RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Frequency-comb-referenced multi-wavelength profilometry for largely stepped surfaces.

        Hyun, Sangwon,Choi, Minah,Chun, Byung Jae,Kim, Seungman,Kim, Seung-Woo,Kim, Young-Jin Optical Society of America 2013 Optics express Vol.21 No.8

        <P>3-D profiles of discontinuous surfaces patterned with high step structures are measured using four wavelengths generated by phase-locking to the frequency comb of an Er-doped fiber femtosecond laser stabilized to the Rb atomic clock. This frequency-comb-referenced method of multi-wavelength interferometry permits extending the phase non-ambiguity range by a factor of 64,500 while maintaining the sub-wavelength measurement precision of single-wavelength interferometry. Experimental results show a repeatability of 3.13 nm (one-sigma) in measuring step heights of 1800, 500, and 70 μm. The proposed method is accurate enough for the standard calibration of gauge blocks and also fast to be suited for the industrial inspection of microelectronics products.</P>

      • SCISCIESCOPUS

        Interface to Network Security Functions for Cloud-Based Security Services

        Hyun, Sangwon,Kim, Jinyong,Kim, Hyoungshick,Jeong, Jaehoon,Hares, Susan,Dunbar, Linda,Farrel, Adrian Institute of Electrical and Electronics Engineers 2018 IEEE communications magazine Vol.56 No.1

        <P>Network functions virtualization and cloudbased security services will become increasingly common in enterprise network systems to reduce the system operation costs and take advantage of the diverse network security functions (NSFs) developed by multiple vendors. In such a network environment, standardizing the interfaces to the NSFs of different vendors is essential to simplify the management of these heterogeneous NSFs. In addition, software-defined networking can be imposed to optimize the security service process in such cloud-based service environments by enforcing some types of packet filtering rules at the SDN switches, instead of NSFs possibly placed in remote clouds. The Interface to Network Security Functions (I2NSF) Working Group, which is part of the Internet Engineering Task Force, is currently developing a set of standard interfaces to such heterogeneous NSFs. In this article, we present the design and development of an I2NSF architecture and propose improving its efficiency by integrating it with SDN. In our work, we implement the SDN-integrated I2NSF architecture and its security applications. This article also discusses several standardization and research challenges for I2NSF.</P>

      • Absolute length measurement with the frequency comb of a femtosecond laser

        Hyun, Sangwon,Kim, Young-Jin,Kim, Yunseok,Jin, Jonghan,Kim, Seung-Woo IOP Pub 2009 Measurement Science and Technology Vol.20 No.9

        <P>We report exploiting the frequency comb of a femtosecond laser as a means of realizing the time-based SI definition of the meter for length metrology. Specifically, an external-cavity diode laser is continuously tuned to a stabilized frequency comb, and its output frequency is modulated over an extensive range to measure the absolute value of a given length by means of multi-wavelength optical interferometry. This approach could find applications in establishing practical length standards with a small amount of uncertainty directly traceable to time standards.</P>

      • Design and Analysis of Push Notification-Based Malware on Android

        Hyun, Sangwon,Cho, Junsung,Cho, Geumhwan,Kim, Hyoungshick Hindawi Limited 2018 Security and communication networks Vol.2018 No.-

        <P>Establishing secret command and control (C&C) channels from attackers is important in malware design. This paper presents design and analysis of malware architecture exploiting push notification services as C&C channels. The key feature of the push notification-based malware design is<I> remote triggering</I>, which allows attackers to trigger and execute their malware by push notifications. The use of push notification services as covert channels makes it difficult to distinguish this type of malware from other normal applications also using the same services. We implemented a backdoor prototype on Android devices as a proof-of-concept of the push notification-based malware and evaluated its stealthiness and feasibility. Our malware implementation effectively evaded the existing malware analysis tools such as 55 antimalware scanners from VirusTotal and SandDroid. In addition, our backdoor implementation successfully cracked about 98% of all the tested unlock secrets (either PINs or unlock patterns) in 5 seconds with only a fraction (less than 0.01%) of the total power consumption of the device. Finally, we proposed several defense strategies to mitigate push notification-based malware by carefully analyzing its attack process. Our defense strategies include filtering subscription requests for push notifications from suspicious applications, providing centralized management and access control of registration tokens of applications, detecting malicious push messages by analyzing message contents and characteristic patterns demonstrated by malicious push messages, and detecting malware by analyzing the behaviors of applications after receiving push messages.</P>

