• 제목/요약/키워드: Defenses

검색결과 161건 처리시간 0.028초

Functional Genomics of Vibrio vulnificus: from Survival to Toxigenesis

  • Choi Sang Ho
    • 한국미생물학회:학술대회논문집
    • /
    • 한국미생물학회 2004년도 International Meeting of the Microbiological Society of Korea
    • /
    • pp.132-136
    • /
    • 2004
  • Understanding the molecular pathogenesis of the multifaceted host-pathogen interaction is critical in the development of improved treatment and prevention, as well as elucidating how certain bacteria can circumvent host defenses, multiply in the host, and cause such extensive damage. Disease caused by infection with V. vulnificus is remarkable for the invasive nature of the infection, ensuing severe tissue damage, and rapidly fulminating course. The characterization of somatic as well as secreted products of V. vulnificus has yielded a large list of putative virulence attributes, whose known functions are easily imagined to explain the pathology of disease. These putative virulence factors include a carbohydrate capsule, lipopolysaccharide, a cytolysin/hemolysin, elastolytic metalloprotease, iron sequestering systems, lipase, and pili. However, only few among the putative virulence factors has been confirmed to be essential for virulence by the use of molecular Koch's postulates. This presentation describes molecular biological characterization of the virulence factors contributing to survival as well as to toxigenesis of V. vulnificus.

  • PDF

코드 재사용 공격과 방어의 발전에 관한 연구 (A Study on Development of Code Reuse Attacks and Defenses)

  • 안선우;이영한;방인영;백윤흥
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2017년도 추계학술발표대회
    • /
    • pp.275-278
    • /
    • 2017
  • 과거의 가장 흔한 공격이었던 코드 삽입 공격은 방어 기법이 발전함에 따라 점점 어려워지고 있다. 공격자는 코드를 삽입하지 않고도 공격할 수 있는 방법을 찾기 시작하였고, 공격 대상에 존재하는 코드를 연결하여 원하는 동작을 실행하게 만드는 코드 재사용 공격을 하기 시작했다. 코드 재사용 공격을 막는 방어 기법 역시 제안되었지만, 다시 이를 우회하는 발전된 코드 재사용 공격들도 나오면서 공격과 방어를 거듭하고 있다. 본 논문에서는 코드 재사용 공격의 전신인 return into libc 부터 Data Oriented Programming (DOP)까지의 공격과 방어를 정리하고, 코드 재사용 공격이 발전되는 과정을 살펴보는 것을 목표로 한다.

혼합정수계획법을 이용한 항공기-목표물 최적할당에 관한 연구 (The Optimal Allocation of Aircrafts to Targets by Using Mixed Integer Programming)

  • 이대력;양재환
    • 경영과학
    • /
    • 제25권1호
    • /
    • pp.55-74
    • /
    • 2008
  • In recent warfare, the performance improvement of air weapon systems enables an aircraft to strike multiple targets on a single sortie. Further, aircrafts attacking targets may carry out an operation as a strike package that is composed of bombers, escort aircrafts, SEAD (Suppression of Enemy Air Defenses) aircrafts and etc. In this paper, we present an aircraft allocation model that allocates multiple targets to a single sortie in the form of a strike package. A mixed integer programming is developed and solved by using a commercially available software. The new model is better than existing ones because not only it allocates aircrafts to multiple targets but also it models the concept of the strike package. We perform a computational experiment to compare the result of the new model with that of existing ones, and perform sensitivity analysis by varying a couple of important parameters.

이상홍수 취약성 평가 시스템의 개발 (Development of Flood Vulnerability Index Estimation System)

  • 장대원;김병식;김보경;양동민;서병하
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2008년도 학술발표회 논문집
    • /
    • pp.410-413
    • /
    • 2008
  • We constructed the regional flood risk and damage magnitude using hazard and vulnerabilities which are climatic, hydrological, socio-economic, countermeasure, disaster probability components for DB construction on the GIS system. Also we developed the Excess Flood Vulnerability index estimation System(EFVS). By the construction of the System, we can perform the scientific flood management for the flood prevention and optional extreme flood defenses according to regional characteristics. In order to evaluate the performance of system, we applied EFVS to Anseong-chen in Korea, and the system's stabilization is appropriate to flood damage analysis.

  • PDF

Business Process Reengineering of an Information Exchange Management System for a Nationwide Cyber Threat Intelligence

  • Pramadi, Yogha Restu;Rosmansyah, Yousep;Kim, Myonghee;Park, Man-Gon
    • 한국멀티미디어학회논문지
    • /
    • 제20권2호
    • /
    • pp.279-288
    • /
    • 2017
  • Nowadays, nations cyber security capabilities play an important role in a nation's defense. Security-critical infrastructures such as national defenses, public services, and financial services are now exposed to Advanced Persistent Threats (APT) and their resistance to such attacks effects the nations stability. Currently Cyber Threat Intelligence (CTI) is widely used by organizations to mitigate and deter APT for its ability to proactively protect their assets by using evidence-based knowledge. The evidence-based knowledge information can be exchanged among organizations and used by the receiving party to strengthen their cyber security management. This paper will discuss on the business process reengineering of the CTI information exchange management for a nationwide scaled control and governance by the government to better protect their national information security assets.

