• Title/Summary/Keyword: Digital techniques

Search Result 2,228, Processing Time 0.027 seconds

Enhancing the Cybersecurity Checklist for Mobile Applications in DTx based on MITRE ATT&CK for Ensuring Privacy

  • Gee-hee Yun;Kyoung-jin Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.15-24
    • /
    • 2023
  • Digital therapeutics (DTx) are utilized to replace or supplement drug therapy to treat patients. DTx are developed as a mobile application for portability and convenience. The government requires security verification to be performed on digital medical devices that manage sensitive information during the transmission and storage of patient data. Although safety verification is included in the approval process for DTx, the cybersecurity checklist used as a reference does not reflect the characteristics of mobile applications. This poses the risk of potentially overlooking vulnerabilities during security verification. This study aims to address this issue by comparing and analyzing existing items based on the mobile tactics, techniques, and procedures of MITRE ATT&CK, which manages globally known and occurring vulnerabilities through regular updates. We identify 16 items that require improvement and expand the checklist to 29 items to propose improvement measures. The findings of this study may contribute to the safe development and advancement of DTx for managing sensitive patient information.

Survey of Fake News Detection Techniques and Solutions (가짜뉴스 판별 기법 및 해결책 고찰)

  • Lee, HyeJin;Kim, Jinyoung;Paik, Juryon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.37-39
    • /
    • 2020
  • 인터넷 상에서의 허위정보 생산과 유통은 주로 가짜 뉴스를 통하여 이루어진다. 과거에는 신문이나 공중파 TV등 뉴스 기사의 생산과 유통이 매우 제한적이었지만 지금은 인터넷의 발달로 누구나 쉽게 뉴스를 생산하고 유통할 수 있다. 뉴스 생산의 용이성은 정보 공유의 즉각성과 수월성이라는 장점을 제공하지만 반대로 불확실한 뉴스 남발로 인한 정보의 신뢰성 하락과 선량한 피해자를 양산하는 단점 또한 존재한다. 이는 가짜 뉴스가 사회적 문제로 대두되고 있는 이유이다. 에이전트나 스파이더 등의 소프트웨어를 통해 인터넷으로 급속도로 전파되는 가짜 뉴스를 전통 방식인 소수의 전문가가 수동으로 잡아내는 것은 불가능하다. 이에 기술발달로 잡아내기 힘들어진 가짜뉴스에 대해, 역으로 발달된 기술을 활용하여 잡아내려는 시도가 늘어나고 있다. 본 논문에서는 가짜뉴스를 판별하는 다양한 기법들을 탐색하고 해결방안을 제시하고자 한다.

  • PDF

Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review

  • Abdullahi Aminu, Kazaure;Aman Jantan;Mohd Najwadi Yusoff
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.4
    • /
    • pp.14-39
    • /
    • 2023
  • Cybercrime is a significant threat to Internet users, involving crimes committed using computers or computer networks. The landscape of cyberspace presents a complex terrain, making the task of tracing the origins of sensitive data a formidable and often elusive endeavor. However, tracing the source of sensitive data in online cyberspace is critically challenging, and detecting cyber-criminals on the other hand remains a time-consuming process, especially in social networks. Cyber-criminals target individuals for financial gain or to cause harm to their assets, resulting in the loss or theft of millions of user data over the past few decades. Forensic professionals play a vital role in conducting successful investigations and acquiring legally acceptable evidence admissible in court proceedings using modern techniques. This study aims to provide an overview of forensic investigation methods for extracting digital evidence from computer systems and mobile devices to combat persistent cybercrime. It also discusses current cybercrime issues and mitigation procedures.

Research on Digital Construction Site Management Using Drone and Vision Processing Technology (드론 및 비전 프로세싱 기술을 활용한 디지털 건설현장 관리에 대한 연구)

  • Seo, Min Jo;Park, Kyung Kyu;Lee, Seung Been;Kim, Si Uk;Choi, Won Jun;Kim, Chee Kyeung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2023.11a
    • /
    • pp.239-240
    • /
    • 2023
  • Construction site management involves overseeing tasks from the construction phase to the maintenance stage, and digitalization of construction sites is necessary for digital construction site management. In this study, we aim to conduct research on object recognition at construction sites using drones. Images of construction sites captured by drones are reconstructed into BIM (Building Information Modeling) models, and objects are recognized after partially rendering the models using artificial intelligence. For the photorealistic rendering of the BIM models, both traditional filtering techniques and the generative adversarial network (GAN) model were used, while the YOLO (You Only Look Once) model was employed for object recognition. This study is expected to provide insights into the research direction of digital construction site management and help assess the potential and future value of introducing artificial intelligence in the construction industry.

  • PDF

Security-Aware Optimized Link Routing Protocol for Mobile Ad-Hoc Networks

  • Dhir, Amandeep;Sengupta, Jyotsna
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.52-83
    • /
    • 2009
  • In this technical report, we have examined the basic building blocks of mobile ad-hoc networks. The paper discusses various security requirements of ad-hoc networks, attacks in ad-hoc networks, Security Implementation and Routing Protocols. The primary purpose of the paper is to address the Optimized Link State Routing (OLSR) protocol in detail, along with the various possible attacks. Finally, algorithms for securing OLSR are proposed, via the addition of digital signatures, as well as more advanced techniques such as cross checking of advertised routing control data with the node's geographical position. The main aim of this research work is the addition of security features to the existing OLSR protocol. In order to effectively design a secure routing protocol, we present a detailed literature survey of existing protocols, along with the various attacks. Based on the information gathered from the literature survey, a secure routing protocol for OLSR is proposed. The proposed secure routing protocol involves the addition of a digital signature as well as more advanced techniques such as the reuse of previous topology information to validate the actual link state. Thus, the main objective of this work is to provide secure routing and secure data transmission.

