• Title/Summary/Keyword: risk-sensitive

Search Result 427, Processing Time 0.026 seconds

Generate Optimal Number of Features in Mobile Malware Classification using Venn Diagram Intersection

  • Ismail, Najiahtul Syafiqah;Yusof, Robiah Binti;MA, Faiza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.389-396
    • /
    • 2022
  • Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mobile malware continues to struggle with permission misuse. Although permission-based detection is frequently utilized, the significant false alarm rates brought on by the permission-based issue are thought to make it inadequate. The present detection method has a high incidence of false alarms, which reduces its ability to identify permission-based attacks. By using permission features with intent, this research attempted to improve permission-based detection. However, it creates an excessive number of features and increases the likelihood of false alarms. In order to generate the optimal number of features created and boost the quality of features chosen, this research developed an intersection feature approach. Performance was assessed using metrics including accuracy, TPR, TNR, and FPR. The most important characteristics were chosen using the Correlation Feature Selection, and the malicious program was categorized using SVM and naive Bayes. The Intersection Feature Technique, according to the findings, reduces characteristics from 486 to 17, has a 97 percent accuracy rate, and produces 0.1 percent false alarms.

Understanding the Risks on Saudi Arabian's Youth Being Online Without Having Strong Cyber-Security Awareness

  • Alharbi, Nawaf;Soh, Ben;AlZain, Mohammed A;Alharbi, Mawaddah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.131-146
    • /
    • 2022
  • The Internet is becoming a basic need for many individuals globally in this digital age. The youths became more active online than before, with the majority relying on different platforms to communicate and interact with peers. Saudi Arabia is one of the nations where internet usage is high, with an increasing number of active internet users. The youth in Saudi Arabia are engaged in various online platforms. However, they lack adequate knowledge about cybersecurity and the dangers of internet usage, which exposes them to the risk of falling victims to cybercriminals. The most common dangers of internet usage include viruses, malware, phishing, and hacking, compromising users' sensitive information. Increased awareness of these potential threats helps protect Internet users and secure their data. The understanding of the dangers of Internet usage among youths varies across countries. In this regard, our study explores the risks of internet usage among youth in Saudi Arabia compared to the United States, South Africa, and New Zealand.

Development of Simultaneous Analytical Method for Five Lignans in Edible Seeds (종자류 식품에 함유된 5종 리그난의 동시 분석법 개발)

  • Yoonjeong, Kim;Jiye, Pyeon;In-hwan, Baek;Younghwa, Kim
    • The Korean Journal of Food And Nutrition
    • /
    • v.35 no.6
    • /
    • pp.543-551
    • /
    • 2022
  • There has been increased interest in lignans due to their potential effect in reducing the risk of developing several diseases. To evaluate lignan contents, sensitive and accurate methods should be developed for their quantification in food. The present study aimed to validate a liquid chromatography-tandem mass spectrometry (LC-MS/MS) method for the quantification of 5 lignans: lariciresinol (Lar), matairesinol (Mat), pinoresinol (Pin), secoisolariciresinol (Seco), and syringaresinol (Syr). The validation included selectivity, linearity, recovery, accuracy, and precision. The method was proved to be specific, with a linear response (R2≥0.99). The limits of detection were 0.040~0.765 ㎍/100 g and the limits of quantification were 0.114~1.532 ㎍/100 g. Recoveries were 90.588~109.053% for black sesame powder. Relative standard deviations of repeatability and reproducibility were below 5%. Total lignan contents of roasted coffee bean, oat, and blacksoy bean were 105.702 ㎍/100 g, 78.965 ㎍/100 g, and 165.521 ㎍/100 g, respectively. These results showed that LC-MS/MS analysis would be effective in producing acceptable sensitivity, accuracy, and precision in five lignan analyses.

Improvement of Digital Identify Proofing Service through Trend Analysis of Online Personal Identification

  • JongBae Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.1-8
    • /
    • 2023
  • This paper analyzes the trends of identification proofing services(PIPSs) to identify and authenticate users online and proposes a method to improve PIPS based on alternative means of resident registration numbers in Korea. Digital identity proofing services play an important role in modern society, but there are some problems. Since they handle sensitive personal information, there is a risk of information leakage, hacking, or inappropriate access. Additionally, online service providers may incur additional costs by applying different PIPSs, which results in online service users bearing the costs. In particular, in these days of globalization, different PIPSs are being used in various countries, which can cause difficulties in international activities due to lack of global consistency. Overseas online PIPSs include expansion of biometric authentication, increase in mobile identity proofing, and distributed identity proofing using blockchain. This paper analyzes the trend of PIPSs that prove themselves when identifying users of online services in non-face-to-face overseas situations, and proposes improvements by comparing them with alternative means of Korean resident registration numbers. Through the proposed method, it will be possible to strengthen the safety of Korea's PIPS and expand the provision of more reliable identification services.

