• Title/Summary/Keyword: misuse

Search Result 414, Processing Time 0.03 seconds

A Statistical Approach for the Determination of Location and Range of Fishing Grounds in the Coastal Vessel Fishery (통계학적 접근에 의한 연안어업의 조업어장 위치 및 범위결정 에 관한 연구)

  • Kang, Y.J.;Kim, K.S.;Yi, S.B.
    • The Journal of Fisheries Business Administration
    • /
    • v.38 no.1 s.73
    • /
    • pp.97-113
    • /
    • 2007
  • This study attempts to suggest a new approach of the the determination of location and range of fishing ground in the coastal vessel fishery using the anaiysis of variance(ANOVA) and least significant difference test(LSD test) in statistics. The important result of the empirical study is that there is no significant difference in fisfishing ground based on between fishermen's argument and spot investigation. But there is stastitically significant difference in fisfishing ground based on between fishermen's argument and the official documents of fishing records for past three years. The results suggest us that there exists a possibility of misuse of tax free oil providied for subsidizing fisheries. But because of the range limitation of data, it is impossible for us to generalize the above results.

  • PDF

A Implement of Web-Mail System based on Intranet (인트라넷 기반의 웹 메일 시스템 구현)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2346-2352
    • /
    • 2011
  • E-mail systems using the intranet is widely exposed to internal threats should an administrator or a third party decides to misuse the information. To solve this problem, we propose a safe intranet email encryption protocol using the symmetrical-key password algorithm. Since the proposed protocol encrypts the data using a pre-agreed session keys between the users, the data will be safe from malignant access attempts provided that the session key is not exposed.

Fuzzing of Web Application Server Using Known Vulnerability Information and Its Verification (알려진 취약점 정보를 활용한 웹 애플리케이션 서버 퍼징 및 검증)

  • Kim, Gi-Youn;Cho, Seong-Je
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.181-184
    • /
    • 2011
  • 소프트웨어와 인터넷 연결이 일반화되고 소프트웨어 규모가 복잡해짐에 따라, 소프트웨어 보안 취약점 발생 수 및 관련 보안 사고가 나날이 증가하고 있다. 소프트웨어 보안 사고를 예방하기 위한 하나의 방법은 소프트웨어 개발 단계에서 취약점을 발견하여 제거하는 것이다. 이에 본 논문에서는 취약점 발견에 사용되는 대표적 테스팅 기법인 퍼징에 대해 연구하였다. 먼저, 웹 애플리케이션 서버와 관련된 기존의 공개된 취약점 정보를 분석하여 퍼징에 필요한 오용 케이스(misuse case) 생성 방법을 보인다. 생성된 오용 케이스는 URL과 HTTP 요청 메시지의 각 필드에 대한 테스팅 정보를 포함하고 있으며, 이 오용 케이스를 웹 애플리케이션 서버에 퍼징하여 실제 보안 관련 결함이 나타남을 확인하였다.

Development of Measurement Assurance Test Procedures between Calibrations (계기 검교정간의 보증시험 절차의 개발)

  • Yum, Bong-Jin;Cho, Jae-Gyeun;Lee, Dong-Wha
    • IE interfaces
    • /
    • v.6 no.1
    • /
    • pp.55-65
    • /
    • 1993
  • A nonstandard instrument used in the filed frequently becomes out-of-calibration due to environmental noise, misuse, aging, etc. A substantial amount of loss may result if such nonstandard instrument is used to check product quality and performance. Traditional periodic calibration at the calibration center is not capable of detecting out-of-calibration status while the instrument is in use, and therefore, statistical methods need to be developed to check the status of a nonstandard instrument in the field between calibrations. Developed in this paper is a unified measurement assurance model in which statistical calibration at the calibration center and measurement assurance test in the filed are combined. We developed statistical procedures to detect changes in precision and in the coefficients of the calibration equation. Futher, computational experiments are conducted to evaluate how the power of test varies with respect to the parameters involved. Based upon the computational results we suggest procedures for designing effective measurement assurance tests.

