• Title/Summary/Keyword: covert information

Search Result 61, Processing Time 0.019 seconds

Implementation of a Vehicle Monitoring System using Multimodal Information (다중 정보를 활용하는 차량 모니터링 시스템의 구현)

  • Park, Su-Wan;Son, Jun-U
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.3
    • /
    • pp.41-48
    • /
    • 2011
  • In order to detect driver's state in a driver safety system, both overt and covert measures such as driving performance, visual attention, physiological arousal and traffic situation should be collected and interpreted in the driving context. In this paper, we suggest a vehicle monitoring system that provides multimodal information on a broad set of measures simultaneously collected from multiple domains including driver, vehicle and road environment using an elaborate timer equipped as a soft synchronization mechanism. Using a master timer that records key values from various modules with the same master time of short and precise interval, the monitoring system provides more accurate context awareness through synchronized data at any given time. This paper also discusses the data collected from nine young drivers performing a cognitive secondary task through this system while driving.

Study on the Security Threat Factors of Social Network Services (소셜 네트워크 서비스의 보안 위협요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.115-121
    • /
    • 2019
  • Recently, as the use of smart devices is becoming more common, various and convenient services are being developed. Among these services, the Social Network Service(SNS) is easily accessible anywhere, anytime. In particular, as well as sharing information, it forms a social relationship in cyberspace to expand new connections, and the SNS account is used as an authentication means of other services to provide users with speed and convenience at all times. However, despite the many advantages of SNS, due to security vulnerabilities occurring in the interworking process with various services, accidents of personal information are constantly occurring, and it is urgent to prepare countermeasures against potential risk factors. It is a necessary situation. Therefore, in this paper, the use of SNS is expected to increase rapidly in the future, and it is expected that it will be used as the basic data for developing the countermeasures by learning the countermeasures according to the security threats of the SNS.

ASPECT SHIFT AND DURATIVE ADVERBIALS

  • 고희정
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2001.06a
    • /
    • pp.97-109
    • /
    • 2001
  • 이 논문은 영어와 한국어에서 나타나는 완수동사(Accomplishment Verb)와 지속부사구(durative adverbial)의 상호작용에 대해서 논한다. Smith(1991)에 의하면 완수동사가 지속부사구와 결합하면, 동사와 부사구의 의미적 자질의 충돌을 피하기 위해서 완수동사의 상변환(Apsect Shift)이 일어난다. 본 논문은 이 상변환이 영어와 한국어에서 어떻게 실현되는가를 보이고, 이를 형식의미론에서 어떻게 기술할 수 있는가를 논한다. 완수동사가 지속부사구와 결합할 때, 영어와 한국어 모두에서 닫힌 완료 관점(closed perfective viewpoint)에서 열린 관점(open viewpoint)으로 관점 변환(viewpoint shift)이 일어난다. 그러나, 한국어의 상변환과 영어의 상변환이 완전히 일치하는 것은 아니다. 한국어의 관점변환은 완료관점도 아니고 미완료 관점도 아닌, 중립관점(neutral viewpoint)으로의 변환인 반면, 영어의 관점변환은 단순히 미완료 관점으로의 변환임이 논의된다. 이 주장은 한국어의 관점변환 구문은 이질적인 다수 사건의 연속 해석(heterogeneous sequential reading of multiple events)을 허용하는 반면, 영어의 관점변환구문은 오직 동질적인 단일 사건의 동시 해석 (homogeneous simultaneous reading of a single event)만을 허용한다는 사실에 의해서 지지 된다. 본 논문은 완수동사가 지속부사구와 결합할 때 일어나는 상변환에 대한 형식의 미론 분석을 Heim & Kratzer (1998)의 틀에서 제시한다. 닫힌 관점에서 열린 관점으로의 상변환은 비가시적 시제 서법 운용자(covert temporal-modal operator)인 IMP를 지속부사구의 논항으로 설정하여 설명한다. IMP는 Dowty (1979)에서 미완료상의 모순(imperfective paradox)을 해결하기 위해서 설정한 PROG를 Heim & Kratzer (1998)의 틀에 맞게 수정한 것이다. IMP는 평가 세계 (evaluation world)를 현실 세계(actual world)에서 가상 관성 세계(possible inertia would)로 변화시켜서, 완수동사의 종결점(ending point)을 현실세계에서 가상의 미래 세계로 움직이는 역할을 한다. 결과적으로, IMP는 완수동사의 닫힌 완료 관점을 현실세계에서는 열린 미완료 관점으로 변환시키되, 가상 관성 세계에서는 그대로 닫힌 관점으로 유지 시키는 효과를 가진다. 한국어와 영어의 관점 변환 구문의 차이는 각 언어의 지속부사구의 어휘 목록의 전제(presupposition)의 차이로 설명된다. 본 논문은 영어의 지속부사구는 논항의 하위간격

