< F31305F30335F32315FC0CCB0ADBCF65FBEC8B5E5B7CEC0CCB5E520C7C3B7A7C6FBBFA1BCADC0C D496E F6E20C5ACB6F3C0CCBEF0C6AE20C7E3B4CFC6CC20C0FBBFEBB9E6BEC820BFACB1B82E687770>

Size: px
Start display at page:

Download "< F31305F30335F32315FC0CCB0ADBCF65FBEC8B5E5B7CEC0CCB5E520C7C3B7A7C6FBBFA1BCADC0C D496E F6E20C5ACB6F3C0CCBEF0C6AE20C7E3B4CFC6CC20C0FBBFEBB9E6BEC820BFACB1B82E687770>"

Transcription

1 안드로이드플랫폼에서의 High-Interaction 클라이언트허니팟적용방안연구 정현미 *, 손승완 **, 김광석 **, 이강수 ** 한국과학기술정보연구원 *, 한남대학교컴퓨터공학과 ** A High-Interaction Client Honeypot on Android Platform Hyun-Mi Jung *, Seung-Wan Son **, Kwang-Seok Kim **, Gang-Soo Lee ** Korea Institute of Science and Technology Information * Dept. of Computer Engineering, Hannam University ** 요약안드로이드플랫폼에서의새로운변종악성코드가기하급수적으로증가함에따라보다빠르고능동적인대처방안이필요하다. 본연구에서는안드로이드플랫폼에 High-Interaction 클라이언트허니팟을적용하였다. 시스템적용방안을위하여전체흐름을설계하고각세부모듈의기능을분석하여안드로이드플랫폼에최적화하였다. 제안하는시스템은기존 PC 환경의 High-Interaction 클라이언트허니팟의장점을모두갖추고있으며관리서버와저장서버를분리하여보다유연하고확장된형태로설계되었다. 주제어 : 안드로이드플랫폼, 모바일악성코드분석, 안드로이드악성코드, 클라이언트허니팟, 변종악성코드 Abstract As the new variation malicious codes of android platform are drastically increasing, the preparation plan and response is needed. We proposed a high-interaction client honeypot that applied to the android platform. We designed flow for the system. Application plan and the function was analyze. Each detail module was optimized in the Android platform. The system is equipped with the advantage of the high-interaction client honeypot of PC environment. Because the management and storage server was separated it is more flexible and expanded. Key Words : android platform, mobile malicious code analysis, android malicious code, client honeypot, variation malicious code 1. 서론 다양한스마트폰공격유형중최근사용자에게가장많은피해를주는것은어플리케이션및콘텐츠취약점 을이용한모바일악성코드의유포이다. 이를반영하듯 2013년도정보보호 10대이슈전망에 해커들의공격목표로부상하고있는모바일앱보안중요성증대 와 지능화된피싱 (Phishing) 기법, 스미싱 (Smishing) 을이용한 * 본연구는 2013년한남대학교학술연구조성비지원으로이루어졌음 Received 25 October 2013, Revised 19 November 2013 Accepted 20 December 2013 C The Society of Digital Policy & Management. All rights reserved. This is an open-access article distributed under the Corresponding Author: Gang-Soo Lee(Computer Engineering, terms of the Creative Commons Attribution Non-Commercial Hannam University) License ( which gslee@hnu.ac.kr permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is ISSN: properly cited. The Journal of Digital Policy & Management 381

2 안드로이드플랫폼에서의 High-Interaction 클라이언트허니팟적용방안연구 개인정보 / 금전탈취확산 이선정되었다 [1]. 모바일악성코드의공격방식대부분은개인의정보를유출하고동시에사용자에게금전적인피해를입힌다. 특히, 안드로이드플랫폼의경우오픈소스정책및다양한기기의보급으로인하여사용자가급속도로증가함과동시에 2011년부터악성코드로인한공격건수가폭발적으로증가하였다. 현재안드로이드악성코드는빠르게생성및변조되어퍼지고있으며, 공격의종류도급격하게증가하고있다. 현재, 안드로이드악성코드의증가와함께이를대응하기위한연구가활발히진행되고있으며각단말제조사및 ISP(Internet Service Provider) 사업자들은모바일백신등을유포하여개인소비자들을보호하고있는추세이다. 그러나대게안드로이드악성코드유포의목적이개인정보및금전탈취이기때문에공격자들은악성코드의빠른진화를통해서자신들의목적을이루려고한다. 따라서이러한악성코드에대처하기위해서는보다악성코드의빠른수집과분석이필요하다. 본논문에서는빠르게변조되는안드로이드악성코드를단시간내에수집하고분석대처할수있는수집시스템을설계하기위하여허니팟 (Honeypot) 개념을이용하였다. 제안시스템은가상환경을기반으로한 High-Interaction 클라이언트허니팟 (Client honeypot) 을이용하여설계되고구현되었으며안드로이드플랫폼에최적화되었다. 본논문의구성은다음과같다. 2장에서는허니팟을이용한악성코드수집및분석기술동향을알아보고 High-Interaction 클라이언트허니팟의장단점을분석한다. 3장에서는 High-Interaction 클라이언트허니팟의안드로이드적용방안을살펴보고시스템을설계한다. 4장에서는 High-Interaction 클라이언트허니팟과제안시스템동일기능별모듈을분석한다. 5장에서는결론을내린다. 2. 관련연구 2.1 허니팟 (Honeypot) 허니팟이란외부의다양한공격을유인해공격동향및유형을파악가능하게구현한가상의시스템을의미한다 [2]. 즉실제사용하고있지않은시스템을사용하고 있는것처럼보이게속여공격자의침입을허용하는시스템이다. 크게 Low-Interaction 허니팟 [3] 과 High- Interaction 허니팟 [3] 으로나뉜다. Interaction 이란허니팟이공격자에게허용하는활동의레벨의정의를의미한다 [3]. Low-Interaction 허니팟은제한된 Interaction, 즉에뮬레이트된서비스나운영체제등을이용하여구현된것이다. 구현이간단하고인프라에대한부담이적은것이장점이지만제한된정보만을수집가능하고알려진공격외에변조된공격의식별이어려운것이단점이다. 가장많이알려진 Low-Interaction 허니팟도구에는 Honeyd[4] 가있다. Honeyd 는사용하지않는 IP space를모니터링하여공격을탐지하는방식이다. High-Interaction 허니팟은실제동작하는시스템및어플리케이션제공한다. 많은양의정보수집가능, 공격자의행위에대한가정이필요없으므로신종변종공격이탐지가능하다는장점이있다. 그러나개발및유지보수가복잡하고, 다른시스템으로의공격전이위험성이있다. 대표적인예로는 Honeynet Project[5] 가있다. 기존허니팟을이용하여악성코드를수집하고분석하는것은한계점이존재한다 [6]. 다음표 1에서는허니팟의장단점비교를통하여허니팟의한계점을보여준다. <Table 1> Compare of Honeypots Advantages - Easiness the collection of malicious data - It can be applied to a variety of systems - New attacks monitoring possible - Burdenless implementation Disadvantages - Limitation of detection - Attacker can avoid it. - Management and operation needed - Risk of expansion attack 2.2 클라이언트허니팟 (Client Honeypot) 2.1장에서보여주듯이허니팟을이용한악성코드수집분석에는이미한계점이존재한다. 또한현재공격기술이발전함에따라기존허니팟기술들은공격자의흥미를유발시키지못한다. 따라서이후보다능동적으로악성코드를수집하고분석하기위하여클라이언트허니팟 [3] 의개념이도입되었다. 이것은웹브라우저를이용하여웹페이지를능동적으로방문하여해당페이지에악성여부를탐지하여악성코드를수집하고분석하는방식이다. 단순히공격을기다려서악성코드를수집하는방식 382 The Journal of Digital Policy & Management 2013 Dec; 11(12):

