• Title/Summary/Keyword: intelligent security

Search Result 723, Processing Time 0.03 seconds

User Authentication Risk and Countermeasure in Intelligent Vehicles (지능형 자동차의 사용자 인증에 대한 위협 및 대응 기법)

  • Kim, Seung-Hwan;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.7-11
    • /
    • 2012
  • Intellgent Vehles network capabilities can cause a lots of security issues such as data hacking, privacy violation, location tracking and so on. Some possibilities which raise a breakdown or accident by hacking vehicle operation data are on the increase. In this paper, we propose a security module which has user authentication and encryption functionalities and can be used for vehicle network system.

A Single Server-based Secure Electronic Sealed-Bid Auction Method (단일 서버 기반의 안전한 봉인경매 기법)

  • Lee, Keon-Myung;Kim, Dong-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.6
    • /
    • pp.678-686
    • /
    • 2004
  • This paper presents a new method to securely conduct online sealed-bid auctions with a single auctioneer server The sealed-bid auctions have several vulnerable security problems when they are performed on the Internet. One of such problems is the trust establishment between an auctioneer and bidders who participate in an auction. Several online sealed-bid auction methods have been developed to address this trust problem. The proposed method solves the security problems that would happen in the sealed-bid auction using a blind signature scheme and a contract signature protocol. It prevents the auctioneer from illegally manipulating the bidders' bidding information, repudiating the reception of some bid, manipulating the auction period, and illegally adding or deleting bids. In addition, it keeps the bidders from modifying the bidding information after issuing their bid and doing intentional mistake to invalidate their own bid. The method can be easily implemented using the multiagent architecture.

Privacy-preserving Approach in Blockchain-based e-Commerce Systems (블록체인 기반 전자상거래 시스템에서의 개인정보보호 적용 방안)

  • Jinsue Lee;Jihye Kim;Jong-Hyouk Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.425-426
    • /
    • 2024
  • 블록체인 기반 전자상거래 시스템은 탈중앙화된 P2P(Peer-to-Peer) 방식으로 데이터를 처리하고 합의 메커니즘을 통해 동기화되는 분산원장에 기록할 수 있다. 그러나, P2P 운영에 기반하여 전자상거래 과정에서 파생되는 고객의 외부 노출에 민감한 정보로 인해 고객의 개인정보가 공개되거나 유출되는 위협이 발생할 수 있다. 이에 따라, 본 논문에서는 블록체인 기반 전자상거래 시스템에서 고객의 개인정보를 보호하기 위한 PET(Privacy Enhancing Technology)를 식별하고, 블록체인 기반 전자 상거래 시스템에 적용하기 위한 방안을 분석한다.

Analyses of Security for Software Attack (소프트웨어 공격에 대한 보안성 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.725-728
    • /
    • 2007
  • Software security is about making software behave correctly in the presence of a malicious attack, even though software failures usually happen spontaneously in the real world. Standard software testing literature is concerned only with what happens when software fails, regardless of intent. The difference between software safety and software security is therefor the presence of an intelligent adversary bent on breaking the system. Software security for attacking the system is presented in this paper

  • PDF

A Study on the Linkage between Intelligent Security Technology based on Spatial Information and other Technologies for Demonstration of Convergence Technology (융복합 기술 실증을 위한 공간정보 기반 지능형 방범 기술과 타 분야 기술 간 연계 방안 연구)

  • Shin, Young-Seob;Han, Sun-Hee;Yu, In-Jae;Lee, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.622-632
    • /
    • 2018
  • With the recent changes in the social environment, the growth in the so-called 'five major crimes' has been highlighted as one of the causes of anxiety in Koreans' lives. Many attempts have been made to solve this problem; however, it is still difficult to secure the location information of the socially vulnerable in emergency situations and to precisely identify the features and clothing of criminals and track them using current image analysis technology. Therefore, the development of precision positioning technology and support services along with intelligent security service technology based on spatial information has been given a high priority. This study suggested measures that could be continuously applied to link technologies and services with high linkability by analyzing technologies based on spatial information and other fields. To establish measures for linkage between intelligent security technology and other technologies and services, this study analyzed the existing technologies and research trends in intelligent security technology, and reviewed linkable services according to five criteria established to evaluate their linkability. Based on this analysis, three technologies with high linkability were ultimately selected, and measures for linkage were established. It is expected that the linkage measures derived using the objective evaluation criteria will serve as a stepping stone for promoting active technology linkage and commercialization in the future, even after the completion of this study.