  • PDF

Identifying Reader's Internal Needs and Characteristics Using Keywords from Korean Web Novels (웹소설 키워드를 통한 이용 독자 내적 욕구 및 특성 파악)

  • Jo, Suyeon;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.2
    • /
    • pp.158-165
    • /
    • 2020
  • Web novels that are consumed on mobile devices are characterized by capturing one aspect of our society. The purpose of this study was to collect the keywords from web novels, to identify trends of web novels, and further to analyze the covert needs and characteristics of readers in connection with the existing researches. As a result of the analysis, novels with modern backgrounds and adult novels were popular in relation to easily readable and accessible mobile environment. Male characters tend to be ideally depicted in web novels. In contrast, characters with inner scars were popular among female characters. Although this study did not conduct an in-depth analysis of adult novels due to the limitation of web crawling, it is meaningful that this study analyzed modern people's inner needs and characteristics using the para-text like keywords in existing web novel studies that previously lacked quantitative analysis.

A Study on Novel Steganography Communication Technique based on Thumbnail Images in SNS Messenger Environment (SNS 메신저 환경에서의 썸네일 이미지 기반의 새로운 스테가노그래피 통신 기법 연구)

  • Yuk, Simun;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.151-162
    • /
    • 2021
  • Steganography is an advanced technique that hides secret messages by transforming them into subtle noise and spreading them within multimedia files such as images, video and audio. This technology has been exploited in a variety of espionage and cyber attacks. SNS messenger is an attractive SNS Service platform for sending and receiving multimedia files, which is the main medium of steganography. In this study, we proposed two noble steganography communication techniques that guarantee the complete reception rate through the use of thumbnail images in the SNS messenger environment. In addition, the feasibility was verified through implementation and testing of the proposed techniques in a real environment using KakaoTalk, a representative SNS messenger in south korea. By proposing new steganography methods in this study, we re-evaluate the risk of the steganography methods and promoted follow-up studies on the corresponding defense techniques.

Dynamic Copy Security Protocol In Real-Time Database Systems (실시간 데이터베이스 시스템에서의 동적 복사 보안 프로토콜)

  • Park, Su-Yeon;Lee, Seung-Ryong;Jeong, Byeong-Su;Seung, Hyeon-U
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.8
    • /
    • pp.955-963
    • /
    • 1999
  • 다단계 보안 실시간 데이타베이스 시스템은 데이타베이스의 일관성 유지와 실시간 요구인 마감시간의 만족, 그리고 기밀성을 띤 데이타가 노출될 수 있는 비밀채널(covert-channel)의 방지라는 요구사항을 모두 만족해야 한다. 기존의 SRT-2PL(Secure Real-Time 2 Phase Locking)은 원본과 복사본으로 데이타 객체를 분리시켜 다른 등급간에 불간섭(non-interference)을 유지하여 비밀채널의 방지를 가능하게 하였으나, 복사본이 모든 데이타 객체에 대해 항상 존재하므로 메모리의 낭비가 있을 수 있고, 복사본의 갱신을 위한 갱신 큐의 관리에 따르는 오버헤드와 그에 따른 예측성 결여라는 문제점을 갖고 있다. 이를 개선하기 위하여 본 논문에서는 다단계 보안 실시간 데이타베이스 시스템의 요구사항을 모두 만족하는 동적 복사 프로토콜을 제안한다. 동적 복사 프로토콜은 로킹 기법을 기초로 동작하고, 트랜잭션의 작업에 따라 동적으로 복사본을 생성하고 삭제한다. 모의 실험 결과 제안한 동적 복사 프로토콜은 비밀채널을 방지하고 동적인 복사본의 생성으로 SRT-2PL의 단점인 메모리 낭비를 줄일 수 있으며, 예측성을 높여 마감시간 오류율을 감소시켰다.Abstract Concurrency control of real-time secure database system must satisfy not only logical data consistency but also timing constraints and security requirements associated with transactions. These conflicting natures between timing constraints and security requirements are often resolved by maintaining several versions(or secondary copies) on the same data items. In this paper, we propose a new lock-based concurrency control protocol, Dynamic Copy Security Protocol, ensuring both two conflicting requirements. Our protocol aims for reducing the storage overhead of maintaining secondary copies and minimizing the processing overhead of update history. Main idea of our protocol is to keep a secondary copy only when it is needed to resolve the conflicting read/write operations in real time secure database systems. For doing this, a secondary copy is dynamically created and removed during a transaction's read/write operations according to our protocol. We have also examined the performance characteristics of our protocol through simulation under different workloads while comparing the existing real time security protocol. The results show that our protocol consumed less storage and decreased the missing deadline transactions.