3 A High-Interaction Client Honeypot on Android Platform 보다는악성코드의수집이빠르고제로데이 (Zero-day) 공격에강하다는장점이있다. 클라이언트허니팟또한다음두가지의종류로나눌수있는데첫째는 Low-Interaction 클라이언트허니팟이다. 이것은웹상의악성코드의분석을위하여완벽한기능의운영체제나웹브라우저를이용하지않는다. 단지시뮬레이트된클라이언트를이용한다. 이러한방법의대표적인구현예는 HoneyC[7] 이다. 다음은 HoneyC 의개념도이다. High-Interaction 클라이언트허니팟을이용한악성코드분석도구중가장많이알려진것이 Capture-HPC [8,9] 이다. 이도구는허니넷프로젝트 (Honeyent Project) 의산출물로나온클라이언트공격을탐지분석하는도구이다 [5,10]. 다음그림3은 Capture-HPC 의개념도 [3] 이다. [Fig. 3] Capture-HPC[3] [Fig. 1] HoneyC 이러한방식은악성코드의수집부분에관해서만보다능동적기존 Low-Interaction 허니팟의장 단점을모두승계한다. 두번째는 High-Interaction 클라이언트허니팟이다. 이개념도마찬가지고기존 High-Interaction 허니팟의장 단점을모두승계한다. 다음그림2는일반적인 High-Interaction 클라이언트허니팟의일반적인구성형태 [3] 이다. Capture-HPC 는클라이언트서버구조를기반으로하고있다. 서버는클라이언트를컨트롤하고각각의클라이언트는가상머신상에구현되어독립적으로작동한다. 다음표2는 Low-Interaction 클라이언트허니팟과 High-Interaction 클라이언트허니팟을비교분석한것이다. Advantage <Table 2> Compare Client Honeypot classification Low-Interaction High-Interaction - Emulated operating - Real system and Implement system and application application - All feature implemented on system - New/variation Disadvantages Tools - Low cost - Low risk of infringement of the second - Collecting malicious codes are more fast. - Limited information is collected - Available only detect known attacks HoneyC[7], Monkey-Spider[11] etc malicious behavior can be detected. - A large amount of information can be collected - The complexity of the process of building - High cost of building - High risk of second infringement Capture-HPC, HoneyMonkey[12,13] etc [Fig. 2] High-Interaction Client Honeypot[3] The Journal of Digital Policy & Management 383

4 안드로이드플랫폼에서의 High-Interaction 클라이언트허니팟적용방안연구 3. 제안시스템설계 3.1 안드로이드플랫폼에서의 High-Interaction 클라이언트허니팟적용방안그림 2의 High-Interaction 클라이언트허니팟의일반적인구성을보면크게악성코드를수집하는 Host 부분과악성코드를분석하는 Data Analysis 시스템으로구분된다. Host의구성프론트엔드는탐색엔진을가지고웹페이지탐색을위한키워드또는다양한파라미터를제공한다. Host 상의 Clienthp.dll은다이얼로그박스의조정, 시스템무결성체크및웹브라우저의네비게이팅기능을하는모듈이다. 모든로그파일은원격으로데이터베이스에저장된다. Data analysis 시스템의분석프론트엔드 (frontend) 는수집된악성코드를실제환경에서분석하는역할을한다. 만일분석프론트엔드가실제네트워크상에위치한다면제 2차침해위험의발생위험이있다. 분석대상인악성코드가네트워크전파특성을가지고있다면동일네트워크상에구현되어있는실제시스템으로의전이가능성이있기때문이다. 이러한단점을극복하기위하여분석시스템은실제네트워크상에서는분리된형태인예를들어가상환경으로구성하는것이바람직하다. 또한가상환경은분석프론트엔드에서악성코드분석후다음파일분석전에시스템재설치를용이하게한다. 따라서제안하는시스템은위의장점을적용되고적은자원으로높은가치의침해공격정보수집이가능하도록가상환경으로구축한다. 제안하는시스템의전체흐름도는다음그림 4와같다. [Fig. 4] System Flowchart 전체시스템은하나의물리적시스템을기반으로가상환경으로구현하였다. 즉하나의물리시스템안에분석을시행하는에뮬레이터의환경을다양하게구성할수있으며적은자원으로많은양의데이터를처리할수있다. 다음그림 5는전체시스템의구성을보여준다. 3.2 제안시스템구조 3.1에서분석한결과를안드로이드플랫폼에적용하여시스템을설계한다. 현재안드로이드악성코드는대부분어플리케이션에의하여전파된다. 이러한이유로안드로이드악성코드수집의효율성을위하여악성어플리케이션유포의근원이되는블랙마켓을중심으로크롤링을수행한다. 수집된 APK( 안드로이드실행파일 ) 가만약기존분석을통하여블랙또는화이트리스트분류가되었다면분석대상에서제외한다. 이후분석을위하여메인모듈의기능을이용하여각에뮬레이터기반의분석엔진으로악성의심파일이전달되며메인모듈에서는정적분석을수행하고에뮬레이터기반의행위분석엔진에서는동적분석을통하여악성여부를빠르게탐지한다. [Fig. 5] Design of system 3.3 제안시스템모듈별기능제안시스템은하나의서버시스템에행위분석엔진을탑재한에뮬레이터, 가상환경에서의호스트자원과게스트운영체제및두모듈간의송 수신제어메커니즘을가지고있는하이퍼바이저, 각종분석결과및정보를수 384 The Journal of Digital Policy & Management 2013 Dec; 11(12):

5 A High-Interaction Client Honeypot on Android Platform 집하고가상머신의재복구등을수행하는메인모듈그리고크롤링을이용하여안드로이드악성코드어플리케이션을수집하는어플리케이션수집모듈로나뉜다. 또한관리를위한시스템과저장을위한시스템을별도의서버에구현하여관리및저장에확장성을높였다. 다음표 3 에서는제안시스템의구현을위하여각모듈별기능을분류하였다. <Table 3> Module of System No Classification Main Function - Malicious behavior of an application 1 Emulator module for collecting information with the Android virtual machine 2 Hypervisor - Host resources control - Guest OS, control -Transmitting and receiving transmission control 3 Main module - Collecting of process name, package name, main activity - Collecting information generated in XML format - Analysis results of XML forward to storage. - Analysis results of XML insert to database - Revert to type of emulator 4 Module of Collecting APK - Collecting of URL - Link URL filtering - Link URL filtering insert to database <Table 4> Comparison of function High-Interaction Client Honeypot - Configuration front-end System - Management System - Database - Storage - Analysis front-end - Clienthp.dll - Crawler 4.2 적용결과 - Emulator - Hypervisor - Main module Module of Collecting APK Function Management of information and policy for the collection of malicious code, Save analysis data and results Analysis of collected malware files Physical resources control Analysis control Insert a database of collect information System integrity check, etc. Collecting of Malicious suspected file 제안된시스템을적용하여구현하였을경우분석프론트엔드에해당하는안드로이드에뮬레이터의환경설정을자유로이변경가능하다. 다음그림 6은제안된시스템을이용하여구현한안드로이드에뮬레이터의현황이다. 4. 제안시스템평가 4.1 분석일반적인 High-Interaction 클라이언트허니팟의각모듈과제안된안드로이드플랫폼에적용시스템의각모듈을비교하였다. 다음표4는공통기능에대한모듈비교이다. 비교결과를분석해보면기존환경에서의구성프론트엔드와데이터베이스를각각별도의서버시스템으로설정하여정보및정책관리를유연하게구현할수있다. 또한분석프론트엔드, Clienthp.dll 및크라울러에해당하는모듈을하나의물리머신내에구현하고특히분석프론트엔드를가상머신으로설정함으로써보다적은자원으로다양한분석결과를도출가능하게설계되었다. [Fig. 6] Implementation of System 5. 결론기존 PC 환경에서효율적인악성코드분석방법으로알려진 High-Interaction 클라이언트허니팟을안드로이드환경에적용하여설계하였다. 제안된시스템은일반적인 High-Interaction 클라이언트허니팟의각모듈별기능을살려안드로이드플랫폼에서도적용가능하게설계되었다. 이는기존장점을모두 High-Interaction 클라이 The Journal of Digital Policy & Management 385

