• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.024 seconds

Analysis of Security Attacks and Design of Defense Strategies Found in Smart Factory (스마트 팩토리 보안 사고 유형 분석 및 대안 프레임 제시)

  • Kim, Hyeonjin;Kim, Jinyeong;Paik, Juryon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.161-164
    • /
    • 2018
  • 최근 제조업의 근로 시간 단축 및 전문 노동력의 감소로 인하여 발생할 수 있는 문제를 개선할 수 있는 스마트 팩토리(Smart Factory)가 주목받고 있다. 스마트 팩토리는 생산품의 불량률을 줄이고, 숙련공 없이 비숙련공만으로 현장 가동이 가능하다는 점 등의 긍정적 효과를 기대할 수 있다. 그러나 스마트 팩토리는 높은 설비 도입 비용, 업무 시스템 재설계 등의 문제점이 등이 있으며, 특히 보안의 취약성이 심각하다. 그렇기 때문에 많은 기업이 현실에서 스마트 팩토리를 도입하는 어려움을 겪고 있다. 본 논문에서는 스마트 팩토리의 다양한 보안 사고를 유형 및 정형화시키고 여러 보안 사고를 유발하는 취약한 부분을 구체화하여 스마트 팩토리의 보안 연구의 방향성을 제시하고자 한다.

  • PDF

A Survey of Arabic Thematic Sentiment Analysis Based on Topic Modeling

  • Basabain, Seham
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.155-162
    • /
    • 2021
  • The expansion of the world wide web has led to a huge amount of user generated content over different forums and social media platforms, these rich data resources offer the opportunity to reflect, and track changing public sentiments and help to develop proactive reactions strategies for decision and policy makers. Analysis of public emotions and opinions towards events and sentimental trends can help to address unforeseen areas of public concerns. The need of developing systems to analyze these sentiments and the topics behind them has emerged tremendously. While most existing works reported in the literature have been carried out in English, this paper, in contrast, aims to review recent research works in Arabic language in the field of thematic sentiment analysis and which techniques they have utilized to accomplish this task. The findings show that the prevailing techniques in Arabic topic-based sentiment analysis are based on traditional approaches and machine learning methods. In addition, it has been found that considerably limited recent studies have utilized deep learning approaches to build high performance models.

Survey on Sustainable Smart Cities Development: Challenges and Solutions

  • Alotaibi, Youseef
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.108-118
    • /
    • 2021
  • This paper aims to presents the overview of research in the sustainable smart cities development domain. It investigates the key challenges of the sustainable smart cities development that faced by the developers from different countries. The qualitative research method via the interview is conducted to collect the data. 10 experts on the sustainable smart cities development project were interviewed in this study. The results indicate that there are 12 sustainable smart cities development challenges named: (1) budgetary constraint; (2) lack of resources; (3) lack of institutional capacity to deliver technology; (4) lack of systems integration; (5) social acceptability; (6) lack of awareness level in the smart city development among residents; (7) the need to drive towards content development; (8) lack of strategically approach in the smart city transformation; (9) disagreement on standardizing the smart city model; (10) lack of overarching institution to create the governance structure; (11) lack of sustainable focused strategies; and (12) lack of the smart city operational framework. Furthermore, the solutions framework for these challenges was proposed as the guidelines to overcome or minimize them.

A Study of Factors Affecting on Trust and Participation of Group Buying on the Internet (인터넷 공동구매의 신뢰와 참여에 영향을 미치는 요인에 관한 연구)

  • Jeon, Gun-Su;Lee, Young-Hun
    • Journal of Industrial Convergence
    • /
    • v.1 no.2
    • /
    • pp.107-124
    • /
    • 2003
  • With rapid growth and competition of electronic commerce through internet, various buying types and business models are being appeared. In this paper, we studied group buying which is new business model to consumer and factors affecting on trust and participation of group buying. The followings are the regression result of this study. First, familiarity factor, customer service factor, seal of security and product value factor made a significant effect on trust. Second, familiarity factor, perceived reputation factor, customer service factor, seal of security and product value factor made a significant effect on participation of group buying. Third, trust of group buying made a significant effect on participation of group buying. In this study, modeling and empirical test were implemented about structure of trust and participation of group buying. We can know where our group buying strategies should focus and which factor we should improve.