Seismic train-bridge coupled system sensitivity analysis considering random aftershock intensity and residual track deformation

  • Jincheng Tan;Manman Chen;Xiang Liu;Han Zhao;Lizhong Jiang;Peidong Guo;Wangbao Zhou;Ping Xiang
    • Structural Engineering and Mechanics
    • /
    • v.91 no.1
    • /
    • pp.25-38
    • /
    • 2024
  • After the mainshock, whether the train can be allowed to pass the bridges plays an important role in ensuring the transport of supplies and rescue works for example, in the "12 May" earthquake in China, after evaluation, the bridge was still used for transportation in rescue at a very slow speed, engineers usually evaluate whether the train can pass the bridge safely based on the experience, lacks sufficient calculation basis and does not fully consider the risk caused by aftershocks. To address this issue, this paper comprehensively considers the randomness of track irregularity, the randomness of aftershock intensity and other multiple random sources in train-bridge interaction system (TBIS). The sensitivity of train to various random parameters after earthquake is analyzed from the perspective of probability, the most sensitive random variable in this paper is PGA of aftershocks, both for bridge and trailer car, With the increase of epicentral distance, the sensitivity of PGA will decrease, and correspondingly, for trailer car, the sensitivity of other random variables will increase, research in this paper provides a basis for the subsequent random analysis of post-earthquake driving safety.

Strategies for Cybersecurity in Universities from Institutional and Technical Perspectives (대학 내 사이버 보안을 위한 제도·기술적 관점에서의 전략)

  • Ki-Ho Lee;Yong-Joon Lee
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.187-193
    • /
    • 2024
  • With the advancement of AI and IoT, cybersecurity threats have increased dramatically. As the methods and objectives of cyber-attacks evolve, universities, like all major industries, are facing serious cybersecurity issues. Universities hold vast amounts of sensitive information such as students' personal data, research data, and intellectual property, making them prime targets for cyber threats. Therefore, this paper aims to present cybersecurity strategies from both institutional and technical perspectives to help university leaders and policymakers enhance their cybersecurity posture. The study reviews current trends through the flow of cyber-attacks and proposes governance, policy development, risk management, and the establishment of FIDO and AI-based security systems to respond to the increase in sophisticated threats such as ransomware and AI-based malware.

A Study for strategic cooperaton of enterprise security and business (기업보안과 비즈니스의 전략적 협력에 관한 연구)

  • Ryu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.28
    • /
    • pp.103-130
    • /
    • 2011
  • This study is the research of enterprise security for raising the profitability and stability of Korean companies in global business environment and strategic cooperation of business. As the scientific technology gets complicated as day goes by and new competitors appear regardless the border in the modern business environment, the situation happens frequently which the huge company hands over their market to the new one armed with the innovative thinking overnight. To survive such new environment, the answer is the change of paradigm regarding business management method at the new point of view. With the low level of security risk management of Korean companies which stick to old habit, the security management which helps the companies secure profits is not affordable. The global village where the population of 7 billions live in 21st century is facing up to the rapid ecological adaptation. The rapid change of climatic environment creates the hundreds of thousands of sufferers in a moment, and we have been watching the millions of livestock are buried alive due to new contagious disease everyday. Such change encourages the humans in global village to change the basic way of living. The business ecosystem which is the basic root for economic life cannot be an exception. To survive the business environment of 21st century, the security risk management at management level is required and the reporting line of companies should be established newly for raising business competing power through security risk management. The companies should bear in mind that they can be disappeared into our old memories overnight if they are not sensitive to the changing environment. Out of new risks for the modern companies, the field especially Korean companies are dealing easily is the security risk. Not like past, the security risk which's size is much more massive and its propagation velocity is very fast is the one of important business risks which the management should take care. Out of security risks which influence on the modern companies significantly, the brand of companies, protection of their reputation, continuity of production and operation and keeping customer's trust are prior to the others. This study offered the suggestion regarding enterprise security and the strategic cooperation of business to deal with such security risk effectively.

  • PDF

Development of a Nuclease Protection Assay With Sandwich Hybridization (NPA-SH) to Monitor Heterosigma akashiwo (Heterosigma akashiwo를 모니터하기 위한 뉴클레아제 보호 분석이 통합된 샌드위치 혼성(NPA-SH)의 개발)

  • Kang, Mingyeong;Park, Mirye;Kim, Kang Eun;Lee, Taek-Kyun
    • Journal of Life Science
    • /
    • v.30 no.1
    • /
    • pp.26-31
    • /
    • 2020
  • Heterosigma akashiwo is a globally distributed raphidophyte that forms blooms and causes significant losses to the aquaculture industry in many coastal countries. The development of a fast and sensitive detection method is therefore required to facilitate the appropriate warning of harmful algal blooms. In this study, a nuclease protection integrated with sandwich hybridization (NPA-SH) assay was developed to both qualitatively and quantitatively detect H. akashiwo. The NPA, capture and signal probes were designed by nucleotide sequencing of H. akashiwo. The applicability of NPA-SH was evaluated using cultured H. akashiwo cells and field samples collected at Goseong Bay, Korea. The results show that this method has good applicability and effectiveness in analyzing cultured cells and field samples. A linear regression equation for the quantitative analysis of H. akashiwo was obtained, and the lower detection limit of the assay was 1×104 cells/ml. There was no statistically significant difference in the results of H. akashiwo quantitation using NPA-SH compared to those obtained using a microscope. These results indicate that NPA-SH can be a good alternative to the traditional microscopic method used to monitor H. akashiwo.