6 안드로이드플랫폼에서의 High-Interaction 클라이언트허니팟적용방안연구 언트허니팟가지게된다. 또한악성코드분석시스템을가상환경으로구축하여적은물리적자원을가지고고성능을기대할수있는시스템구현이가능하며관리서버와저장서버를별도로구축하여보다유연하고확장가능하게설계되었다. 앞으로빠르게진화하는안드로이드악성코드의발생가능성을예상하고즉각적으로대응가능한체계를구축할수있게도와주는시스템이될것이다. ACKNOWLEDGMENTS This paper was supported by the Hannam University Research Fund in REFERENCES [1] [2] Lance Spitznet (2003), Honeypots : Definitions and Value of honeypots. [3] Thorsten Holz, Niels Provos (2008), Virtual Honeypots [4] [5] [6] J Fritz (2011), Hybrid Intrusion detection network monitoring with honeypots. [7] Christian Seifert, Ian Welch, Peter Komisarczuk (2006), HoneyC - The Low-Interaction Client Honeypot. [8] [9] Radek Hes,Ramon Steenson,Christian Seifert (2010), The Capture-HPC client architecture [10] Christian Seifert, Ramon Steenson, Ian Welch, Peter Komisarczuk, Thorsten Holz, Bing Yuan, Michael A. Davis (2007),Know your Enemy: Malicious Web Servers. [11] Ali Ikinci, Thorsten Holz, Felix Freiling(2008), Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients [12] Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, and Sam King (2006), Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities [13] 정현미 (Jung, Hyun Mi) 2010 년 8 월 : 한남대학교컴퓨터공학과 ( 공학석사 ) 2010 년 9 월 ~ 현재 : 한남대학교컴퓨터공학과박사수료 2012 년 10 월 ~ 현재 : 한국과학기술정보연구원, 과학기술사이버안전센터선임연구원 관심분야 : 소프트웨어공학, 보안공학, IT 보안시스템개발, 안드로이드악성코드분석 hmjung@kisti.re.kr 손승완 (Son, Seung Wan) 김광석 (Kim, Kwang Seok) 2013 년 2 월 : 한남대학교컴퓨터공학과 ( 공학사 ) 2013 년 3 월 ~ 현재 : 한남대학교컴퓨터공학과석사과정재학중 관심분야 : 컴퓨터보안, 소프트웨어공학 son2898@hnu.ac.kr 2013 년 2 월 : 한남대학교컴퓨터공학과 ( 공학사 ) 2013 년 3 월 ~ 현재 : 한남대학교컴퓨터공학과석사과정재학중 관심분야 : 컴퓨터보안, 소프트웨어공학 kkslove4721@hnu.ac.kr 이강수 (Lee, Gang Soo) 1983년 2월 : 서울대학교전산학 ( 이학석사 ) 1985년 2월 : 서울대학교전산학 ( 이학박사 ) 1987년 3월 ~ 현재 : 한남대학교컴퓨터공학과교수 관심분야 : 보안공학, 소프트웨어공학, 웹공학 gslee@hnu.ac.kr 386 The Journal of Digital Policy & Management 2013 Dec; 11(12):

<30312DC1A4BAB8C5EBBDC5C7E0C1A4B9D7C1A4C3A52DC1A4BFB5C3B62E687770>

<30312DC1A4BAB8C5EBBDC5C7E0C1A4B9D7C1A4C3A52DC1A4BFB5C3B62E687770> Journal of the Korea Institute of Information and Communication Engineering 한국정보통신학회논문지(J. Korea Inst. Inf. Commun. Eng.) Vol. 19, No. 2 : 258~264 Feb. 2015 ID3 알고리즘 기반의 귀납적 추론을 활용한 모바일 OS의 성공과 실패에 대한

More information

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. vol. 29, no. 10, Oct ,,. 0.5 %.., cm mm FR4 (ε r =4.4)

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. vol. 29, no. 10, Oct ,,. 0.5 %.., cm mm FR4 (ε r =4.4) THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2018 Oct.; 29(10), 799 804. http://dx.doi.org/10.5515/kjkiees.2018.29.10.799 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) Method

More information

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Nov.; 26(11),

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Nov.; 26(11), THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2015 Nov.; 26(11), 985991. http://dx.doi.org/10.5515/kjkiees.2015.26.11.985 ISSN 1226-3133 (Print)ISSN 2288-226X (Online) Analysis

More information

인문사회과학기술융합학회

인문사회과학기술융합학회 Vol.5, No.5, October (2015), pp.471-479 http://dx.doi.org/10.14257/ajmahs.2015.10.50 스마트온실을 위한 가상 외부기상측정시스템 개발 한새론 1), 이재수 2), 홍영기 3), 김국환 4), 김성기 5), 김상철 6) Development of Virtual Ambient Weather Measurement

More information

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Dec.; 27(12),

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Dec.; 27(12), THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2016 Dec.; 27(12), 1036 1043. http://dx.doi.org/10.5515/kjkiees.2016.27.12.1036 ISSN 1226-3133 (Print) ISSN 2288-226X (Online)

More information

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Jun.; 27(6),

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Jun.; 27(6), THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2016 Jun.; 276), 504511. http://dx.doi.org/10.5515/kjkiees.2016.27.6.504 ISSN 1226-3133 Print)ISSN 2288-226X Online) Near-Field

More information

디지털포렌식학회 논문양식

디지털포렌식학회 논문양식 ISSN : 1976-5304 http://www.kdfs.or.kr Virtual Online Game(VOG) 환경에서의 디지털 증거수집 방법 연구 이 흥 복, 정 관 모, 김 선 영 * 대전지방경찰청 Evidence Collection Process According to the Way VOG Configuration Heung-Bok Lee, Kwan-Mo

More information

DBPIA-NURIMEDIA

DBPIA-NURIMEDIA Journal of the Korea Institute of Information and Communication Engineering 한국정보통신학회논문지(J. Korea Inst. Inf. Commun. Eng.) Vol. 19, No. 5 : 1031~1039 May. 2015 정보보호 산업의 경제적 파급효과 및 기여도 분석 김방룡 1 홍재표 2* Economic

More information

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Mar.; 28(3),

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Mar.; 28(3), THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2017 Mar.; 28(3), 163 169. http://dx.doi.org/10.5515/kjkiees.2017.28.3.163 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) PCB

More information

DBPIA-NURIMEDIA

DBPIA-NURIMEDIA 무선 센서 네트워크 환경에서 링크 품질에 기반한 라우팅에 대한 효과적인 싱크홀 공격 탐지 기법 901 무선 센서 네트워크 환경에서 링크 품질에 기반한 라우팅에 대한 효과적인 싱크홀 공격 탐지 기법 (A Effective Sinkhole Attack Detection Mechanism for LQI based Routing in WSN) 최병구 조응준 (Byung

More information

06_ÀÌÀçÈÆ¿Ü0926

06_ÀÌÀçÈÆ¿Ü0926 182 183 184 / 1) IT 2) 3) IT Video Cassette Recorder VCR Personal Video Recorder PVR VCR 4) 185 5) 6) 7) Cloud Computing 8) 186 VCR P P Torrent 9) avi wmv 10) VCR 187 VCR 11) 12) VCR 13) 14) 188 VTR %

More information

<30362E20C6EDC1FD2DB0EDBFB5B4EBB4D420BCF6C1A42E687770>

<30362E20C6EDC1FD2DB0EDBFB5B4EBB4D420BCF6C1A42E687770> 327 Journal of The Korea Institute of Information Security & Cryptology ISSN 1598-3986(Print) VOL.24, NO.2, Apr. 2014 ISSN 2288-2715(Online) http://dx.doi.org/10.13089/jkiisc.2014.24.2.327 개인정보 DB 암호화

