proposed scheme is much more efficient in computational complexity than other conventional schemes.

Analysis and implications of North Korea's new strategic drones 'Satbyol-4', 'Satbyol-9' (북한의 신형 전략 무인기 '샛별-4형', '샛별-9형' 분석과 시사점)

  • Kang-Il Seo;Jong-Hoon Kim;Man-Hee Won;Dong-Min Lee;Jae-Hyung Bae;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.167-172
    • /
    • 2024
  • In major wars of the 21st century, drones are expanding beyond surveillance and reconnaissance to include land and air as well as sea and underwater for purposes such as precision strikes, suicide attacks, and cognitive warfare. These drones will perform multi-domain operations, and to this end, they will continue to develop by improving the level of autonomy and strengthening scalability based on the High-Low Mix concept. Recently, drones have been used as a major means in major wars around the world, and there seems to be a good chance that they will evolve into game changers in the future. North Korea has also been making significant efforts to operate reconnaissance and attack drones for a long time. North Korea has recently continued to engage in provocations using drones, and its capabilities are gradually becoming more sophisticated. In addition, with the recent emergence of new strategic Drones, wartime and peacetime threats such as North Korea's use of these to secure surveillance, reconnaissance and early warning capabilities against South Korea and new types of provocations are expected to be strengthened. Through this study, we hope to provide implications by analyzing the capabilities of North Korea's strategic Drones, predicting their operation patterns, and conducting active follow-up research on the establishment of a comprehensive strategy, such as our military's drone deployment and counter-drone system solutions.

Propose a Static Web Standard Check Model

  • Hee-Yeon Won;Jae-Woong Kim;Young-Suk Chung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.83-89
    • /
    • 2024
  • After the end of the service of Internet Explorer, the use of ActiveX ended, and the Non-ActiveX policy spread. HTML5 is used as a standard protocol for web pages established based on the Non-ActiveX policy. HTML5, developed in the W3C(World Wide Web Consortium), provides a better web application experience through API, with various elements and properties added to the browser without plug-in. However, new security vulnerabilities have been discovered from newly added technologies, and these vulnerabilities have widened the scope of attacks. There is a lack of research to find possible security vulnerabilities in HTML5-applied websites. This paper proposes a model for detecting tags and attributes with web vulnerabilities by detecting and analyzing security vulnerabilities in web pages of public institutions where plug-ins have been removed within the last five years. If the proposed model is applied to the web page, it can analyze the compliance and vulnerabilities of the web page to date even after the plug-in is removed, providing reliable web services. And it is expected to help prevent financial and physical problems caused by hacking damage.

The Application of Entomopathogenic Fungi Metarhizium anisopliae, Beauveria bassiana, and Trichoderma harzianum for Coptotermes curvignathus and Cryptotermes cynocephalus Termite Control in Indonesia

  • Niken SUBEKTI;Ari SUSILOWATI;Elizabeth Novi KUSUMANINGRUM;Anita FADHILA;Sania SALSABILA;Citra Anisah ZAHRA;Nasiha Al SABRINA;Ikhsan GUSWENRIVO;Yayan SANJAYA;Cepi KURNIAWAN;Apri Heri ISWANTO;Mia MIRANTI
    • Journal of the Korean Wood Science and Technology
    • /
    • v.52 no.3
    • /
    • pp.262-275
    • /
    • 2024
  • In Indonesia, Coptotermes curvignathus Holmgren and Cryptotermes cyanocephalus Light termite attacks can damage wood and causing losses of 8.7 trillion rupiah per year. Wood treatment and soil barrier are very important to protect structures and their components from termite infestation. The application of synthetic chemicals that pose risks to the environment and human health. The growing movement to replace these chemicals with new termiticides that are safe for the environment in place of persistent organic pollutants. Efficacy performance in entomopathogenic fungi spores such as that produce decanoic acid, hexadecanoic acid, palmitic acid, and octadecadienoic acid are potential compounds that provide for ecofriendly termite control. Entomopathogenic fungal spores from Metarhizium anisopliae, Trichoderma harzianum, and Beauveria bassiana, as the active ingredient were formulated with nanocellulose was added as an inert ingredient to which helped to deliver the active ingredients on controlling the target pest, and enhance the utility ability of the product fungi to control termites. The mortality of these termites successively entomopathogenic fungi was the main cause of death. The higher concentrations being associated with of nanocellulose used affect increased the number of termites mortality. M. anisopliae paired with 60% nanocellulose concentrate was the best percentage for yielded the greatest C. curvignathus and C. cynocephalus termite control. In the field testing, M. anisopliae provided better, it showed the finest result of termite control rather than B. bassiana and T. harzianum. The results of the research indicate that entomopathogenic fungi can be used for Pest Control Management as the subterranean termite and drywood termite control.