Evaluation of microbiological, cellular and risk factors associated with subclinical mastitis in female buffaloes

  • de Oliveira Moura, Emmanuella;do Nascimento Rangel, Adriano Henrique;de Melo, Maria Celeste Nunes;Borba, Luiz Henrique Fernandes;de Lima, Dorgival Morais Junior;Novaes, Luciano Patto;Urbano, Stela Antas;de Andrade Neto, Julio Cesar
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.30 no.9
    • /
    • pp.1340-1349
    • /
    • 2017
  • Objective: This study aimed to evaluate the microbiological and cellular milk profile for the diagnosis of subclinical mastitis in female buffaloes and to assess risk factors for predisposition of the disease. Methods: Analyses were carried out by standard plate count (SPC), identification of species and antibiotic resistance, somatic cell count (SCC), electrical electrical conductivity of milk (ECM), and lactoferrin content in milk. Teat cups were swabbed to evaluate risk factors, observing hyperkeratosis, milking vacuum pressure and cleanliness of the site. Hence, 30 female buffaloes were randomly selected (15 from a group in early lactation and 15 in late lactation). Results: The most common bacteria in the microbiological examination were Staphylococcus spp., Streptococcus spp. and Corynebacterium sp. In the antibiotic sensitivity test, 10 (58.82%) of the 17 antibiotics tested were sensitive to all isolates, and resistant bacteria were Streptococcus uberis, Streptococcus dysgalactiae, Streptococcus haemolyticus, and Escherichia coli. It was observed that positive samples in the microbiological examination showed total bacterial count between $9.10{\times}10^3$ to $6.94{\times}10^6$ colony forming units/mL, SCC between 42,000 to 4,320,000 cells/mL and ECM ranging from 1.85 to 7.40 mS/cm. It was also found that the teat cups had high microbial counts indicating poor hygiene, and even faults in the cleanliness of the animals' waiting room were observed. It is concluded that values of SCC above 537,000 cells/mL and ECM above 3.0 mS/mL are indications of mammary gland infection for this herd; however, the association of these values with a microbiological analysis is necessary to more accurately evaluate the health status of mammary glands with subclinical mastitis. Conclusion: Through phenotypic characterization of bacteria involved in the samples, the genera Staphylococcus spp., Streptococcus spp., and Corynebacterimum bovis were the most prevalent in this study. Faults in environment and equipment hygienization are factors that are directly associated with mastitis.

The Prevalence and Risk Factors of Drug Resistant Pulmonary Tuberculosis Investigated at One University Hospital in Seoul (서울지역 한 대학병원에서 조사된 폐결핵 약제 내성률 및 위험인자)

  • Kim, Do Kyun;Kim, Mi Ok;Kim, Tae-Hyung;Sohn, Jang Won;Yoon, Ho Joo;Shin, Dong Ho;Park, Sung Soo
    • Tuberculosis and Respiratory Diseases
    • /
    • v.58 no.3
    • /
    • pp.243-247
    • /
    • 2005
  • Background : The prevalence of tuberculosis is slowly decreasing in Korea. However, the drug-resistance of pulmonary tuberculosis is a major risk factor of treatment failure. Moreover, the National Surveillance System has recently been discontinued. Therefore, a continuous survey is necessary for the exact detection of the rate of drug resistance. We studied the recent 4-year drug resistance rate of tuberculosis at a single University hospital in Seoul. Materials and Methods : The study included 239 pulmonary tuberculosis patients performed with a tuberculosis culture and a drug-sensitivity test at Hanyang University Medical Center from March 1999 to March 2003. Results : Of the 239 patients included in the study during the 4-year period, 52 patients showed resistance to one or more anti-tuberculosis drug (21.8%). The rate of multi-drug resistance was 12.6%. The resistance rates to isoniazid, rifampin, ethambutol, streptomycin and pyrazinamide were 18.4%, 13.8%, 11.7%, 6.7% and 8.4%, respectively. Ninety patients had a history of previous anti-tuberculosis treatment, and the rates of the overall drug resistance and multi-drug resistance of these patients were 36.7% and 25.6%, respectively. The patients with drug-resistance showed a higher rate of a previous tuberculosis treatment history (63.5%) than the drug-sensitive group patients (30.5%). Conclusion : The rate of drug resistant tuberculosis is 21.8%, and multi-drug resistant tuberculosis is 12.6%. The rate of drug resistance is higher in those previously treated for tuberculosis.