More information

ecorp-프로젝트제안서작성실무(양식3)

ecorp-프로젝트제안서작성실무(양식3) (BSC: Balanced ScoreCard) ( ) (Value Chain) (Firm Infrastructure) (Support Activities) (Human Resource Management) (Technology Development) (Primary Activities) (Procurement) (Inbound (Outbound (Marketing

More information

DBPIA-NURIMEDIA

DBPIA-NURIMEDIA 박건수 *, 서태영 **, 김종욱 *** ". 요약 Abstract The induction melting furnace using electric generator has been introduced since 1920s, and it began to be widely applied to industrial applications due to increasing

More information

UDP Flooding Attack 공격과 방어

UDP Flooding Attack 공격과 방어 황 교 국 (fullc0de@gmail.com) SK Infosec Co., Inc MSS Biz. Security Center Table of Contents 1. 소개...3 2. 공격 관련 Protocols Overview...3 2.1. UDP Protocol...3 2.2. ICMP Protocol...4 3. UDP Flood Test Environment...5

More information

이도경, 최덕재 Dokyeong Lee, Deokjai Choi 1. 서론

이도경, 최덕재 Dokyeong Lee, Deokjai Choi 1. 서론 이도경, 최덕재 Dokyeong Lee, Deokjai Choi 1. 서론 2. 관련연구 2.1 MQTT 프로토콜 Fig. 1. Topic-based Publish/Subscribe Communication Model. Table 1. Delivery and Guarantee by MQTT QoS Level 2.1 MQTT-SN 프로토콜 Fig. 2. MQTT-SN

More information

PCServerMgmt7

PCServerMgmt7 Web Windows NT/2000 Server DP&NM Lab 1 Contents 2 Windows NT Service Provider Management Application Web UI 3 . PC,, Client/Server Network 4 (1),,, PC Mainframe PC Backbone Server TCP/IP DCS PLC Network

More information

서현수

서현수 Introduction to TIZEN SDK UI Builder S-Core 서현수 2015.10.28 CONTENTS TIZEN APP 이란? TIZEN SDK UI Builder 소개 TIZEN APP 개발방법 UI Builder 기능 UI Builder 사용방법 실전, TIZEN APP 개발시작하기 마침 TIZEN APP? TIZEN APP 이란? Mobile,

More information

03-서연옥.hwp

03-서연옥.hwp 농업생명과학연구 49(4) pp.31-37 Journal of Agriculture & Life Science 49(4) pp.31-37 Print ISSN 1598-5504 Online ISSN 2383-8272 http://dx.doi.org/10.14397/jals.2015.49.4.31 국가산림자원조사 자료를 적용한 충남지역 사유림경영율 추정 서연옥

More information

<C0CCBCBCBFB52DC1A4B4EBBFF82DBCAEBBE7B3EDB9AE2D313939392D382E687770>

<C0CCBCBCBFB52DC1A4B4EBBFF82DBCAEBBE7B3EDB9AE2D313939392D382E687770> i ii iii iv v vi 1 2 3 4 가상대학 시스템의 국내외 현황 조사 가상대학 플랫폼 개발 이상적인 가상대학시스템의 미래상 제안 5 웹-기반 가상대학 시스템 전통적인 교수 방법 시간/공간 제약을 극복한 학습동기 부여 교수의 일방적인 내용전달 교수와 학생간의 상호작용 동료 학생들 간의 상호작용 가상대학 운영 공지사항,강의록 자료실, 메모 질의응답,

More information

0125_ 워크샵 발표자료_완성.key

0125_ 워크샵 발표자료_완성.key WordPress is a free and open-source content management system (CMS) based on PHP and MySQL. WordPress is installed on a web server, which either is part of an Internet hosting service or is a network host

More information

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. vol. 29, no. 6, Jun Rate). STAP(Space-Time Adaptive Processing)., -

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. vol. 29, no. 6, Jun Rate). STAP(Space-Time Adaptive Processing)., - THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2018 Jun.; 29(6), 457463. http://dx.doi.org/10.5515/kjkiees.2018.29.6.457 ISSN 1226-3133 (Print)ISSN 2288-226X (Online) Sigma-Delta

More information

°í¼®ÁÖ Ãâ·Â

°í¼®ÁÖ Ãâ·Â Performance Optimization of SCTP in Wireless Internet Environments The existing works on Stream Control Transmission Protocol (SCTP) was focused on the fixed network environment. However, the number of

More information

Journal of Educational Innovation Research 2019, Vol. 29, No. 1, pp DOI: * Suggestions of Ways

Journal of Educational Innovation Research 2019, Vol. 29, No. 1, pp DOI:   * Suggestions of Ways Journal of Educational Innovation Research 2019, Vol. 29, No. 1, pp.65-89 DOI: http://dx.doi.org/10.21024/pnuedi.29.1.201903.65 * Suggestions of Ways to Improve Teaching Practicum Based on the Experiences

More information

09권오설_ok.hwp

09권오설_ok.hwp (JBE Vol. 19, No. 5, September 2014) (Regular Paper) 19 5, 2014 9 (JBE Vol. 19, No. 5, September 2014) http://dx.doi.org/10.5909/jbe.2014.19.5.656 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) a) Reduction

More information

(JBE Vol. 23, No. 6, November 2018) (Special Paper) 23 6, (JBE Vol. 23, No. 6, November 2018) ISSN 2

(JBE Vol. 23, No. 6, November 2018) (Special Paper) 23 6, (JBE Vol. 23, No. 6, November 2018)   ISSN 2 (JBE Vol. 23, No. 6, November 2018) (Special Paper) 23 6, 2018 11 (JBE Vol. 23, No. 6, November 2018) https://doi.org/10.5909/jbe.2018.23.6.790 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) ATSC 3.0 UHD

More information

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Jun.; 27(6),

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Jun.; 27(6), THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2016 Jun.; 27(6), 495 503. http://dx.doi.org/10.5515/kjkiees.2016.27.6.495 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) Design

More information

Microsoft Word - KSR2014S042

Microsoft Word - KSR2014S042 2014 년도 한국철도학회 춘계학술대회 논문집 KSR2014S042 안전소통을 위한 모바일 앱 서비스 개발 Development of Mobile APP Service for Safety Communication 김범승 *, 이규찬 *, 심재호 *, 김주희 *, 윤상식 **, 정경우 * Beom-Seung Kim *, Kyu-Chan Lee *, Jae-Ho

More information

PowerPoint 프레젠테이션

PowerPoint 프레젠테이션 Reasons for Poor Performance Programs 60% Design 20% System 2.5% Database 17.5% Source: ORACLE Performance Tuning 1 SMS TOOL DBA Monitoring TOOL Administration TOOL Performance Insight Backup SQL TUNING

More information

???? 1

???? 1 The Korean Journal of Applied Statistics (2014) 27(1), 13 20 DOI: http://dx.doi.org/10.5351/kjas.2014.27.1.013 Maximum Tolerated Dose Estimation by Stopping Rule and SM3 Design in a Phase I Clinical Trial

More information

FMX M JPG 15MB 320x240 30fps, 160Kbps 11MB View operation,, seek seek Random Access Average Read Sequential Read 12 FMX () 2

FMX M JPG 15MB 320x240 30fps, 160Kbps 11MB View operation,, seek seek Random Access Average Read Sequential Read 12 FMX () 2 FMX FMX 20062 () wwwexellencom sales@exellencom () 1 FMX 1 11 5M JPG 15MB 320x240 30fps, 160Kbps 11MB View operation,, seek seek Random Access Average Read Sequential Read 12 FMX () 2 FMX FMX D E (one

More information

김기남_ATDC2016_160620_[키노트].key

김기남_ATDC2016_160620_[키노트].key metatron Enterprise Big Data SKT Metatron/Big Data Big Data Big Data... metatron Ready to Enterprise Big Data Big Data Big Data Big Data?? Data Raw. CRM SCM MES TCO Data & Store & Processing Computational

