• 제목/요약/키워드: illegitimate

검색결과 43건 처리시간 0.021초

A CRL Distribution Scheme Minimizing the Time for CRL Processing of Vehicles on Vehicular Communications

  • Kim, Hyun-Gon
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권12호
    • /
    • pp.73-80
    • /
    • 2018
  • Certification revocation list(CRL) is needed for excluding compromised, faulty, illegitimate vehicle nodes and preventing the use of compromised cryptographic materials in vehicular communications. It should be distributed to vehicles resource-efficiently and CRL computational load of vehicles should not impact on life-critical applications with delay sensitive nature such as the pre-crash sensing that affords under 50msec latency. However, in the existing scheme, when a vehicle receives CRL, the vehicle calculates linkage values from linkage seeds, which results in heavy computational load. This paper proposes, a new CRL distribution scheme is proposed, which minimizes the time for CRL processing of vehicles. In the proposed scheme, the linkage value calculation procedure is performed by road-side unit(RSU) instead of the vehicle, and then the extracted linkage values are relayed to the vehicle transparently. The simulation results show that the proposed scheme reduces the CRL computational load dramatically, which would minimize impact on life-critical applications' operations with low latency.

Aster danyangensis, a replacement name for Aster altaicus var. uchiyamae (Asteraceae)

  • KIM, Jae Young;JO, Hyeong Jun;CHANG, Kae Sun;SON, Dong Chan;CHUNG, Gyu Young
    • 식물분류학회지
    • /
    • 제52권1호
    • /
    • pp.77-79
    • /
    • 2022
  • Aster altaicus var. uchiyamae, a Korean endemic plant, should be treated as a species rank because it is clearly distinguished from A. altaicus var. altaicus by the morphological characteristics of the plant habit, leaf width, and head size. Nevertheless, when A. altaicus var. uchiyamae was treated as a species rank, the epithet uchiyamae was unavailable in Aster owing to the earlier name A. uchiyamae, which was a replacement name for the illegitimate name A. depauperatus. Therefore, we propose A. danyangensis as a new replacement name for A. altaicus var. uchiyamae. The specific epithet danyangensis refers to the geographic location of Danyang-gun, where the species was discovered. We also designate the lectotype and isolectotype of A. danyangensis.

A New Fine-grain SMS Corpus and Its Corresponding Classifier Using Probabilistic Topic Model

  • Ma, Jialin;Zhang, Yongjun;Wang, Zhijian;Chen, Bolun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권2호
    • /
    • pp.604-625
    • /
    • 2018
  • Nowadays, SMS spam has been overflowing in many countries. In fact, the standards of filtering SMS spam are different from country to country. However, the current technologies and researches about SMS spam filtering all focus on dividing SMS message into two classes: legitimate and illegitimate. It does not conform to the actual situation and need. Furthermore, they are facing several difficulties, such as: (1) High quality and large-scale SMS spam corpus is very scarce, fine categorized SMS spam corpus is even none at all. This seriously handicaps the researchers' studies. (2) The limited length of SMS messages lead to lack of enough features. These factors seriously degrade the performance of the traditional classifiers (such as SVM, K-NN, and Bayes). In this paper, we present a new fine categorized SMS spam corpus which is unique and the largest one as far as we know. In addition, we propose a classifier, which is based on the probability topic model. The classifier can alleviate feature sparse problem in the task of SMS spam filtering. Moreover, we compare the approach with three typical classifiers on the new SMS spam corpus. The experimental results show that the proposed approach is more effective for the task of SMS spam filtering.

Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues

  • Karim, Ahmad;Ali Shah, Syed Adeel;Salleh, Rosli Bin;Arif, Muhammad;Noor, Rafidah Md;Shamshirband, Shahaboddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권4호
    • /
    • pp.1471-1492
    • /
    • 2015
  • The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets have inspired attention from the academia and the industry alike, which includes vendors, investors, hackers, and researcher community. Above all, the capability of botnets is uncovered through a wide range of malicious activities, such as distributed denial of service (DDoS), theft of business information, remote access, online or click fraud, phishing, malware distribution, spam emails, and building mobile devices for the illegitimate exchange of information and materials. In this study, we investigate mobile botnet attacks by exploring attack vectors and subsequently present a well-defined thematic taxonomy. By identifying the significant parameters from the taxonomy, we compared the effects of existing mobile botnets on commercial platforms as well as open source mobile operating system platforms. The parameters for review include mobile botnet architecture, platform, target audience, vulnerabilities or loopholes, operational impact, and detection approaches. In relation to our findings, research challenges are then presented in this domain.

저출생체중아의 출생과 산모의 제요인과의 연관성 (Maternal risk factors associated with the low birth weight)

  • 박형철;박종;이윤지;문강
    • Journal of Preventive Medicine and Public Health
    • /
    • 제24권3호
    • /
    • pp.356-362
    • /
    • 1991
  • This study was performed to identify the maternal risk factors for the low birth weight. During the period from February to June in 1991, the medical record review and questionnaire interview were conducted upon the 465 pregnant women who were admitted to and delivered a baby in 3 general hospitals and an obstetric hospital in Kwangju area. The health and other related information from women who bore the low birth weight infant was compared with those from women who bore the normal birth weight infant. The results obtained were as follows : 1. Maternal age, low body weight at term, illegitimate birth, and maintaining work activity during pregnancy were positively associated with low birth weight. 2. The positive association was revealed between low birth weight and the previous abortion, short gestational weeks, anemia, low maternal weight gain during pregnancy, the obstetric present illness and hypertension. 3. Some maternal working conditions were associated with low birth weight although statistically not significant. 4. In multivariate logistic regression analysis, gestational weeks and maternal weight gain during pregnancy were related with low birth weight.

  • PDF

Selection of Monitoring Nodes to Maximize Sensing Area in Behavior-based Attack Detection

  • Chong, Kyun-Rak
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권1호
    • /
    • pp.73-78
    • /
    • 2016
  • In wireless sensor networks, sensors have capabilities of sensing and wireless communication, computing power and collect data such as sound, movement, vibration. Sensors need to communicate wirelessly to send their sensing data to other sensors or the base station and so they are vulnerable to many attacks like garbage packet injection that cannot be prevented by using traditional cryptographic mechanisms. To defend against such attacks, a behavior-based attack detection is used in which some specialized monitoring nodes overhear the communications of their neighbors(normal nodes) to detect illegitimate behaviors. It is desirable that the total sensing area of normal nodes covered by monitoring nodes is as large as possible. The previous researches have focused on selecting the monitoring nodes so as to maximize the number of normal nodes(node coverage), which does not guarantee that the area sensed by the selected normal nodes is maximized. In this study, we have developed an algorithm for selecting the monitoring nodes needed to cover the maximum sensing area. We also have compared experimentally the covered sensing areas computed by our algorithm and the node coverage algorithm.

Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment

  • Mohaisen, Abedelaziz;Chang, Ku-Young;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권9호
    • /
    • pp.1684-1697
    • /
    • 2011
  • We show that two protocols for RFID mutual authentication in pervasive computing environments, recently proposed by Kang et al, are vulnerable to several attacks. First, we show these protocols do not preserve the privacy of users' location. Once a tag is authenticated successfully, we show several scenarios where legitimate or illegitimate readers can trace the location of that tag without any further information about the tag's identifier or initial private key. Second, since the communication between readers and the database takes place over an insecure communication channel and in the plaintext form, we show scenarios where a compromised tag can gain access to confidential information that the tag is not supposed get access to. Finally, we show that these protocols are also vulnerable to the replay and denial-of-service attacks. While some of these attacks are due to simple flaws and can be easily fixed, others are more fundamental and are due to relaxing widely accepted assumptions in the literature. We examine this issue, apply countermeasures, and re-evaluate the protocols overhead after taking these countermeasures into account and compare them to other work in the literature.