Clinacal investigation of child sexual abuse (소아 성폭력에 관한 임상적 고찰)

  • Lee, Hyun Joo;Han, Hye Jung;Kim, Ji Hee;Lee, Hye Sun;Lee, In Sil
    • Clinical and Experimental Pediatrics
    • /
    • v.50 no.1
    • /
    • pp.20-27
    • /
    • 2007
  • Purpose : Child sexual abuse is a significant and serious problem that affects public health and society. Pediatricians are responsible for preventing and detecting sexual abuse of children. The aim of this study was to examine clinical findings of child sexual abuse. Methods : The authors retrospectively studied 292 patients between the ages of 0 and 18 who were referred for evaluation of sexual abuse to the Emergency Department of the National Police Hospital from Oct 1, 2001 to May 5, 2005. Results : Sixty three (21.6 percent) of sexual abuse victims were younger than 6 years of age; 89 (30.5 percent) were 6-12 years of age; and 104 (47.9 percent) were 12-18 years of age. Attack time was the most common between noon and 6 pm. Victims were attacked in their home or nearby (51.4 percent). One hundred fifty six (53.6 percent) offenders were accquaitances, thirty nine (13.4 percent) of whom were family members. The disclosure of attack by parents with abnormal physical symptoms was more common in younger children than in adolescence. Eighty nine (30.5 percent) victims had no specific physical findings, 51 percent had injury to the hymen, 37.3% had injury to external genitalia, and 4 percent had anal injury. One case of gonorrhea and thirteen cases of chlamydia were found. Sperm was found in 19 cases and acid phosphatase was positive in 28 cases. The absence of physical findings and laboratory findings was more common in younger children than in those in adolescence. The time interval from attacks to hospital visits had a significant negative correlation with age. Conclusion : For younger victims, the time interval from attack to hospital visitis was more prolonged. Victims may have no physical evidence of sexual abuse. Therefore, a careful history should be obtained and a through physical examination should be performed. Pediatricians must play a leading role in evaluation and treatment of sexually abused children, considering children,s growth and development. Coordination with other professionals is necessary to provide consultation, medical treatment, and legal assistance for the sexually abused children and families.

North Korea's Nuclear Strategy: Its Type Characteristics and Prospects (북한 핵전략의 유형적 특징과 전망)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.1 no.2
    • /
    • pp.171-208
    • /
    • 2017
  • This paper is to analyze the type characteristics and prospects of the North Korean nuclear strategy. To this end, the paper is composed of 5 chapters titled introduction; the concept and type of nuclear strategy; the nuclear capabilities of North Korea and the declarative nuclear strategy; the operational characteristics and prospects of the North Korean nuclear strategy; and conclusion. Recently, the deployment of nuclear weapons and the enhancement of nuclear capabilities in North Korea have raised serious problems in our security and military preparedness. Nuclear strategy means military strategy related to the organization, deployment and operation of nuclear weapons. The study of North Korea's nuclear strategy begins with a very realistic assumption that the nuclear arsenal of North Korea has been substantiated. It is a measure based on North Korea's nuclear arsenal that our defense authorities present the concepts of preemptive attack, missile defense, and mass retaliation as countermeasures against the North Korean nuclear issue and are in the process of introducing and deploying them. The declared nuclear declaration strategy of the DPRK is summarized as: (1)Nuclear deterrence and retaliation strategy under the (North Korea's) Nuclear Weapons Act, (2)Nuclear preemptive aggression, (3)The principle of 'no first use' of nuclear weapons in the 7th Congress. And the intentions and operational characteristics of the North Korean nuclear strategy are as follows: (1)Avoiding blame through imitation of existing nuclear state practices, (2)Favoring of nuclear strategy through declarative nuclear strategy, (3)Non-settlement of nuclear strategy due to gap between nuclear capability and nuclear posture. North Korea has declared itself a nuclear-weapon state through the revised Constitution(2012.7), the Line of 'Construction of the Nuclear Armed Forces and the Economy'(2013.3), and the Nuclear Weapons Act(2013.4). However, the status of "nuclear nations" can only be granted by the NPT, which is already a closed system. Realistically, a robust ROK-US alliance and close US-ROK cooperation are crucial to curbing and overcoming the North Korean nuclear threat we face. On this basis, it is essential not only to deter North Korea's nuclear attacks, but also to establish and implement our own short-term, middle-term and long-term political and military countermeasures for North Korea's denuclearization and disarmament.