More information

04_이근원_21~27.hwp

04_이근원_21~27.hwp 1) KIGAS Vol. 16, No. 5, pp 21~27, 2012 (Journal of the Korean Institute of Gas) http://dx.doi.org/10.7842/kigas.2012.16.5.21 실험실의 사례 분석에 관한 연구 이근원 이정석 한국산업안전보건공단 산업안전보건연구원 (2012년 9월 5일 투고, 2012년 10월 19일

More information

< FBFF9B0A320BEC7BCBAC4DAB5E520C0BAB4D0BBE7C0CCC6AE20C5BDC1F620B5BFC7E220BAB8B0EDBCAD283131BFF E302028C8A8C6E4C0CCC1F620BEF7B

< FBFF9B0A320BEC7BCBAC4DAB5E520C0BAB4D0BBE7C0CCC6AE20C5BDC1F620B5BFC7E220BAB8B0EDBCAD283131BFF E302028C8A8C6E4C0CCC1F620BEF7B 월간악성코드은닉사이트탐지 동향보고서 (11 월 ) 2012. 12. 침해사고대응단 인터넷침해대응센터 < 목차 > 1. 악성코드은닉동향요약 1 2. 홈페이지은닉형악성코드통계 2 - 유포지탐지 국가별현황 2 - 대량경유지가탐지된유포지 TOP10 3 - 악성코드유형별비율 4 - 악성코드취약점유형별비율 4 - 악성코드수집및분석결과 5 - 경유지탐지 업종별비율 10

More information

< 목차 > 1. 악성코드은닉동향요약 1 2. 홈페이지은닉형악성코드통계 2 - 유포지탐지 국가별현황 2 - 대량경유지가탐지된유포지 TOP 악성코드유형별비율 4 - 악성코드취약점유형별비율 4 - 악성코드수집및분석결과 5 - 경유지탐지 업종별비율 9 3. 악성코

< 목차 > 1. 악성코드은닉동향요약 1 2. 홈페이지은닉형악성코드통계 2 - 유포지탐지 국가별현황 2 - 대량경유지가탐지된유포지 TOP 악성코드유형별비율 4 - 악성코드취약점유형별비율 4 - 악성코드수집및분석결과 5 - 경유지탐지 업종별비율 9 3. 악성코 월간악성코드은닉사이트탐지 동향보고서 (2 월 ) 2013. 03. 침해사고대응단 인터넷침해대응센터 < 목차 > 1. 악성코드은닉동향요약 1 2. 홈페이지은닉형악성코드통계 2 - 유포지탐지 국가별현황 2 - 대량경유지가탐지된유포지 TOP10 3 - 악성코드유형별비율 4 - 악성코드취약점유형별비율 4 - 악성코드수집및분석결과 5 - 경유지탐지 업종별비율 9 3.

More information

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Sep.; 30(9),

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Sep.; 30(9), THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2019 Sep.; 30(9), 712 717. http://dx.doi.org/10.5515/kjkiees.2019.30.9.712 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) MOS

More information

example code are examined in this stage The low pressure pressurizer reactor trip module of the Plant Protection System was programmed as subject for

example code are examined in this stage The low pressure pressurizer reactor trip module of the Plant Protection System was programmed as subject for 2003 Development of the Software Generation Method using Model Driven Software Engineering Tool,,,,, Hoon-Seon Chang, Jae-Cheon Jung, Jae-Hack Kim Hee-Hwan Han, Do-Yeon Kim, Young-Woo Chang Wang Sik, Moon

More information

Special Theme _ 모바일웹과 스마트폰 본 고에서는 모바일웹에서의 단말 API인 W3C DAP (Device API and Policy) 의 표준 개발 현황에 대해서 살펴보고 관 련하여 개발 중인 사례를 통하여 이해를 돕고자 한다. 2. 웹 애플리케이션과 네이

Special Theme _ 모바일웹과 스마트폰 본 고에서는 모바일웹에서의 단말 API인 W3C DAP (Device API and Policy) 의 표준 개발 현황에 대해서 살펴보고 관 련하여 개발 중인 사례를 통하여 이해를 돕고자 한다. 2. 웹 애플리케이션과 네이 모바일웹 플랫폼과 Device API 표준 이강찬 TTA 유비쿼터스 웹 응용 실무반(WG6052)의장, ETRI 선임연구원 1. 머리말 현재 소개되어 이용되는 모바일 플랫폼은 아이폰, 윈 도 모바일, 안드로이드, 심비안, 모조, 리모, 팜 WebOS, 바다 등이 있으며, 플랫폼별로 버전을 고려하면 그 수 를 열거하기 힘들 정도로 다양하게 이용되고 있다. 이

More information

10(3)-09.fm

10(3)-09.fm w y wz 10«3y 253~258 (2010.12.) Journal of Korean Society of Urban Environment ³ w Á» Á Á y w y œw (2010 11 22, 2010 12 9 k) Study on Determine of Detention Pond in Small Developed Area In-Soo Chang ½

More information

,.,..,....,, Abstract The importance of integrated design which tries to i

,.,..,....,, Abstract The importance of integrated design which tries to i - - The Brand Touchpoint Analysis through Corporate Identity Typeface of Mobile Telecommunication Companies - Focusing on and - : Lee, Ka Young Dept. Lifestyle Design, Dankook University : Kim, Ji In Dept.

More information

<30345F283439372D353034295F313135375FC0CCB5BFC8F15FB5B5B7CEC5CDB3CEC0C720B0BBB1B8BACE20B0E6B0FCBCB3B0E8B0A120C5CDB3CE20B3BBBACEC1B6B8ED2E687770>

<30345F283439372D353034295F313135375FC0CCB5BFC8F15FB5B5B7CEC5CDB3CEC0C720B0BBB1B8BACE20B0E6B0FCBCB3B0E8B0A120C5CDB3CE20B3BBBACEC1B6B8ED2E687770> J of Korean Tunn Undergr Sp Assoc 15(5)497-504(2013) eissn: 2287-4747 http://dx.doi.org/10.9711/ktaj.2013.15.5.497 pissn: 2233-8292 도로터널의 갱구부 경관설계가 터널 내부조명에 미치는 영향에 관한 연구 이미애 1 ㆍ이동희 2 * 1 아이라이트 대표이사 2

More information

Cloud Friendly System Architecture

Cloud Friendly System Architecture -Service Clients Administrator 1. -Service 구성도 : ( 좌측참고 ) LB(LoadBlancer) 2. -Service 개요 ucloud Virtual Router F/W Monitoring 개념 특징 적용가능분야 Server, WAS, DB 로구성되어 web service 를클라우드환경에서제공하기위한 service architecture

More information

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Jul.; 27(7),

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Jul.; 27(7), THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 16 Jul.; 27(7), 64662. http://dx.doi.org/./kjkiees.16.27.7.646 ISSN 1226-3133 (Print)ISSN 2288-226 (Online) 2D Microwave Image

More information

<353420B1C7B9CCB6F52DC1F5B0ADC7F6BDC7C0BB20C0CCBFEBC7D120BEC6B5BFB1B3C0B0C7C1B7CEB1D7B7A52E687770>

<353420B1C7B9CCB6F52DC1F5B0ADC7F6BDC7C0BB20C0CCBFEBC7D120BEC6B5BFB1B3C0B0C7C1B7CEB1D7B7A52E687770> Journal of the Korea Academia-Industrial cooperation Society Vol. 13, No. 2 pp. 866-871, 2012 http://dx.doi.org/10.5762/kais.2012.13.2.866 증강현실을 이용한 아동교육프로그램 모델제안 권미란 1*, 김정일 2 1 나사렛대학교 아동학과, 2 한세대학교 e-비즈니스학과

More information

DBPIA-NURIMEDIA

DBPIA-NURIMEDIA 한국소음진동공학회 2015추계학술대회논문집년 Study of Noise Pattern and Psycho-acoustics Characteristic of Household Refrigerator * * ** ** Kyung-Soo Kong, Dae-Sik Shin, Weui-Bong Jeong, Tae-Hoon Kim and Se-Jin Ahn Key Words

More information

354-437-4..