      • SCIESCOPUS

        Secure and DoS-Resilient Fragment Authentication in CCN-Based Vehicular Networks

        Hyun, Sangwon,Kim, Hyoungshick WILEY INTERSCIENCE 2018 WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Vol.2018 No.-

        <P>Content-Centric Networking (CCN) is considered as a promising alternative to traditional IP-based networking for vehicle-to-everything communication environments. In general, CCN packets must be fragmented and reassembled based on the Maximum Transmission Unit (MTU) size of the content delivery path. It is thus challenging to securely protect fragmented packets against attackers who intentionally inject malicious fragments to disrupt normal services on CCN-based vehicular networks. This paper presents a new secure content fragmentation method that is resistant to Denial-of-Service (DoS) attacks in CCN-based vehicular networks. Our approach guarantees the authenticity of each fragment through the immediate fragment verification at interim nodes on the routing path. Our experiment results demonstrate that the proposed approach provides much stronger security than the existing approach named FIGOA, without imposing a significant overhead in the process. The proposed method achieves a high immediate verification probability of 98.2% on average, which is 52% higher than that of FIGOA, while requiring only 14% more fragments than FIGOA.</P>

      • KCI등재

        콘텐츠 중심 네트워크를 위한 안전한 패킷 단편화 기술

        현상원(Sangwon Hyun) 한국정보보호학회 2017 정보보호학회논문지 Vol.27 No.4

        본 논문에서는 콘텐츠 중심 네트워크(CCN, Content-Centric Networking)를 위한 안전한 패킷 단편화(fragmentation) 기술을 제안한다. 제안하는 기술은 패킷조각(fragment)들에 대한 불법적인 위변조 가능성을 차단하고, 패킷조각 수신 시 높은 확률로 즉각적인 신뢰성 검증을 제공함으로써 검증 지연을 악용한 DoS 공격으로부터 높은 안전성을 제공한다. 본 논문의 성능 분석 결과는 약간의 부하 증가만으로 제안하는 기술이 기존 기술보다 훨씬 더 높은 안전성을 제공함을 보여준다. This paper presents a secure and DoS-resistant fragment authentication technique for Content-Centric Networking (CCN). Our approach not only guarantees the authenticity of each fragment, but also provides a high resistance to DoS attacks through the immediate verification of fragment authenticity at interim nodes on the routing path. Our experimental results demonstrate that the proposed approach provides much stronger security than the existing approach, without imposing a significant overhead.

      • Empirical Modeling and Extraction of Parasitic Resistance in Amorphous Indium–Gallium–Zinc Oxide Thin-Film Transistors

        Jun-Hyun Park,Hyun-Kwang Jung,Sungchul Kim,Sangwon Lee,Dong Myong Kim,Dae Hwan Kim IEEE 2011 IEEE transactions on electron devices Vol.58 No.8

        <P>We propose an extraction technique for parasitic resistance (<I>RP</I>) with <I>L</I>-, <I>V</I><SUB>GS</SUB>-, and <I>V</I><SUB>DS</SUB>-dependences even for large <I>V</I><SUB>DS</SUB> in amorphous indium-gallium-zinc oxide thin-film transistors (<I>a</I>-IGZO TFTs), by employing <I>I</I><SUB>DS</SUB>-<I>V</I><SUB>GS</SUB> characteristics (as a function of <I>V</I><SUB>DS</SUB> ) of two <I>a</I>-IGZO TFTs with different channel lengths ( <I>L</I><SUB>1</SUB> and <I>L</I><SUB>2</SUB> ). The resistance between the source and drain is modeled as an effective total resistance defined as <I>RT</I><SUP>*</SUP> ≡ <I>V</I><SUB>DS</SUB>/<I>ID</I> for all over the drain bias <I>V</I><SUB>DS</SUB> including both linear and saturation regions. The proposed method can be efficiently employed to model dc <I>I</I>-<I>V</I> characteristics and extract the parasitic resistance in <I>a</I>-IGZO TFTs even with short channel lengths, because the internal drain voltage (<I>V</I><SUB>DS</SUB><SUP>'</SUP>) is accurately calculated as a function of <I>V</I><SUB>GS</SUB>, <I>V</I><SUB>DS</SUB>, and <I>L</I> by deembedding the voltage drop across the parasitic resistance <I>R</I><SUB>P</SUB>.</P>

