http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
윤근호,심신우,황종수,Yun, Keunho,Shim, Shinwoo,Hwang, Jongsu 한국군사과학기술학회 2014 한국군사과학기술학회지 Vol.17 No.5
In the development of the weapon systems, utilization of Modeling & Simulation is growing in every aspect of development process. For the higher utilization of M&S, reuse of the M&S resources is needed to reduce the cost of M&S. I propose the M&S architecture framework that can enhance the reusability of the M&S resources in developing surface-to-air weapon systems. This M&S architecture design framework enables interoperability between the system and sub-systems. In this paper, the advantage and the necessity of the M&S architecture design framework will be described by introducing the cases that the M&S architecture framework reused in the combat experiments, the system development tests, the system operational tests and the concept developments in real projects. These cases will show the high reusability and efficiency of the M&S architecture design framework.
이경민(GyungMin Lee),심신우(ShinWoo Shim),조병모(ByoungMo Cho),김태규(TaeKyu Kim),김경곤(KyoungGon Kim) Korean Institute of Information Scientists and Eng 2020 정보과학회논문지 Vol.47 No.5
Since late 2000, state-sponsored and sophisticated cyber-attacks have continued unabated. Also, preparing countermeasures against cyber-attack techniques based on traces are also in development. Cyber attackers use a variety of techniques to veil their attacks from these analyses and countermeasures. In particular, fileless cyber-attacks that do not create a file used for an attack are increasing. Fileless cyber-attacks are difficult to analyze because there are no executable files to analyze from the defenders perspective. In this paper, we investigate and analyze fileless cyber-attacks and present a model based on the cyber kill chain to classify fileless cyber-attacks. Through this, it is expected to identify and respond to attack types more quickly than when new fileless cyber-attacks occur.
한규석(Kyu Seok Han),김태규(Taekyu Kim),심신우(Shinwoo Shim),전성구(Sung Goo Jun),윤지원(Jiwon Yoon) Korean Institute of Information Scientists and Eng 2018 정보과학회논문지 Vol.45 No.10
Recently, various systems based on Internet of Things (IOT) and Information and Communications Technologies(ICT) have been developed. Today, assorted devices are connected to a network, and various operating systems according to devices having different resources and functions have appeared. With the increased need for in hacking security, researches on the vulnerability analysis of the operating system installed on each device and the actual attack technique have been carried out. Accordingly, the type and detailed version of the operating system of the device, Function (API) is emerging as important information in security. Since the control of this information gathering in the cyber warfare is the first stage of the cyber threat, many studies have been conducted on mehods for controlling the network traffic while scanning. In order to bypass this control of the network, information collectors prepare countermeasures to secretly collect port information. In this paper, we deal with a scanning method that can acquire information about opponents through network basic commands which are not important in the network control system.