A Techniques to Conceal Information Using Eojeol in Hangul Text Steganography (한글 텍스트 스테가노그래피에서 어절을 이용한 정보은닉 기법)

  • Ji, Seon Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.5
    • /
    • pp.9-15
    • /
    • 2017
  • In the Digital Age, All Data used in the Internet is Digitized and Transmitted and Received Over a Communications Network. Therefore, it is Important to Transmit Data with Confidentiality and Integrity, Since Digital Data may be Tampered with and Tampered by Illegal users. Steganography is an Efficient Method for Ensuring Confidentiality and Integrity Together with Encryption Techniques. I Propose a Hangul Steganography Method that Inserts a Secret Message based on a Changing Insertion Position and a Changing Eojeol Size in a Cover Medium. Considering the Insertion Capacity of 3.35% and the File Size Change of 0.4% in Hangul Text Steganography, Experimental Results Show that the Jaro_score Value needs to be Maintained at 0.946.

Accurate Assembly and Concurrent Design of Airframe Structures (항공기체구조의 정밀조립 및 동시설계 기술)

  • Park, Mun-Sik
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.24 no.4 s.175
    • /
    • pp.811-823
    • /
    • 2000
  • In design and manufacturing airframe structures which are composed of a lot of sub-assemblies and large complex profile shapes it is difficult to reduce so called hardware variations. Accordingly cost increasing factors for manufacturing airframe parts are much more than other machine parts because of the variability of fabricated details and assemlies. To improve cost and quality, accurate assembly methods and DPD techniques are proposed in this paper which are based upon using CAD/CAM techniques, the concept of KC's and the coordinated datum and index throughout the design, tooling, manufacturing and inspection. The proposed methods are applied to produce fuselage frame assemblies and related engineering aspects are described regarding the design of parts and tools in the context of concurrent digital definition. First articles and consequent mass production of frame assemblies shows a great improvement of the process capability ratio from 0.7 by the past processes to 1.0 by the proposed methods in addition to the cost reduction due to the less number of tools, reduced total assembly times and the space compaction needed by massive inventory. The need to achieve better Cpk, however, and future studies to be investigated will be addressed briefly.

Performance Improvement on Hearing Aids Via Environmental Noise Reduction (배경 잡음 제거를 통한 보청 시스템의 성능 향상)

  • 박선준;윤대희;김동욱;박영철
    • The Journal of the Acoustical Society of Korea
    • /
    • v.19 no.2
    • /
    • pp.61-67
    • /
    • 2000
  • Recent progress in digital and VLSI technology has offered new possibility fer noticeable advance of hearing aids. Yet, environmental noise remains one of the major problems to hearing aid users. This paper describes results which speech recognition performance and speech discrimination performance was measured for listeners with sensorineural hearing loss, while listeners in speech-band noise. In addition, to ameliorate hearing-aided environments of hearing impaired listeners, environmental noise reduction using speech enhancement techniques are investigated as a front-end of conventional hearing aids. Speech enhancement techniques are implemented in a realtime system equipped with DSP board. The clinical test results suggest that the speech enhancement technique may work in synergy with gain functions fer the greater SNR improvement as the preprocessing algorithm of digital hearing aids.

  • PDF

An estimation technique for nonlinear distortion in high-density magnetic recording channels (고밀도 자기 기록 채널의 비선형 왜곡 추정 기법)

  • 이남진;오대선;조용수;김기호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2439-2450
    • /
    • 1997
  • As recording densities increase in digital magnetic recording channels, the performances of digital detection techniques such as PRML and DFE degrade significantly due to nonlinear distortion in recording channels. The primary impediments for hgih-density recording are generally classified as nonlinear transition shift, which can be reduced substantially by the precompensation technique, and partial erasure which usually requires sophisticated nonlinear equalization techniques. In order to acheieve the highest density recording, accurate estimation of the parameters associated with these two noninear distortions is crucial. In this paper, a new estimation technique to distinguish these two different nonlinear effect using a proposed adaptive algorithm in time domain is presented. The effectiveness of the proposed adaptive approach to identify uniquely the nonlinear parameter with bias is demonstrated by computer simulation.

  • PDF

A Study on the Women's Hair Jewelry of Chosun Dynasty and a Plan for its Cultural Contents (조선시대 여성수식장신구 연구 및 문화콘텐츠화 방안)

  • Chung, A Young
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2010.05a
    • /
    • pp.483-484
    • /
    • 2010
  • Accessories originated from men's ornamental instinct in the beginning as a body ornament. Women's accessories in the Joseon Dynasty have splendid structure and rich symbolism, so they are enough to be a target of the study for being contents of Korea's cultural archetype. Traditional accessories are the foundation of excellent formative and functional characteristics due to the extreme beauty of crafts. This study aims to develop archetype of excellent formative factors by making traditional accessories digitalized for perpetuation in order to apply them to the culture industry. In addition, it is to prepare the educational foundation by reinterpreting traditional accessories in a modern way. Therefore, this researcher intends to develop constituents of traditional accessories by means of digital images and suggest digital contents methods of accessory techniques by dividing constituents, techniques, materials, symbolic meaning, and attire and wear.

  • PDF