• Title/Summary/Keyword: Defense Model

Search Result 1,792, Processing Time 0.041 seconds

DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network

  • Chen, Tieming;Mao, Qingyu;Lv, Mingqi;Cheng, Hongbing;Li, Yinglong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.2180-2197
    • /
    • 2019
  • With the proliferation of the Android malicious applications, malware becomes more capable of hiding or confusing its malicious intent through the use of code obfuscation, which has significantly weaken the effectiveness of the conventional defense mechanisms. Therefore, in order to effectively detect unknown malicious applications on the Android platform, we propose DroidVecDeep, an Android malware detection method using deep learning technique. First, we extract various features and rank them using Mean Decrease Impurity. Second, we transform the features into compact vectors based on word2vec. Finally, we train the classifier based on deep learning model. A comprehensive experimental study on a real sample collection was performed to compare various malware detection approaches. Experimental results demonstrate that the proposed method outperforms other Android malware detection techniques.

A Study on the Modeling Method of Missile Fin Aerodynamic Coefficient using Wind Tunnel Test and CFD (풍동시험과 CFD 해석 결과를 반영한 유도무기 조종날개 공력계수 모델링 기법 연구)

  • Yim, Kyung Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.360-368
    • /
    • 2019
  • A study on aerodynamic modeling was performed to predict the hinge moments required for initial design of missile. Fin aerodynamic coefficients were modeled using the equivalent angle of attack method based on the wind tunnel test. In addition, CFD analysis was performed to calculate the dynamic pressure around the body and improve the accuracy of aerodynamic coefficients. The aerodynamic coefficient accuracy was verified by comparisons of the coefficient acquired from wind tunnel test and prediction of flow conditions, not involved in the model built-up. It was confirmed that fin aerodynamic coefficients can be predicted effectively by using the proposed method.

Optimal Guidance of Guided Projectile for Range Maximization with Boundary Condition on Fin Deployment Timing (조종날개 전개시점 경계조건을 포함한 지능화 탄약의 사거리 최대화 유도 기법)

  • Kim, Yongjae
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.68 no.1
    • /
    • pp.129-139
    • /
    • 2019
  • In order for a gun-launched guided projectile to glide to the maximum range, when to deploy the fin and start flight with guidance and control should be considered in range optimization process. This study suggests a solution to the optimal guidance problem for flight range maximization of the flight model of a guided projectile in vertical plane considering the aerodynamic properties. After converting the nonlinear Multi-Phase Optimal Control Problem to Two-Point Boundary Value Problem, the optimized guidance command and the best fin deployment timing are calculated by the proposed numerical method. The optimization results of the multiple flight rounds with various initial velocity and launch angle indicate that determining specific launch condition incorporated with the guidance scheme is of importance in terms of mechanical energy consumption.

Experimental Models for SARS-CoV-2 Infection

  • Kim, Taewoo;Lee, Jeong Seok;Ju, Young Seok
    • Molecules and Cells
    • /
    • v.44 no.6
    • /
    • pp.377-383
    • /
    • 2021
  • Severe acute respiratory syndrome-coronavirus 2 (SARS-CoV-2) is a novel virus that causes coronavirus disease 2019 (COVID-19). To understand the identity, functional characteristics and therapeutic targets of the virus and the diseases, appropriate infection models that recapitulate the in vivo pathophysiology of the viral infection are necessary. This article reviews the various infection models, including Vero cells, human cell lines, organoids, and animal models, and discusses their advantages and disadvantages. This knowledge will be helpful for establishing an efficient system for defense against emerging infectious diseases.

From Fragmented Development to Three-Dimensional and Coordinated Development - Research on Renewal Strategies of Existing Underground Commercial Space in Harbin

  • Xue, Minghui;Su, Yiming;Hu, Jiayu
    • International Journal of High-Rise Buildings
    • /
    • v.10 no.1
    • /
    • pp.17-28
    • /
    • 2021
  • In Harbin, a network of underground commercial spaces has been developed to occupy spaces that were originally created as civil defense shelters. With the gradual extension of the local metro rail system, the existing underground commercial space is no longer an isolated regional development, but a space that represents "three-dimensional city" and coordinated development taking place in many Chinese cities. Based on the analysis of the unique development process taken in underground space of Harbin, this paper summarizes three characteristics of its early model of "fragmented development" of underground space. By conducting a comprehensive field research and survey, the researchers analyzed 472 questionnaires related to the development trend, and proposed multi-level synergistic elements for the renewal and development of underground commercial space. The paper concludes by discussing the trend of "three-dimensional and collaborative development," suitable for the development needs of the new era, and the corresponding development strategies for the renewal of underground space.