  • PDF

Big Data Platform Case Analysis and Deployment Strategies to Revitalize the Data Economy (데이터 경제 활성화를 위한 빅데이터 플랫폼 사례 분석 및 구축 전략)

  • Kim, Baehyun
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.73-78
    • /
    • 2021
  • Big data is a key driver of the fourth industrial revolution, represented by ultra-connected, ultra-intelligence, and ultra-convergence, and it is important to create innovation and share, link, and utilize data to discover business models. However, it is difficult to secure and utilize high-quality and abundant data when big data platforms are built in a regular manner without considering shared-linked. Therefore, this paper presents the development direction of big data platform infrastructure by comparing and analyzing various cases of big data platforms to enable data production, construction, linkage, and distribution.

Device to Device Communications Architectures and Cross-Layer Evaluation Frameworks

  • Aldabbagh, Ghadah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.152-161
    • /
    • 2021
  • The paper focuses on Device-to-device (D2D) Architectures evaluation frameworks. D2D communication and discovery can improve spectrum usage efficiency and optimize the tradeoffs between throughput and energy consumption. The target operation modes involve both indirect communication between two nodes via a base station or the direct communication among proximal nodes, enabling use cases that can support communications out of cellular coverage, as well as low end-end delay requirements. The paper will present the architectural evolution of D2D networks within 3GPP standardization and will highlight key network functionalities and signaling protocols. It will also identify key analytical and simulation models that can be used to assess the performance and energy efficiency of resource allocation strategies, and it will present a suitable cross-layer integrated framework.

Features of the Socio-Economic Development of the Countries of the World under the influence of the Digital Economy and COVID-19

  • Kryshtanovych, Svitlana;Prosovych, Olha;Panas, Yaroslav;Trushkina, Nataliia;Omelchenko, Vladyslav
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.9-14
    • /
    • 2022
  • The main purpose of the study is to determine the main features of the socio-economic development of the countries of the world under the influence of the digital economy and COVID-19. The modern world has already taken the first step towards a fundamentally new technological, economic and social reality. However, the challenges facing the modern industrial society cannot be overestimated. We are talking about changing the global socio-technological order, the consequence of which is a complete reformatting of the systems familiar to us, the formation of new social and economic strategies. the technological paradigm is immediately changing, management models and social norms are changing, large-scale demographic shifts are taking place. As a result of the study, key aspects of socio-economic development in the digital economy were identified.

Effects of Flipped Classroom Strategy on Students' Achievements in the Computer and Information Technology Course and Their Attitudes Towards It

  • Alqarni, Ali Suwayid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.157-164
    • /
    • 2021
  • This endeavor is an attempt to explore the effect of flipped classroom strategy (FCS) on (a) academic achievement in the computer and information technology course and (b) students' attitudes towards this strategy. The sample of the study consisted of 64 students, divided into two groups: experimental and control groups. Two instruments were used to collect the data: a test and a questionnaire. The test was used to measure the students' achievement and the questionnaire to measure their attitudes towards the FCS. The results show statistically significant differences at the level of 0.05 in support of the experimental group at all Bloom's levels. Similarly, students' positive attitude towards the FCS was evident. Therefore, expanding this strategy in different courses is highly recommended because it positively impacts students' achievements. Organizing workshops and designing courses that encourage teachers to implement the strategy in the classroom and develop their technical skills are also recommended.

Possibility of Inclusive Adaptation of The ABA Intervention at School

  • Saigh, Budor H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.83-88
    • /
    • 2022
  • Applied Behaviour Analysis (ABA) is the applied science where strategies are derived from the principles of behaviour and are applied to improve meaningful social behaviours [3]. This study investigates the possible inclusive value of the use ABA in schools in Saudi Arabia. Interviews were conducted with two ABA therapists and a support teacher in order to address this possibility. From the research findings, it emerged how ABA is one of the cognitive-behavioural intervention models and therefore, can be generalised to other disorders or diagnoses and the applied behavioural analysis does have an inclusive value as it structures individualized activities for the increase of both personal and social skills and these activities allow the subject to work on his or her skills, which are, however, absolutely preparatory to the inclusion of the subject in the classroom context.

Comparing Results of Classification Techniques Regarding Heart Disease Diagnosing

  • AL badr, Benan Abdullah;AL ghezzi, Raghad Suliman;AL moqhem, ALjohara Suliman;Eljack, Sarah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.135-142
    • /
    • 2022
  • Despite global medical advancements, many patients are misdiagnosed, and more people are dying as a result. We must now develop techniques that provide the most accurate diagnosis of heart disease based on recorded data. To help immediate and accurate diagnose of heart disease, several data mining methods are accustomed to anticipating the disease. A large amount of clinical information offered data mining strategies to uncover the hidden pattern. This paper presents, comparison between different classification techniques, we applied on the same dataset to see what is the best. In the end, we found that the Random Forest algorithm had the best results.