http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
한경현,황성운,Han, KyungHyun,Trang, Hoang Thi Huyen,Hwang, Seong Oun 한국사물인터넷학회 2017 한국사물인터넷학회 논문지 Vol.3 No.1
현대의 컴퓨터는 여러 프로세스를 처리해야 한다. 운영체제에서는 소수의 CPU로 많은 프로세스를 처리하기 위해서 스케줄링을 이용한다. 스케줄링의 종류에는 FCFS, SJF, RR이 있다. 이 중 RR은 최대 할당 시간을 정해야 한다. 본 논문에서는 최적의 최대 할당 시간을 찾기 위해 특정 샘플에 대해 GLM 알고리즘으로 분석하였다. 이 분석방법을 통해 원하는 조건에 따른 최대 할당 시간을 지정할 수 있다. Modern computers have to deal with multiple processes. The operating system uses scheduling to handle many processes with a small number of CPUs. Types of scheduling include FCFS, SJF, and RR. Of these, RR shall determine the maximum allocation time. In this paper, we analyzed the GLM algorithm for specific samples to find the optimal maximum allocation time. This analysis method allows us to specify the maximum allocation time according to the desired conditions.
한경현,황성운 한국인터넷방송통신학회 2020 한국인터넷방송통신학회 논문지 Vol.20 No.2
기존에 사용되던 방화벽들은 기본적으로 정책을 수동적으로 입력해 주는 방식으로 되어 있어 공격이 오는 즉시 대응하기 쉽지 않다. 왜냐하면 전문 보안 관리자가 이를 분석하고 해당 공격에 대한 방어 정책을 입력해 주어야하기 때문이다. 또한, 기존 방화벽 정책은 공격을 막기 위해 정상 접속까지 차단하는 경우가 많다. 패킷 자체는 정상적이지만 유입량이 많아 서비스 거부를 발생시키는 공격이 많기 때문이다. 본 논문에서는 방어 정책을 입력하는 부분을 인공지능 으로 대체하여 정책을 자동으로 생성하고, 정상 접속 학습을 통해 생성된 화이트리스트 정책으로 정상 접속은 가능하면 서 Flooding, Spoofing, Scanning과 같은 공격만을 차단하는 방법을 제안한다. Conventional firewalls cannot cope with attacks immediately. It is because security professionals or administrators need to analyze them and enter relevant policies to the firewalls. In addition, those policies may often block even normal accesses. Even though the packet themselves are normal, there exist many attacks that cause denial of service due to the inflow of a large amount of those packets. In this paper, we propose a method to block attacks such as Flooding, Spoofing and Scanning while allowing normal accesses based on whitelist policies which are automatedly generated by learning normal access patterns.
한경현,황성운,Han, KyungHyun,Hwang, Seong Oun 한국사물인터넷학회 2022 한국사물인터넷학회 논문지 Vol.8 No.5
Anonymous networks are designed to protect information and communication by avoiding monitoring or tracking traffic. In recent years, however, cybercriminals have evaded law enforcement tracking by exploiting the characteristics of anonymous networks. In this paper, we investigate related research focusing on Tor, one of the anonymous networks. This paper introduces how Tor provides anonymity, and how tracing technologies can track users against Tor. In addition, we compare and analyze tracing techniques, and explain how a researcher can establish an experimental environment.
웹 애플리케이션 취약점 분석을 위한 비용 효과적인 능동 보안 검수 프레임워크
한경현 ( Kyunghyun Han ),( Trong-kha Nguyen ),조훈 ( Hun Joe ),황성운 ( Seong Oun Hwang ),임채호 ( Chaeho Lim ) 한국정보처리학회 2016 정보처리학회논문지. 컴퓨터 및 통신시스템 Vol.5 No.8
많은 기업들은 웹 취약점 관리에 어려움을 겪고 있으며, 보안 사고도 자주 발생하고 있다. 현재는 OWASP 취약점에 기반을 둔 점검도구로 검수를 진행한다. 하지만 현재의 보안 검수는 웹 애플리케이션의 잦은 변화에 현실적으로 대응하기 어려운 실정이다. 본 연구에서는 먼저 기존 취약점 수치화 연구와 검수 프로세스를 검토하였다. 이에 기반을 두어 현실적이며 필수적인 주요 취약점 제거와 능동적인 검수프로세스에 바탕을 둔 개선된 검수 프레임워크를 제안한다. Many companies have struggled to manage Web vulnerabilities and security incidents have also frequently happened. The current inspection methods are mainly based on the OWASP vulnerabilities. In practice, however, it is very difficult to cope with frequent changes of Web applications. In this paper, we first investigate the existing quantification of Web application vulnerabilities and verification process. Then we propose an improved inspection framework which is focused on removing essential and realistic vulnerabilities and active verification process.
한경현(Kyung-Hyun Han),황성운(Seong Oun Hwang) 대한전자공학회 2016 대한전자공학회 학술대회 Vol.2016 No.6
Due to recent rapid development of computer and data communications technology, many changes have occurred in the financial sector. One of these changes is smart wallet, with which we still use paper receipts. Paper receipts make users feel uncomfortable and further raise issues such as destruction of forest and degradation of environment. In order to solve these issues, in this paper, we propose a digital receipt system that issues digital receipts in place of paper receipts.
敎育大學 出身 敎帥의 敎職生活에 關한 硏究 : 濟州道를 中心으로
玄翰景 濟州敎育大學校 1973 論文集 Vol.3 No.-
<the purpose and necessity of this study> Jeju Junior Teaschers College has turned its tenth-year graduates since it was reorganized from a normal high school for the improvement of elementary-school teachers' professional qualities. I do not mean turning out many new teachers shows our successful educational. We have to try to understand correctly how they put educational theories into practice at their respective schools, and what problems they are confronted with, In this sutdy I intend to find a way of encouraging teachers to do better job, to provide the educational administrative authorities witth some reference data, and to collect data for the guidance of future teachers. <suggestions> I offer the following suggestions for progress of elementary education. 1. In every course of study at the junior teachers college all the students must be taught so that they can get sense of duty and conviction of teaching profession. 2. Much more increased class hours must be arrotted to each art course, for most teachers prove to be insufficient in art subjects. 3. Some institution for after-graduation guidance must be set up ot the junior teachers' colleege to help and guide its graduates more effectively. 4. Teachers must acquire the adility to guide their pupils to better and successful living. 5. An attached elementary school must be established at Jeju Junior Teachers College for the college students to get aequainted with office business and various practical school affairs. 6. Most school must give a new teacher some guidance according to a through plan because guidance in advance is considered most important for a new teacher. 7. It is found that personal relations between teachers and parents or important persons of the community are not very close. A school separated from parents or community cannot be expected to produce good effect. Therefore, close relations between school and the community are required. 8. New teachers may as well be trained, if possible, at school which satisfy all the required conditions before they begin their profession.
한경현(Kyung-Hyun Han),황성운(Seong Oun Hwang) 대한전자공학회 2016 대한전자공학회 학술대회 Vol.2016 No.11
Many people and companies have used passwords to protect sensitive information from attackers. Using hash functions, passwords are generally converted into hash values that are stored for security. However, since there is a case that needs to access the sensitive information (e.g., cyber investigation), we require a rainbow table. In this paper, we propose an effective distributive rainbow table using distributed system and dictionary data.