Molecular Characterization of Survival and Toxigenesis of Vibrio vulnificus

  • Choi Sang Ho
    • 한국미생물학회:학술대회논문집
    • /
    • 한국미생물학회 2002년도 추계학술대회
    • /
    • pp.56-58
    • /
    • 2002
  • Understanding the molecular pathogenesis of the multifaceted host-pathogen interaction is critical in the development of improved treatment and prevention, as well as elucidating how certain bacteria can circumvent host defenses, multiply in the host, and cause such extensive damage. Disease caused by infection with V. vulnificus is remarkable for the invasive nature of the infection, ensuing severe tissue damage, and rapidly fulminating course. The characterization of somatic as well as secreted products of V. vulnificus has yielded a large list of putative virulence attributes, whose known functions are easily imagined to explain the pathology of disease. These putative virulence factors include a carbohydrate capsule, lipopolysaccharide, a cytolysin/hemolysin, elastolytic metalloprotease, iron sequestering systems, lipase, and pili. However, only few among the putative virulence factors has been confirmed to be essential for virulence by the use of molecular Koch's postulates. This presentation describes molecular biological characterization of the virulence factors contributing to survival as well as to toxigenesis of V. vulnificus.

  • PDF

Soft Systems are Ubiquitous-Defenses are Rare: A Case for Contingent Outsourcing of Patch Management

  • Arnett Kirk P.
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제14권3호
    • /
    • pp.23-30
    • /
    • 2005
  • Computer attacks on vulnerable software are ubiquitous. Today's attacks on client PCs can be used to create armies of zombie computers that are capable of wide reach attacks on high profile businesses and governments. The simple act of patching software vulnerabilities will certainly mitigate this problem, but patching has its own set of problems. Further, it is frequently the case that patches which are available to mitigate vulnerabilities are not being made on a timely basis and sometimes are not being made at all. One solution to the patch management dilemma is outsourcing. This paper notes that outsourcing is not a carte blanche decision that can be made based on dollars, but rather that a contingency decision matrix can provide guidance on outsourcing solutions for patch management and other security components as well. The matrix recognizes that IS staff expertise and employee security awareness are two important factors in the outsourcing decision.

  • PDF

Mechanism on the development of periapical lesion - Effect of whole-body diseases on the development of periradicular lesions in rats

  • Nakamura, Hiroshi
    • 대한치과보존학회:학술대회논문집
    • /
    • 대한치과보존학회 2003년도 제120회 추계학술대회 제 5차 한ㆍ일 치과보존학회 공동학술대회
    • /
    • pp.591-591
    • /
    • 2003
  • Apical periodontitis is inflammation of the periodontium caused by infection of the pulp canal system. Moreover, a dental periradicular lesion occurs as a periradicular tissue reaction to bacterial infection and consists of periradicular inflammation with alveolar bone destruction and root resorption, a consequence of the interaction between oral flora and the existing host defenses. Many investigations dealing with the pathogenesis and history of periradicular lesions have described histologically, immunologically, biochemically the development of the periradicular lesion;but none of these studies have shown any correlation between this lesion and several factors, the whole body disease in the worldwide.(omitted)

  • PDF

Surgical Informed Consent Process in Neurosurgery

  • Park, Jaechan;Park, Hyojin
    • Journal of Korean Neurosurgical Society
    • /
    • 제60권4호
    • /
    • pp.385-390
    • /
    • 2017
  • The doctrine of informed consent, as opposed to medical paternalism, is intended to facilitate patient autonomy by allowing patient participation in the medical decision-making process. However, regrettably, the surgical informed consent (SIC) process is invariably underestimated and reduced to a documentary procedure to protect physicians from legal liability. Moreover, residents are rarely trained in the clinical and communicative skills required for the SIC process. Accordingly, to increase professional awareness of the SIC process, a brief history and introduction to the current elements of SIC, the obstacles to patient autonomy and SIC, benefits and drawbacks of SIC, planning of an optimal SIC process, and its application to cases of an unruptured intracranial aneurysm are all presented. Optimal informed consent process can provide patients with a good comprehension of their disease and treatment, augmented autonomy, a strong therapeutic alliance with their doctors, and psychological defenses for coping with stressful surgical circumstances.

ROS와 픽스호크를 활용한 이기종 무인 이동체간 통합 시뮬레이션 환경 구축 (Integrated Simulation Environment for Heterogeneous Unmanned Vehicle using ROS and Pixhawk)

  • 김형민;이대우
    • 한국항공운항학회지
    • /
    • 제27권3호
    • /
    • pp.1-14
    • /
    • 2019
  • Cooperative systems among various unmanned vehicles are widely used in various field and emerging. Unmanned vehicles are able to operate various missions without operator onboard and they are highly stable. Collaborative work of multiple unmanned vehicles is emphasized due to the difficulty of recent missions such as SEAD (Suppression of the Enemy Air Defenses), MUSIC (Manned Unmanned Systems Integration Capability), goldentime in the rescue mission. In this study, ROS and Pixhawk were proposed as a method of construction of a collaboration system and framework for an integrated simulation environment for heterogeneous unmanned vehicles is proposed. Totally 5 unmanned vehicles were set for the simulation for the observation of illegal fishing boats. This paper shows the feasibility of the cooperative system using ROS and Pixhawk through the simulation and the experiment.