354-437-4.. 357 358 4.3% 5.1% 8.2% 6.2% 5.6% 6% 5% 5.3% 96.1% 85.2% 39.6% 50.8% 82.7% 86.7% 28.2% 8.0% 60.0% 60.4% 18,287 16,601 (%) 100 90 80 70 60 50 40 86.6% 80.0% 77.8% 57.6% 89.7% 78.4% 82.1% 59.0% 91.7% 91.4%

More information

012임수진

012임수진 Received : 2012. 11. 27 Reviewed : 2012. 12. 10 Accepted : 2012. 12. 12 A Clinical Study on Effect of Electro-acupuncture Treatment for Low Back Pain and Radicular Pain in Patients Diagnosed with Lumbar

More information

<3035303432365FC8A8C6E4C0CCC1F620B0B3B9DF20BAB8BEC8B0A1C0CCB5E5C3D6C1BE28C0FAC0DBB1C7BBE8C1A6292E687770>

<3035303432365FC8A8C6E4C0CCC1F620B0B3B9DF20BAB8BEC8B0A1C0CCB5E5C3D6C1BE28C0FAC0DBB1C7BBE8C1A6292E687770> 개 요 홈페이지 해킹 현황 및 사례 홈페이지 개발시 보안 취약점 및 대책 주요 애플리케이션 보안 대책 결 론 참고자료 [부록1] 개발 언어별 로그인 인증 프로세스 예제 [부록2] 대규모 홈페이지 변조 예방을 위한 권고(안) [부록3] 개인정보의 기술적 관리적 보호조치 기준(안) [부록4] 웹 보안관련 주요 사이트 리스트 7000 6,478 6000 5000

More information

05(533-537) CPLV12-04.hwp

05(533-537) CPLV12-04.hwp 모바일 OS 환경의 사용자 반응성 향상 기법 533 모바일 OS 환경의 사용자 반응성 향상 기법 (Enhancing Interactivity in Mobile Operating Systems) 배선욱 김정한 (Sunwook Bae) 엄영익 (Young Ik Eom) (Junghan Kim) 요 약 사용자 반응성은 컴퓨팅 시스템에서 가장 중요 한 요소 중에 하나이고,

More information

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Dec.; 26(12),

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Dec.; 26(12), THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2015 Dec.; 26(12), 1100 1107. http://dx.doi.org/10.5515/kjkiees.2015.26.12.1100 ISSN 1226-3133 (Print) ISSN 2288-226X (Online)

More information

Service-Oriented Architecture Copyright Tmax Soft 2005

Service-Oriented Architecture Copyright Tmax Soft 2005 Service-Oriented Architecture Copyright Tmax Soft 2005 Service-Oriented Architecture Copyright Tmax Soft 2005 Monolithic Architecture Reusable Services New Service Service Consumer Wrapped Service Composite

More information

Journal of Educational Innovation Research 2018, Vol. 28, No. 1, pp DOI: * A Analysis of

Journal of Educational Innovation Research 2018, Vol. 28, No. 1, pp DOI: * A Analysis of Journal of Educational Innovation Research 2018, Vol. 28, No. 1, pp.99-117 DOI: http://dx.doi.org/10.21024/pnuedi.28.1.201803.99 2015 * A Analysis of the Characters and Issues about the 2015 Revised Social

More information

1217 WebTrafMon II

1217 WebTrafMon II (1/28) (2/28) (10 Mbps ) Video, Audio. (3/28) 10 ~ 15 ( : telnet, ftp ),, (4/28) UDP/TCP (5/28) centralized environment packet header information analysis network traffic data, capture presentation network

More information

thesis

thesis CORBA TMN Surveillance System DPNM Lab, GSIT, POSTECH Email: mnd@postech.ac.kr Contents Motivation & Goal Related Work CORBA TMN Surveillance System Implementation Conclusion & Future Work 2 Motivation

More information

±èÇö¿í Ãâ·Â

±èÇö¿í Ãâ·Â Smartphone Technical Trends and Security Technologies The smartphone market is increasing very rapidly due to the customer needs and industry trends with wireless carriers, device manufacturers, OS venders,

More information

09김정식.PDF

09김정식.PDF 00-09 2000. 12 ,,,,.,.,.,,,,,,.,,..... . 1 1 7 2 9 1. 9 2. 13 3. 14 3 16 1. 16 2. 21 3. 39 4 43 1. 43 2. 52 3. 56 4. 66 5. 74 5 78 1. 78 2. 80 3. 86 6 88 90 Ex e cu t iv e Su m m a r y 92 < 3-1> 22 < 3-2>

More information

[Brochure] KOR_TunA

[Brochure] KOR_TunA LG CNS LG CNS APM (TunA) LG CNS APM (TunA) 어플리케이션의 성능 개선을 위한 직관적이고 심플한 APM 솔루션 APM 이란? Application Performance Management 란? 사용자 관점 그리고 비즈니스 관점에서 실제 서비스되고 있는 어플리케이션의 성능 관리 체계입니다. 이를 위해서는 신속한 장애 지점 파악 /

More information

<32382DC3BBB0A2C0E5BED6C0DA2E687770>

<32382DC3BBB0A2C0E5BED6C0DA2E687770> 논문접수일 : 2014.12.20 심사일 : 2015.01.06 게재확정일 : 2015.01.27 청각 장애자들을 위한 보급형 휴대폰 액세서리 디자인 프로토타입 개발 Development Prototype of Low-end Mobile Phone Accessory Design for Hearing-impaired Person 주저자 : 윤수인 서경대학교 예술대학

More information

Intra_DW_Ch4.PDF

Intra_DW_Ch4.PDF The Intranet Data Warehouse Richard Tanler Ch4 : Online Analytic Processing: From Data To Information 2000. 4. 14 All rights reserved OLAP OLAP OLAP OLAP OLAP OLAP is a label, rather than a technology

More information

본문

본문 Handover Gateway System: A Cell-edge Performance Booster for Next Generation Cellular Mobile Network Eui Chang Jung, Hyun Seok Ryu, Chung G. Kang Dept of Computer Electrical Engineering, Korea University

More information

<31362DB1E8C7FDBFF82DC0FABFB9BBEA20B5B6B8B3BFB5C8ADC0C720B1B8C0FC20B8B6C4C9C6C32E687770>

<31362DB1E8C7FDBFF82DC0FABFB9BBEA20B5B6B8B3BFB5C8ADC0C720B1B8C0FC20B8B6C4C9C6C32E687770> Journal of the Korea Academia-Industrial cooperation Society Vol. 13, No. 4 pp. 1525-1531, 2012 http://dx.doi.org/10.5762/kais.2012.13.4.1525 저예산 독립영화의 구전 마케팅을 위한 스마트폰 모바일 애플리케이션 모델 개발 연구 김혜원 1* 1 청운대학교

More information

(JBE Vol. 22, No. 2, March 2017) (Regular Paper) 22 2, (JBE Vol. 22, No. 2, March 2017) ISSN

(JBE Vol. 22, No. 2, March 2017) (Regular Paper) 22 2, (JBE Vol. 22, No. 2, March 2017)   ISSN (JBE Vol. 22, No. 2, March 2017) (Regular Paper) 22 2, 2017 3 (JBE Vol. 22, No. 2, March 2017) https://doi.org/10.5909/jbe.2017.22.2.234 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) a), a), a) Real-time

More information

DW 개요.PDF

DW 개요.PDF Data Warehouse Hammersoftkorea BI Group / DW / 1960 1970 1980 1990 2000 Automating Informating Source : Kelly, The Data Warehousing : The Route to Mass Customization, 1996. -,, Data .,.., /. ...,.,,,.