Comparative Analysis of Anti-Terrorism Act and its Enforcement Ordinance for Counter-Terrorism Activities (대테러 활동을 위한 테러 방지법과 시행령의 비교 분석)

  • Yoon, Hae-Sung
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.259-285
    • /
    • 2016
  • As the need for anti-terrorism legislation has been continuously argued, Anti-terrorism act has been enacted and enforced. On the other hand, there still remain a lot of points to be discussed regarding the definition of the concept of terrorism, matters of human rights violations, strengthening authority of the investigation and intelligence agencies, and mobilization military forces for the suppression of terrorism. Also, reviewing Anti-terrorism act and its enforcement ordinance draft, this legislation seems to regulate terrorist groups like IS. If so, in the case of terrorism of North Korea or domestic anti-government organizations, whether this law would be applied could become an issue. In the case of terrorism of North Korea, Ministry of National Defense has a right of commandership in the military operations, however, it is also possible to apply the article 4 of Natural Security Act a crime of performing objective-or a crime of foreign exchange on Criminal law as legal grounds for not military terrorisms but general investigations. Therefore, it is necessary to involve consideration about this matter. Furthermore, in the view of investigation, Anti-terrorism act and its enforcement ordinance draft do not mention Supreme Prosecutors Office and Ministry of Justice that conduct investigations. In the case of terrorism, the police and prosecution should conduct to arrest criminals and determine crimes at the investigation stage, however, any explicit article related to this content in Anti-terrorism act and its enforcement ordinance draft was unable to be found. Although Anti-terrorism act is certainly toward preventive aspects, considering some matters such as prevention, actions on the scene, maneuver after terrorism, arresting terrorists, investigation direction, cooperation, and mutual assistance, it is necessary to reflect these contents in Anti-terrorism act. In other words, immediately after terrorists attacks, it is possible to mobilize the military operations by Integrated Defense act in order to arrest them in the case of military terrorism. Nevertheless, because both military terrorism and general one are included in the investigation stage, it needs to begin an investigation under the direction of the prosecution. Therefore, above all, a device for finding out the truth behind the case at the investigation stage is not reflected in the current Anti-terrorism act and its enforcement ordinance draft. Accordingly, if National Intelligence Service approaches information at the prevention level in this situation, it may be necessary to come up with follow-up measures of the police, the prosecution, and military units.

  • PDF

Strategic Antitrust Policy Promoting Mergers to Enhance Domestic Competitiveness (기업결합규제(企業結合規制)와 국제경쟁력(國際競爭力))

  • Seong, So-mi
    • KDI Journal of Economic Policy
    • /
    • v.12 no.3
    • /
    • pp.153-172
    • /
    • 1990
  • The present paper investigates the potential value of strategic antitrust policy in an oligopolistic international market. The market is characterized by a non-cooperative Cournot-Nash equilibrium and by asymmetry in costs among firms in the world market. The model is useful for two reasons. First, it is important in the context of policy-making to examine the conditions under which it may be beneficial to relax antitrust law to enhance competitiveness. Second, the explicit derivation of the level of cost-saving required for a gain in total domestic surplus provides an empirical rule for excluding industries that do not satisfy the requirements for a socially beneficial antitrust exemption. Results of the analysis include a criterion that tells how the cost-saving and concentration effects of a merger offset each other. The criterion is derived from fairly general assumptions on demand functions and is simple enough to be applied as a part of the merger guidelines. Another interesting policy implication of our analysis is that promoting mergers would not be a beneficial strategy in a net importing industry where cost-saving opportunities are thin. Cost-saving domestic mergers are more likely to increase national welfare in exporting industries. The best candidate industries for application of strategic antitrust policy are those with the following characteristics: (i) a large potential for efficiency enhancement; (ii) high market concentration at the world but not the domestic level; (iii) a high ratio of exports to imports. Recently, many policymakers and economists in Korea have also come to believe that the appropriate antitrust policy in an era of increased foreign competition may actually be to encourage rather than to prohibit domestic mergers. The Industry Development Act of 1986 and the proposed bill for Mergers and Conversions in the Financial Industry of 1990 reflect this changing perspective on antitrust policy. Antitrust laws may burden domestic firms in the sense that they have a more constrained strategy set. Expenditures to avoid antitrust attacks could also increase costs for domestic firms. But there is no clear evidence that the impact of antitrust policy is significant enough to harm the competitiveness of domestic firms. As a matter of fact, it is necessary for domestic financial institutions to become large in scale in this era of globalization. However, the absence of empirical evidence for efficiency enhancement from mergers suggests caution in the relaxation of antitrust standards.

  • PDF