Intelligent Surveillance System for Urban Transit using Context-aware technology (도시철도 지능형 종합 감시시스템을 위한 상황인식기술 적용방안 연구)

  • An, Tae-Ki;Shin, Jeong-Ryol;Lee, Woo-Dong;Kim, Moon-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.399-400
    • /
    • 2007
  • The one of the necessary technologies to live in the ubiquitous society that we can exchange some informations whenever it is and wherever we are, is the technology of context-awareness. The technology of context-awareness can be used various fields-medical science, national defense, national security and etc. and the technology can affect our society by and large. The technology of context-awareness is also applicable to many fields in the urban transit. In this paper, we describe the present condition of the technology of context-awareness and the examples of practical application of it and suggest some plans that are applicable to build an intelligent surveillance system for urban transit. We can connect the operating officer who is in the nearest to the place where the some events happened within the urban transit service area through the intelligent surveillance system for urban transit and we can eel a foothold in perceiving automatically various events within urban transit service area. So, the technology of context-awareness is the basic technology to realize an intelligent surveillance for urban transit, for the security of passengers and the protection of facilities in urban transit.

  • PDF

Off-axis self-reference digital holography in the visible and far-infrared region

  • Bianco, Vittorio;Paturzo, Melania;Finizio, Andrea;Ferraro, Pietro
    • ETRI Journal
    • /
    • v.41 no.1
    • /
    • pp.84-92
    • /
    • 2019
  • Recent advances in digital holography in the far-infrared region of the spectrum have demonstrated the potential use of digital holography in homeland security as a tool to observe hostile environments in which smoke, flames, and dust impair vision. However, to make this application practical, it is necessary to simplify the optical setup. Here, we show an off-axis, self-reference scheme that spills the reference beam out from the object beam itself and avoids the need for a complex interferometric arrangement. We demonstrate that this scheme allows the reconstruction of high-quality holograms of objects captured under visible as well as far-infrared light exposure. This could pave the way to the industrialization of holographic systems to enable users to see through fire. Moreover, the quantitative nature of the holographic signal is preserved. Thus, the reported results demonstrate the possibility to use this setup for optical metrology.

Technological Aspects of the Use of Modern Intelligent Information Systems in Educational Activities by Teachers

  • Tkachuk, Stanislav;Poluboiaryna, Iryna;Lapets, Olha;Lebid, Oksana;Fadyeyeva, Kateryna;Udalova, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.99-102
    • /
    • 2021
  • The article considers one of the areas of development of artificial intelligence where there is the development of computer intelligent systems capable of performing functions traditionally considered intelligent - language comprehension, inference, use of accumulated knowledge, learning, pattern recognition, as well as learn and explain their decisions. It is found that informational intellectual systems are promising in their development. The article is devoted to intelligent information systems and technologies in educational activities, ie issues of organization, design, development and application of systems designed for information processing, which are based on the use of artificial intelligence methods.

Modern Methods of Text Analysis as an Effective Way to Combat Plagiarism

  • Myronenko, Serhii;Myronenko, Yelyzaveta
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.242-248
    • /
    • 2022
  • The article presents the analysis of modern methods of automatic comparison of original and unoriginal text to detect textual plagiarism. The study covers two types of plagiarism - literal, when plagiarists directly make exact copying of the text without changing anything, and intelligent, using more sophisticated techniques, which are harder to detect due to the text manipulation, like words and signs replacement. Standard techniques related to extrinsic detection are string-based, vector space and semantic-based. The first, most common and most successful target models for detecting literal plagiarism - N-gram and Vector Space are analyzed, and their advantages and disadvantages are evaluated. The most effective target models that allow detecting intelligent plagiarism, particularly identifying paraphrases by measuring the semantic similarity of short components of the text, are investigated. Models using neural network architecture and based on natural language sentence matching approaches such as Densely Interactive Inference Network (DIIN), Bilateral Multi-Perspective Matching (BiMPM) and Bidirectional Encoder Representations from Transformers (BERT) and its family of models are considered. The progress in improving plagiarism detection systems, techniques and related models is summarized. Relevant and urgent problems that remain unresolved in detecting intelligent plagiarism - effective recognition of unoriginal ideas and qualitatively paraphrased text - are outlined.

Smart Home Network System Using the Broadband Power Line Communication(BPLC) (광대역 전력선 통신을 이용한 스마트 홈 네트워크 구성에 관한 연구)

  • Yang Hyun-Chang;Sim Kwee-Bo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.11a
    • /
    • pp.87-90
    • /
    • 2005
  • The Intelligent Home provides convenient and comfortable living environment by performing automatic control, heating and air-conditioning, ventilation, home appliances control, home robot control, energy management, visitor management security management, internet, heath state monitoring, etc. through wired/ wireless network and device in the household. Along with the presentation of the features of economical broadband power line communication in the network configuration for new and old houses, its improvement method is proposed.

  • PDF