  • PDF

RSA에 사용된 파라메터들에 관한 고찰

  • 이희정
    • Journal for History of Mathematics
    • /
    • v.16 no.3
    • /
    • pp.101-108
    • /
    • 2003
  • The RSA cryptosystem is most commonly used for providing privacy and ensuring authenticity of digital data. 1'his system is based on the difficulty of integer factoring. Many attacks had been done, but none of them devastating. They mostly illustrate the dangers of improper use of RSA. Improper use implies many aspects, but here we imply the misuse of the parameters of RSA. Specially, sizes of parameters give strong effects on the efficiency and the security of the system. Parameters are also related each other. We analyze the relation of them. Recently many researchers are interested in side-channel attacks. We also investigate partial key exposure attacks, which was motivated by side-channel attacks. If a fraction of tile secret key bits is revealed, the private key will be reconstructed. We also study mathematical background of these attacks, solving modular multivariate polynomial equations.

  • PDF

Consideration on Role and Functions of Game Rating Board (게임물등급위원회의 발전방향 모색)

  • Kim, Chan-Soo;Park, Tae-Soon
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.114-122
    • /
    • 2007
  • Recently, Game Rating Board has been established. It is to follow worldwide trend in building up publicity, autonomy and professionalism under the framework to assure freedom of expression. This article analyzed major nation's game rating system, and showed some points to need improvement which are to have more detailed classification in game rating, to modify contents descriptor, to appoint committee members with expertise on game, to revise articles to be capable of misuse, and to become a nongovernmental organization.

Cause Analysis and Removal of Boundary Artifacts in Image Deconvolution

  • Lee, Ji-Yeon;Lee, Nam-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.838-848
    • /
    • 2014
  • In this paper, we conducted a cause analysis on boundary artifacts in image deconvolution. Results of the cause analysis show that boundary artifacts are caused not only by a misuse of boundary conditions but also by no use of the normalized backprojection. Results also showed that the correct use of boundary conditions does not necessarily remove boundary artifacts. Based on these observations, we suggest not to use any specific boundary conditions and to use the normalized backprojector for boundary artifact-free image deconvolution.

An Online Response System for Anomaly Traffic by Incremental Mining with Genetic Optimization

  • Su, Ming-Yang;Yeh, Sheng-Cheng
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.375-381
    • /
    • 2010
  • A flooding attack, such as DoS or Worm, can be easily created or even downloaded from the Internet, thus, it is one of the main threats to servers on the Internet. This paper presents an online real-time network response system, which can determine whether a LAN is suffering from a flooding attack within a very short time unit. The detection engine of the system is based on the incremental mining of fuzzy association rules from network packets, in which membership functions of fuzzy variables are optimized by a genetic algorithm. The incremental mining approach makes the system suitable for detecting, and thus, responding to an attack in real-time. This system is evaluated by 47 flooding attacks, only one of which is missed, with no false positives occurring. The proposed online system belongs to anomaly detection, not misuse detection. Moreover, a mechanism for dynamic firewall updating is embedded in the proposed system for the function of eliminating suspicious connections when necessary.

Consciousness of Drivers Concerning Pseudo petroleum and the Status in Gimpo Area (김포지역 운전자를 중심으로 한 유사석유류에 대한 인식과 사용실태 연구)

  • Sung, Jin-Woo;Son, Ki-Sang
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.1
    • /
    • pp.63-69
    • /
    • 2010
  • This study is to find out why drivers used to put pseudo-petroleum in their cars and to fundamentally remove any accidents from the misuse. Questionnaire survey has been made in Gimpo area where many drivers can use it comparatively easily outside of Seoul. And they are analyzed statistically using SPSS 12.0 package program. Correlation factor is shown with 0.683, very high relationship between using frequency and use period of cars. It is shown that important factor to give impact to consumer attitude has been produced as car-using period, education level. The longer the cars have been used, the more pseudo petroleum has been used, it is found.

A Study on Concentration of Volatile Organic Compounds in the Apartment House (실내공기중의 휘발성유기화합물 농도변화에 관한 연구)

  • Lee, Yun-Gyu
    • KIEAE Journal
    • /
    • v.4 no.3
    • /
    • pp.129-136
    • /
    • 2004
  • Recently, indoor air pollution has been seriously apprehended, and became a striking issue, due to the airtightness of buildings or the misuse of building materials. Especially, SHS(Sick House Syndrome) and MCS(Multi Chemical Sensitivity) which can have bad influences on the resident in an existing apartment house as well as newly constructed apartment house start to attract public attention. The emission rates of VOCs is sensitively affected by the indoor/outdoor condition, construction materials, construction method, and character of ventilation facilities. Therefore, in this study, by measuring the indoor air pollution substance of the existing apartment house, the problem over this tends to be grasped and it is going to secure an improvement methods.