http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Resilience on the Security Flimsiness of Critical Infrastructure
Maricel O. Balitanas,Min-kyu Choi,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Systems and assets whether physical or virtual are so vital to a nation that the incapacity or destruction of such systems and assets would have enormous impact on the nation’s security, national public health or safety or any combination of those matters. Thus, this study presents the challenges and the protection mechanisms in two major approaches defined towards resiliency.
Anti-Collision Protocol to The Susceptible Radio Frequency Identification Networks
Maricel O. Balitanas,Rosslin John Robles,Seung-Hwan Jeon,Min-kyu Choi,Farkhod Alisherov,Ha-yeon Kim,Tai-hoon Kim 한국정보기술학회 2010 Proceedings of KIIT Conference Vol.2010 No.-
A. System Design of RFID-Sensor Integrated Networks Technological convergence is one of hot issues due to the limitation of technologies, functions and market To uniquely identify physical objects, Radio Frequency Identification (RFID) systems are used with its limitless possibilities and low cost. RFID is a method of remotely storing and retrieving data using devices called RFID tags. An RFID tag is a small object, such as an adhesive sticker, that can be attached to or incorporated into a product. But with this common scenario involving numerous tags and present in the interrogation zone of a single reader at the same time. RFID is prone to security threat as well, which is the main focus of this paper. In this paper we present an anti-collision protocol existing and applied in the RFID dilemma, sited vulnerabilities and suggested general security solutions.
Countermeasures of Defenseless Ubiquitous Computing Environment towards Security Threats
Maricel O. Balitanas,Ha-yeon Kim,Tai-hoon Kim 한국정보기술학회 2010 Proceedings of KIIT Conference Vol.2010 No.-
Ubiquitous computing presents challenges across computer science: in systems design and engineering. In this paper, we analyze security threats of mobile computing devices with an application of ubiquitous computing and we suggest their countermeasures in technical, manageable, and physical aspects.
A Study on Integrating IDS with Data Mining
Maricel Balitanas,김석수,김태훈,이승 보안공학연구지원센터 2008 보안공학연구논문지 Vol.5 No.2
This paper presents the application of data mining approaches for an intrusion detection system. Intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of the resource of a computer system. In this paper, an IDS model is presented as well as its limitation in determining security violations. Furthermore, this paper focuses on several data mining techniques that can aid in the process of intrusion detection.
Children's Auto-Antitoxin Planner for Handheld Device
Maricel O. Balitanas,Kyung Jung Kim 보안공학연구지원센터(JSE) 2011 보안공학연구논문지 Vol.8 No.1
The research depicts an architectural structure using mobile computing which will plot a chart of Antitoxin planner synchronous with the parent’s personal planner so as to set a schedule amenable to both the parties and a notification through will be generated. Diseases can be prevented by proper immunization procedures, however, with most parents working in this generation and not most clinics pay much attention on the individual planning and notifications of their patients, this research will show a solution to such crucial issue.. This will be a tool for parents and assistance to clinics and hospitals catering Antitoxins shots for children.
Peer To Peer Content Sharing On Smart Phones Technology
Maricel Balitanas,Rosslin John Robles 사단법인 인문사회과학기술융합학회 2012 예술인문사회융합멀티미디어논문지 Vol.2 No.2
Peer-to-Peer (P2P) communications and its applications have become conventional architecture in the wired network environment. However, they have not been effectively adapted to the ensemble mobile environment which composed of various devices such as smart mobiles devices, laptops, and device with embedded software. In P2P systems, each node can act as a client and as a server at the same time and shares with others its own data. Our contribution consists in designing, implementing and testing a BitTorrent like application adapted to wireless ad-hoc networks of Android Mobile Phones. The employment of P2P protocols and applications in the platform of the ensemble mobile environment is becoming a promising solution which permits a wide number of users to share their own contents (data, audio, video, etc.) and communicate with each other without using costly and centralized network infrastructure. By using a central server, the peers will be able to get the information about the contents of other peers. Even in the absence of the Internet, the mobile devices provide users with the potential opportunity to connect in ad-hoc manner via short range wireless protocol such as Wi-Fi.
Intrusion Detection System in Forensic
Maricel O. Balitanas,Daesik Ko,Heau Jo Kang,Yoon Ho Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
This paper details the design of a host-based intrusion detection system and describes the desired characteristics of an Intrusion Detection Data Source (IDDS). Further, this paper provides features that make an IDS technology a useful as an evidence acquisition tool. An explanation is provided of admissibility and weight, the two determinants in the legal acceptability of evidence of IDSs as sources of legal evidence, including preservation of evidence, continuity of evidence and transparency of forensic method.