근대 영국에서의 위계화된 남성 섹슈얼리티와 "홀로 저지르는 죄악" (Hierarchized Male Sexuality in Modern England and "Solitary Vice")

  • 계정민
    • 영어영문학
    • /
    • 제54권4호
    • /
    • pp.443-459
    • /
    • 2008
  • This paper examines the discourse of masturbation in modern England and aims to re-draw the map of male sexuality related to such issues as nation, empire, family, and economy. It argues that the discourse of masturbation in modern England reflects national anxieties for the future of empire and an economic concern for unproductive sexual behavior, which were the main factors to transform masturbation into "solitary vice." The anxieties about empire and British dominance were constituted as the core of the anti-masturbation discourse on the boys. The imperial destiny was regarded to depend on the protection of the middle- and upper-class boys from the harmful psychological and physiological effects of masturbation represented in Lawrence's "The Rocking-Horse Winner." In the case of a single male, the concern for masturbation is constructed as a concern about economy, family, and human solidarity. As seen in Eliot's Silas Marner, the act of masturbation was condemned as the fulfillment of illegitimate sexual desire outside the familial sphere and a commercial economy, and thus without the possibility of human community. Silas Marner and Meredith's The Ordeal of Richard Feverel show the ways of reconstituting sexual others as normalized subjects: Boys were forced to be asexual through the regime of surveillance; and a single male was required to enroll in a remedial course on familial respectability.

Does Public Diplomacy Need a Theory of Disruption? The Role of Nonstate Actors in Counter-branding the Swedish COVID-19 Response

  • Pamment, James
    • Journal of Public Diplomacy
    • /
    • 제1권1호
    • /
    • pp.80-110
    • /
    • 2021
  • Public diplomacy (PD) scholars tend to consider two main principals: the country or agent that conducts PD (Actor A), and target groups in the host country in which PD is conducted (Actor B). The field currently lacks theories of how communications between Actors A and B can be disrupted by a third party, such as a group of motivated trolls, an organised advocacy group, or a hostile country and its agents. The purpose of this article is to outline some theoretical considerations for how the PD research field might move away from a two-actor model of PD to one in which disruption is part of the discussion. The case study explores the activities of an interest group called Media Watchdogs of Sweden (MEWAS). MEWAS was a group of around 200 members who met in a hidden Facebook group to coordinate off-platform activities aimed at influencing perceptions of how the Swedish government handled the COVID-19 pandemic in the eyes of foreign governments, researchers, decision-makers, and media. Much critical news coverage in the international press has been linked to this group. Unpacking some of MEWAS' activities, which can be considered a quite typical mixture of legitimate and illegitimate communication techniques used by activist groups, can help to shed light on some difficult questions regarding disruption in PD.

A Novel Approach to Enhance Dual-Energy X-Ray Images Using Region of Interest and Discrete Wavelet Transform

  • Ullah, Burhan;Khan, Aurangzeb;Fahad, Muhammad;Alam, Mahmood;Noor, Allah;Saleem, Umar;Kamran, Muhammad
    • Journal of Information Processing Systems
    • /
    • 제18권3호
    • /
    • pp.319-331
    • /
    • 2022
  • The capability to examine an X-ray image is so far a challenging task. In this work, we suggest a practical and novel algorithm based on image fusion to inspect the issues such as background noise, blurriness, or sharpness, which curbs the quality of dual-energy X-ray images. The current technology exercised for the examination of bags and baggage is "X-ray"; however, the results of the incumbent technology used show blurred and low contrast level images. This paper aims to improve the quality of X-ray images for a clearer vision of illegitimate or volatile substances. A dataset of 40 images was taken for the experiment, but for clarity, the results of only 13 images have been shown. The results were evaluated using MSE and PSNR metrics, where the average PSNR value of the proposed system compared to single X-ray images was increased by 19.3%, and the MSE value decreased by 17.3%. The results show that the proposed framework will help discern threats and the entire scanning process.