More information

14.531~539(08-037).fm

14.531~539(08-037).fm G Journal of the Korea Concrete Institute Vol. 20, No. 4, pp. 531~539, August, 2008 š x y w m š gj p { sƒ z 1) * 1) w w Evaluation of Flexural Strength for Normal and High Strength Concrete with Hooked

More information

<B8F1C2F72E687770>

<B8F1C2F72E687770> Transactions of the KSNVE, 23(12) : 1056~1065, 2013 23 12, pp. 1056~1065, 2013 http://dx.doi.org/10.5050/ksnve.2013.23.12.1056 ISSN 1598-2785(Print), ISSN 2287-5476(Online) A Study on the Improvement Plan

More information

<353020B9DAC3E1BDC42DC5ACB6F3BFECB5E520C4C4C7BBC6C3BFA1BCADC0C720BAB8BEC820B0EDB7C1BBE7C7D7BFA120B0FCC7D120BFACB1B82E687770>

<353020B9DAC3E1BDC42DC5ACB6F3BFECB5E520C4C4C7BBC6C3BFA1BCADC0C720BAB8BEC820B0EDB7C1BBE7C7D7BFA120B0FCC7D120BFACB1B82E687770> 한국산학기술학회논문지 Vol. 12, No. 3 pp. 1408-1416, 2011 클라우드 컴퓨팅에서의 보안 고려사항에 관한 연구 박춘식 1* 1 서울여자대학교 정보보호학과 Study on Security Considerations in the Cloud Computing Choon-Sik Park 1* 1 Department of Information Security,

More information

DBPIA-NURIMEDIA

DBPIA-NURIMEDIA The e-business Studies Volume 17, Number 6, December, 30, 2016:275~289 Received: 2016/12/02, Accepted: 2016/12/22 Revised: 2016/12/20, Published: 2016/12/30 [ABSTRACT] SNS is used in various fields. Although

More information

원고스타일 정의

원고스타일 정의 논문접수일 : 2015.01.05 심사일 : 2015.01.13 게재확정일 : 2015.01.26 유니컨셉 디자인을 활용한 보행환경 개선방안 연구 A Study on Improvement of Pedestrian Environment on to Uniconcept Design 주저자 : 김동호 디지털서울문화예술대학교 인테리어실용미술학과 교수 Kim dong-ho

More information

제20회_해킹방지워크샵_(이재석)

제20회_해킹방지워크샵_(이재석) IoT DDoS DNS (jaeseog@sherpain.net) (www.sherpain.net) DDoS DNS DDoS / DDoS(Distributed DoS)? B Asia Broadband B Bots connect to a C&C to create an overlay network (botnet) C&C Provider JP Corp. Bye Bye!

More information

J2EE & Web Services iSeminar

J2EE & Web Services iSeminar 9iAS :, 2002 8 21 OC4J Oracle J2EE (ECperf) JDeveloper : OLTP : Oracle : SMS (Short Message Service) Collaboration Suite Platform Email Developer Suite Portal Java BI XML Forms Reports Collaboration Suite

More information

<35335FBCDBC7D1C1A42DB8E2B8AEBDBAC5CDC0C720C0FCB1E2C0FB20C6AFBCBA20BAD0BCAE2E687770>

<35335FBCDBC7D1C1A42DB8E2B8AEBDBAC5CDC0C720C0FCB1E2C0FB20C6AFBCBA20BAD0BCAE2E687770> Journal of the Korea Academia-Industrial cooperation Society Vol. 15, No. 2 pp. 1051-1058, 2014 http://dx.doi.org/10.5762/kais.2014.15.2.1051 멤리스터의 전기적 특성 분석을 위한 PSPICE 회로 해석 김부강 1, 박호종 2, 박용수 3, 송한정 1*

More information

Interstage5 SOAP서비스 설정 가이드

Interstage5 SOAP서비스 설정 가이드 Interstage 5 Application Server ( Solaris ) SOAP Service Internet Sample Test SOAP Server Application SOAP Client Application CORBA/SOAP Server Gateway CORBA/SOAP Gateway Client INTERSTAGE SOAP Service

More information

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Feb.; 29(2), IS

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Feb.; 29(2), IS THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2018 Feb.; 29(2), 93 98. http://dx.doi.org/10.5515/kjkiees.2018.29.2.93 ISSN 1226-3133 (Print) ISSN 2288-226X (Online) UHF-HF

More information

DE1-SoC Board

DE1-SoC Board 실습 1 개발환경 DE1-SoC Board Design Tools - Installation Download & Install Quartus Prime Lite Edition http://www.altera.com/ Quartus Prime (includes Nios II EDS) Nios II Embedded Design Suite (EDS) is automatically

More information

06_±è¼öö_0323

06_±è¼öö_0323 166 167 1) 2) 3) 4) source code 5) object code PC copy IP Internet Protocol 6) 7) 168 8) 9)10) 11) 12)13) / / 14) 169 PC publisher End User distributor RPG Role-Playing Game 15) FPS First Person Shooter

More information

APOGEE Insight_KR_Base_3P11

APOGEE Insight_KR_Base_3P11 Technical Specification Sheet Document No. 149-332P25 September, 2010 Insight 3.11 Base Workstation 그림 1. Insight Base 메인메뉴 Insight Base Insight Insight Base, Insight Base Insight Base Insight Windows

More information

#유한표지F

#유한표지F www.yuhan.ac.kr www.yuhan.ac.kr 대 학 요 람 2008 422-749 경기도 부천시 소사구 경인로 636(괴안동 185-34) Tel : 02)2610-0600 / 032)347-0600 유 한 대 학 대학요람 2008 2008 대학요람 설립자 유일한 박사의 숭고한 정신과 철학을 실천하는 대학 눈으로 남을 볼 줄 아는 사람은 훌륭한

More information

04서종철fig.6(121~131)ok

04서종철fig.6(121~131)ok Development of Mobile Applications Applying Digital Storytelling About Ecotourism Resources Seo, Jongcheol* Lee, Seungju**,,,. (mobile AIR)., 3D.,,.,.,,, Abstract : In line with fast settling trend of

More information

Lumbar spine

Lumbar spine Lumbar spine CT 32 111 DOI : 10.3831/KPI.2010.13.2.111 Lumbar Spine CT 32 Received : 10. 05. 23 Revised : 10. 06. 04 Accepted : 10. 06. 11 Key Words: Disc herniation, CT scan, Clinical analysis The Clinical

More information

DBPIA-NURIMEDIA

DBPIA-NURIMEDIA 논문 10-35-03-03 한국통신학회논문지 '10-03 Vol. 35 No. 3 원활한 채널 변경을 지원하는 효율적인 IPTV 채널 관리 알고리즘 준회원 주 현 철*, 정회원 송 황 준* Effective IPTV Channel Control Algorithm Supporting Smooth Channel Zapping HyunChul Joo* Associate

More information

<333820B1E8C8AFBFEB2D5A6967626565B8A620C0CCBFEBC7D120BDC7BFDC20C0A7C4A1C3DFC1A42E687770>

<333820B1E8C8AFBFEB2D5A6967626565B8A620C0CCBFEBC7D120BDC7BFDC20C0A7C4A1C3DFC1A42E687770> Journal of the Korea Academia-Industrial cooperation Society Vol. 13, No. 1 pp. 306-310, 2012 http://dx.doi.org/10.5762/kais.2012.13.1.306 Zigbee를 이용한 실외 위치추정 시스템 구현 김환용 1*, 임순자 1 1 원광대학교 전자공학과 Implementation

More information

10 이지훈KICS2015-03-068.hwp

10 이지훈KICS2015-03-068.hwp 논문 15-40-05-10 The Journal of Korean Institute of Communications and Information Sciences '15-05 Vol.40 No.05 http://dx.doi.org/10.7840/kics.2015.40.5.851 가로등 인프라를 활용한 안전한 스마트 방범 시스템 차 정 화, 이 주 용 *, 이