A Methodology for the Ship System Integration with Open Architecture : Focusing on the Total Ship Computing Environment based Architecture Building and Validation (개방형 구조(OA)를 이용한 함정체계통합 구축 방법론 : 통합함정컴퓨팅환경(TSCE)기반 아키텍처 구축 및 검증을 중심으로)

  • Park, Gang-Soo;Yoo, Byeong-Chun;Kim, Kyeongtaek;Choi, Bong-Wan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.3
    • /
    • pp.68-76
    • /
    • 2020
  • In a series of recent launch tests, North Korea has been improving the firepower of its missiles that can target South Korea. North Korea's missiles and submarines are capable of threatening targets in South Korea and are likely faster and more covert than the systems previously seen in North Korea. The advanced threats require that ROK Navy should not only detect them earlier than ever but also response quicker than ever. In addition to increasing threats, the number of young man that can be enlisted for military service has been dramatically decreasing. To deal with these difficulty, ROK navy has been making various efforts to acquire a SMART warship having enhanced defense capability with fewer human resources. For quick response time with fewer operators, ROK Navy should improve the efficiency of systems and control tower mounted on the ship by promoting the Ship System Integration. Total Ship Computing Environment (TSCE) is a method of providing single computing environment for all ship systems. Though several years have passed since the first proposal of TSCE, limited information has been provided and domestic research on the TSCE is still in its infancy. In this paper, we apply TSCE with open architecture (OA) to solve the problems that ROK Navy is facing in order to meet the requirements for the SMART ship. We first review the level of Ship System Integration of both domestic and foreign ships. Then, based on analyses of integration demands for SMART warship, we apply real time OA to design architecture for TSCE from functional view and physical view. Simulation result shows that the proposed architecture has faster response time than the response time of the existing architecture and satisfies its design requirements.

Women s Experience of Abortion : Phenomenological Perspectives (여성의 유산경험에 대한 현상학적 연구)

  • 이경혜;고명숙
    • Journal of Korean Academy of Nursing
    • /
    • v.24 no.2
    • /
    • pp.157-174
    • /
    • 1994
  • Women’s experience of abortion are not only widespread but also significant event in their lives. But this experience has not been a concern for professional care by health care providers, especially nurses. As professional nurses should have holistic approaches to clients, need to understand the lived experience of abortion from women’s perspectives. These Nurses must identify unique means for improving the quality of life of women. This study identified the meaning and structure of the lived experience of abortion. The participants were residents of Seoul and Kwang ju who were recruited through personal recommendation. Colaizzi’s method was used for the phenomenological analysis. The research question was aimed at revealing the covert meaning of abortion. The 14 women who had a spontaneous abortion and /or an artificial abortion and who argeed to participate in the study were informed of the purpose of the study, the possible risks and benefits of participation, the data generation method and they were assured of privacy and confidentiality. The investigator conducted in-depth unstructured interviews which were audiotaped with the permission of the participants. The investigator read the data repeatdly to identify and categorize themes and basic structural elements. Eight themes of abortion as experienced by these participants were : 1) complicated feelings about the anticipated abortion 2) feelings of fear and anxiety about the operation and complications 3) grieving related loss and injury 4) feelings of lonliness in perceiving no supportive person, 5) attributing the cause of the abortion to siginificant others or to self, 6) guilt feelings and resentment, 7) vacillating between regretting and not regretting, 8) struggling to a responsible person. Five basic structures identified were : 1) Complicated feelings 2) Feelings of loss and need for caring 3) Attributings to cause to significant others 4) Paradoxical emotion 5) Struggling to be a responsible being The significes of this study for nursing are : 1) It enables nurses and other health care providers understand more clearly the lived experience of abortion 2) It provides information which can be used in for women who experience abortion.

  • PDF

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.

Covert Cohabitation of News and Advertisement: News Frame Towards Advertisers of the Media (뉴스와 광고의 은밀한 동거: 광고주에 대한 언론의 뉴스구성)

  • Lim, Bong-Soo;Lee, Wan-Soo;Lee, Min-Kyu
    • Korean journal of communication and information
    • /
    • v.66
    • /
    • pp.133-158
    • /
    • 2014
  • This research followed the major South Korean newspapers, Chosun, JoongAng, HanKyoreh and KyungHyang newspapers to study their relationship with advertisement - on how they use advertisement to what degree and which views they take, also looking into the quantity of advertisement. The results of analysis is as thus: first, the more advertised companies tended to have more news reports about them overall. Also, advertised companies were usually shown in positive light rather than a negative one. The most notable constructive commonality found in the positively advertised companies were that they were not usually introduced upfront through the title of the news article (or within the body of the article) but rather mentioned within the media frame. The reasons for this pattern in advertising is to make bias towards JoongAng which is obvious for pro companies, especially for the Chosun which is known for being neutral in most company matters even for the HanKyoreh, KyungHyang known for their usual negative attitude towards private companies.

  • PDF