A Study on Security Event Detection in ESM Using Big Data and Deep Learning

  • Lee, Hye-Min;Lee, Sang-Joon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.42-49
    • /
    • 2021
  • As cyber attacks become more intelligent, there is difficulty in detecting advanced attacks in various fields such as industry, defense, and medical care. IPS (Intrusion Prevention System), etc., but the need for centralized integrated management of each security system is increasing. In this paper, we collect big data for intrusion detection and build an intrusion detection platform using deep learning and CNN (Convolutional Neural Networks). In this paper, we design an intelligent big data platform that collects data by observing and analyzing user visit logs and linking with big data. We want to collect big data for intrusion detection and build an intrusion detection platform based on CNN model. In this study, we evaluated the performance of the Intrusion Detection System (IDS) using the KDD99 dataset developed by DARPA in 1998, and the actual attack categories were tested with KDD99's DoS, U2R, and R2L using four probing methods.

The soma-germline communication: implications for somatic and reproductive aging

  • Gaddy, Matthew A.;Kuang, Swana;Alfhili, Mohammad A.;Lee, Myon Hee
    • BMB Reports
    • /
    • v.54 no.5
    • /
    • pp.253-259
    • /
    • 2021
  • Aging is characterized by a functional decline in most physiological processes, including alterations in cellular metabolism and defense mechanisms. Increasing evidence suggests that caloric restriction extends longevity and retards age-related diseases at least in part by reducing metabolic rate and oxidative stress in a variety of species, including yeast, worms, flies, and mice. Moreover, recent studies in invertebrates - worms and flies, highlight the intricate interrelation between reproductive longevity and somatic aging (known as disposable soma theory of aging), which appears to be conserved in vertebrates. This review is specifically focused on how the reproductive system modulates somatic aging and vice versa in genetic model systems. Since many signaling pathways governing the aging process are evolutionarily conserved, similar mechanisms may be involved in controlling soma and reproductive aging in vertebrates.

Method for Robust Ground Ranging Using Monopulse Radar in Heterogeneous Clutter Environment (모노펄스 레이다를 이용한 비균질 클러터 환경에서의 강건한 지면거리측정 방법)

  • Son, Jegyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.6
    • /
    • pp.602-609
    • /
    • 2021
  • Aircraft radar has special function which is ranging from aircraft to ground of antenna boresight. Because ranging information is used to calibrate altitude of aircraft or to drop a conventional bomb, the measuring have to be precise and robust. Therefore, we propose a simple and efficient method using monopulse radar for ground ranging. Proposed method calculates balancing weight according to linearity of monopulse ratio and mixes two ranging measurements in proportional to the weight. By exploiting balancing weight, radar is able to react to various environment as monopulse ratio contains characteristics of clutter environment. As a result, robust ranging information can be achieved. We use DEM(Digital Elevation Model) in order to simulate heterogeneous environment. In experimental result, it is shown that proposed method shows better accuracy and precision in any environment.

Locality Aware Multi-Sensor Data Fusion Model for Smart Environments (장소인식멀티센서스마트 환경을위한 데이터 퓨전 모델)

  • Nawaz, Waqas;Fahim, Muhammad;Lee, Sung-Young;Lee, Young-Koo
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.78-80
    • /
    • 2011
  • In the area of data fusion, dealing with heterogeneous data sources, numerous models have been proposed in last three decades to facilitate different application domains i.e. Department of Defense (DoD), monitoring of complex machinery, medical diagnosis and smart buildings. All of these models shared the theme of multiple levels processing to get more reliable and accurate information. In this paper, we consider five most widely acceptable fusion models (Intelligence Cycle, Joint Directors of Laboratories, Boyd control, Waterfall, Omnibus) applied to different areas for data fusion. When they are exposed to a real scenario, where large dataset from heterogeneous sources is utilize for object monitoring, then it may leads us to non-efficient and unreliable information for decision making. The proposed variation works better in terms of time and accuracy due to prior data diminution.

A Study of AI model extraction attack and defense techniques (AI 모델 탈취 공격 및 방어 기법들에 관한 연구)

  • Jun, So-Hee;Lee, Young-Han;Kim, Hyun-Jun;Paek, Yun-Heung
    • Annual Conference of KIPS
    • /
    • 2021.05a
    • /
    • pp.382-384
    • /
    • 2021
  • AI (Artificial Intelligence)기술이 상용화되면서 최근 기업들은 AI 모델의 기능을 서비스화하여 제공하고 있다. 하지만 최근 이러한 서비스를 이용하여 기업이 자본을 투자해 학습시킨 AI 모델을 탈취하는 공격이 등장하여 위협이 되고 있다. 본 논문은 최근 연구되고 있는 이러한 모델 탈취 공격들에 대해 공격자의 정보를 기준으로 분류하여 서술한다. 또한 본 논문에서는 모델 탈취 공격에 대응하기 위해 다양한 관점에서 시도되는 방어 기법들에 대해 서술한다.