More information

1. KT 올레스퀘어 미디어파사드 콘텐츠 개발.hwp

1. KT 올레스퀘어 미디어파사드 콘텐츠 개발.hwp Journal of Next-generation Convergence Information Services Technology Vol.4, No.1, June (2015), pp. 1-8 차세대컨버전스정보서비스기술논문지 KT 올레스퀘어 미디어파사드 콘텐츠 개발 Media Fasade Contents Development of KT Olleh Square 김동조

More information

(JBE Vol. 23, No. 1, January 2018) (Special Paper) 23 1, (JBE Vol. 23, No. 1, January 2018) ISSN 2287-

(JBE Vol. 23, No. 1, January 2018) (Special Paper) 23 1, (JBE Vol. 23, No. 1, January 2018)   ISSN 2287- (JBE Vol. 23, No. 1, January 2018) (Special Paper) 23 1, 2018 1 (JBE Vol. 23, No. 1, January 2018) https://doi.org/10.5909/jbe.2018.23.1.26 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) - a), a) A Scheme

More information

<313920C0CCB1E2BFF82E687770>

<313920C0CCB1E2BFF82E687770> 韓 國 電 磁 波 學 會 論 文 誌 第 19 卷 第 8 號 2008 年 8 月 論 文 2008-19-8-19 K 대역 브릭형 능동 송수신 모듈의 설계 및 제작 A Design and Fabrication of the Brick Transmit/Receive Module for K Band 이 기 원 문 주 영 윤 상 원 Ki-Won Lee Ju-Young Moon

More information

Journal of Educational Innovation Research 2017, Vol. 27, No. 2, pp DOI: : Researc

Journal of Educational Innovation Research 2017, Vol. 27, No. 2, pp DOI:   : Researc Journal of Educational Innovation Research 2017, Vol. 27, No. 2, pp.251-273 DOI: http://dx.doi.org/10.21024/pnuedi.27.2.201706.251 : 1997 2005 Research Trend Analysis on the Korean Alternative Education

More information

<31325FB1E8B0E6BCBA2E687770>

<31325FB1E8B0E6BCBA2E687770> 88 / 한국전산유체공학회지 제15권, 제1호, pp.88-94, 2010. 3 관내 유동 해석을 위한 웹기반 자바 프로그램 개발 김 경 성, 1 박 종 천 *2 DEVELOPMENT OF WEB-BASED JAVA PROGRAM FOR NUMERICAL ANALYSIS OF PIPE FLOW K.S. Kim 1 and J.C. Park *2 In general,

More information

Backup Exec

Backup Exec (sjin.kim@veritas.com) www.veritas veritas.co..co.kr ? 24 X 7 X 365 Global Data Access.. 100% Storage Used Terabytes 9 8 7 6 5 4 3 2 1 0 2000 2001 2002 2003 IDC (TB) 93%. 199693,000 TB 2000831,000 TB.

More information

HTML5* Web Development to the next level HTML5 ~= HTML + CSS + JS API

HTML5* Web Development to the next level HTML5 ~= HTML + CSS + JS API WAC 2.0 & Hybrid Web App 권정혁 ( @xguru ) 1 HTML5* Web Development to the next level HTML5 ~= HTML + CSS + JS API Mobile Web App needs Device APIs Camera Filesystem Acclerometer Web Browser Contacts Messaging

More information

<332EC0E5B3B2B0E62E687770>

<332EC0E5B3B2B0E62E687770> 한국패션디자인학회지 제12권 4호 Journal of the Korean Society of Fashion Design Vol. 12 No. 4 (2012) pp.29-43 모바일 패션도구로서 어플리케이션의 활용 실태 장 남 경 한세대학교 디자인학부 섬유패션디자인전공 조교수 요 약 본 연구는 스마트폰의 패션관련 어플리케이션의 현황을 조사하고 유형과 특징을 분석하여,

More information

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Mar.; 25(3),

THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE Mar.; 25(3), THE JOURNAL OF KOREAN INSTITUTE OF ELECTROMAGNETIC ENGINEERING AND SCIENCE. 2014 Mar.; 25(3), 304310. http://dx.doi.org/10.5515/kjkiees.2014.25.3.304 ISSN 1226-3133 (Print)ISSN 2288-226X (Online) Analysis

More information

08김현휘_ok.hwp

08김현휘_ok.hwp (Regular Paper) 21 3, 2016 5 (JBE Vol. 21, No. 3, May 2016) http://dx.doi.org/10.5909/jbe.2016.21.3.369 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) a), a) An Audio Coding Technique Employing the Inter-channel

More information

정보기술응용학회 발표

정보기술응용학회 발표 , hsh@bhknuackr, trademark21@koreacom 1370, +82-53-950-5440 - 476 - :,, VOC,, CBML - Abstract -,, VOC VOC VOC - 477 - - 478 - Cost- Center [2] VOC VOC, ( ) VOC - 479 - IT [7] Knowledge / Information Management

More information

Analyst Briefing

Analyst Briefing . Improve your Outlook on Email and File Management iseminar.. 1544(or 6677)-3355 800x600. iseminar Chat... Improve your Outlook on Email and File Management :, 2003 1 29.. Collaboration Suite - Key Messages

More information

Microsoft Word - ntasFrameBuilderInstallGuide2.5.doc

Microsoft Word - ntasFrameBuilderInstallGuide2.5.doc NTAS and FRAME BUILDER Install Guide NTAS and FRAME BUILDER Version 2.5 Copyright 2003 Ari System, Inc. All Rights reserved. NTAS and FRAME BUILDER are trademarks or registered trademarks of Ari System,

More information

Something that can be seen, touched or otherwise sensed

Something that can be seen, touched or otherwise sensed Something that can be seen, touched or otherwise sensed Things about an object Weight Height Material Things an object does Pen writes Book stores words Water have Fresh water Rivers Oceans have

More information

Secure Programming Lecture1 : Introduction

Secure Programming Lecture1 : Introduction Malware and Vulnerability Analysis Lecture3-2 Malware Analysis #3-2 Agenda 안드로이드악성코드분석 악성코드분석 안드로이드악성코드정적분석 APK 추출 #1 adb 명령 안드로이드에설치된패키지리스트추출 adb shell pm list packages v0nui-macbook-pro-2:lecture3 v0n$

More information

ORANGE FOR ORACLE V4.0 INSTALLATION GUIDE (Online Upgrade) ORANGE CONFIGURATION ADMIN O

ORANGE FOR ORACLE V4.0 INSTALLATION GUIDE (Online Upgrade) ORANGE CONFIGURATION ADMIN O Orange for ORACLE V4.0 Installation Guide ORANGE FOR ORACLE V4.0 INSTALLATION GUIDE...1 1....2 1.1...2 1.2...2 1.2.1...2 1.2.2 (Online Upgrade)...11 1.3 ORANGE CONFIGURATION ADMIN...12 1.3.1 Orange Configuration

More information

F1-1(수정).ppt

F1-1(수정).ppt , thcho@kisaorkr IPAK (Information Protection Assessment Kit) IAM (INFOSEC Assessment Methodology) 4 VAF (Vulnerability Assessment Framework) 5 OCTAVE (Operationally Critical Threat, Asset, and Vulnerability

More information

(JBE Vol. 21, No. 1, January 2016) (Regular Paper) 21 1, (JBE Vol. 21, No. 1, January 2016) ISSN 228

(JBE Vol. 21, No. 1, January 2016) (Regular Paper) 21 1, (JBE Vol. 21, No. 1, January 2016)   ISSN 228 (JBE Vol. 1, No. 1, January 016) (Regular Paper) 1 1, 016 1 (JBE Vol. 1, No. 1, January 016) http://dx.doi.org/10.5909/jbe.016.1.1.60 ISSN 87-9137 (Online) ISSN 16-7953 (Print) a), a) An Efficient Method

More information