      • KCI등재

        유전 및 육종 : MS 마커를 이용한 토종닭 브랜드의 유전적 특성 및 개체 식별력 분석

        서상원 ( Sangwon Suh ),조창연 ( Chang Yeon Cho ),김재환 ( Jae Hwan Kim ),최성복 ( Seong Bok Choi ),김영신 ( Young Sin Kim ),김현 ( Hyun Kim ),성환후 ( Hwan Hoo Seong ),임현태 ( Hyun Tae Lim ),조재현 ( Jae Hyeon Cho ),고응규 ( Yeo 한국동물자원과학회(구 한국축산학회) 2013 한국축산학회지 Vol.55 No.3

        MS 마커는 가축의 유전적 다양성, 유연관계 및 품종식별의 연구에 있어서 매우 유용하다. 본 연구는 26개의 MS 마커를 이용하여 토종닭 브랜드 2집단(우리맛닭, 한협3호)과 토착종 순계 2집단(화이트 레그흔, 로드 아일랜드 레드)을 대상으로 집단내 및 집단간의 유전적 다양성, 계통유전학적 관계, 유전적 균일성 등을 검증하여 고유 유전자원으로서의 가치 구명 및 개체식별력이 높은 마커를 선별하여 토종닭 브랜드 계육의 생산이력시스뎀에 활용 가능한 기초 자료를 제시하고자 실시 하였다. 대립 유전자형 분석결과 총 191개 중 47개(24.6%)가 지단 특이 대립 유전자였으며, 다형성지수의 평균은 HExp=0.667, PIC=0.630으로 산출 되였다. 공시된 320 수 개체에 대한 요인대응분석(FCA) 결과 4개의 군집을 형성하였지만 2개 토종닭 브랜드 집단은 타 집단에 비해 매우 가까운 거리에 위치하고 있었으며, 집단간의 DA 유전거리 결과 또한 이와 동일했다. 각 집단에 대한 유전적 균일도는 모든 집단에서 94% 이상으로 높았다. 이상의 결과는 2개 토종닭 브랜드 집단은 유전적으로 유사하지만 토종닭 순계 집단과는 유전적인 차이가 크며, 순계 2집단 또한 유전적으로 확연히 분리됨을 증명 할 수 있다. 26개 MS마커 사용시 동일개체 출현확률(PI)은 1.17×10-49였다. 2011년 기준으로 닭 사육수수 149,511,309수를 고려해 PI 값이 높은 마커 9~12개 정도를 선별 및 분석에 이용 한다면 동일개체 출현확률(PI)이 1.14×10-15 에서 7.33×10-20 이므로 개체식벽 및 친자 감별이 가능할 것으로 사료된다. 향후 경제적 효율성을 고려하여 MS 마커 및 mtDNA의 SNP를 기반으로 multiplexing PCR 시스템을 확립을 위한 연구가 이행된다면 토종닭 브랜드육의 생산이력시스템에 적용이 가능할 것으로 판단된다. Microsatellite markers have been a useful genetic tool in determining diversity, relationships and individual discrimination studies of livestock. The level of genetic diversity, relationships among two Korean indigenous chicken brand populations (Woorimatdag: WR, Hanhyup3: HH) as well as two pure populations (White Leghorn: WL, Rhode Island Red: RIR) were analyzed, based on 26 MS markers. A total of 191 distinct alleles were observed across the four chicken populations and 47 (24.6%) of these alleles were unique to only one population. The mean HExp and PIC were estimated as 0.667 and 0.630. Nei`s DA genetic distance and factorial correspondence analysis (FCA) showed that the four populations represented four distinct groups. However, the genetic distance between each Korean indigenous chicken brand (WR, HH) and the pure population (WL, RIR) were threefold that among the WR and HH. For the STRUCTURE analyses, the most appropriate number of clusters for modeling the data was determined to be three. The expected probabilities of identity among genotypes of random individuals (PI) were calculated as 1.17×10-49 (ALL 26 markers) and 1.14×10-15, 7.33×10-20(9, 12 with the highest PI value, respectively). The results indicated that the brand chicken breed traceability system employing the own highest PI value 9 to 12 markers, and might be applicable to individual identification of Korean indigenous chicken brand.

      • KCI우수등재

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