The competition of Go between AlphaGo and Lee Sedol attracted global interest; AlphaGo was victorious. The core function of AlphaGo is a deep-learning system, in which the computer learns by itself. It is now said that the utility of deep-learning systems using artificial intelligence is verified. Recently, the government of South Korea passed the lnternet of Things (IoT) Act with a view to developing a business model to promote loT. In this paper, we identify IoT market sales through IoT market trend analysis and extract an IoT business model. Then, we apply the findings to Deep learning AI technology in order to design an internet business model for Deep learning AI. We look at Deep Learning as it is used in smart home technology, autonomous vehicles, and a healthcare wearable device. This paper will be fundamental for social development using the technologies of the 4th industry.
The world has actually been attacked from other countries by means of cyberattacks against national infrastructure and cyber-terror weapons. In December, 2014, a The world has actually been attacked from other countries [ 5] by means of cyberattacks against national infrastructure and cyber-terror weapons [6]. In 2007, the cyberattack weapons(malicious codes) including Stuxnet and Duqu [7] paralyzed the nuclear system of Iran to steal national secrets. In September, 2012, more than one million people participated in the agitation urged through the SNS to result in nationwide agitation leading to extreme conflict between members of the public, and ruin national economy in Mexico [8]. In 2013, information about the F-35 fighters was stolen through a subcontractor of the US Department of Defense. Confidential personal information [9] of approximately 6 million Facebook users in 2013 and approximately 38 million Adove users in October was stolen. In December, 2014, a hacker stole the nuclear power data including key nuclear power technology like "SPACE (Safety and Performance Analysis CodE)" managed by KHNP (Korea Hydoro & Nuclear Power Co., Ltd) to infringe people"s assets and further increased damages and people"s uneasiness [10] about cyberterror attacks against national infrastructure.The National Cybersecurity Act in response to cybercrime and cyber-terrorism and cyberwarfare citizens, public agencies, and experts in the military to establish a comprehensive response system for participation. National Cybersecurity Council should respond to cyberattacks, defense, media psychological warfare. National Cybersecurity Council is mutually share relevant information and real-time analysis, information sharing International Journal of Security and Its Applications Vol.9, No.11 (2015) 106 Copyright ⓒ 2015 SERSC and coordination support. In addition, the permanent council of the national constitution, government, and military operations 2. National Cybersecurity Act (Draft)All Article 1 (Objective) : This Act aims to detect cyberattacks and cyber-terror attacks on a national basis, block potential cyber-terror attacks and warfare at their early stage, integrate national cybersecurity capacity when cyber-terror attacks and warfare occur for quick action to ensure people"s safety and protect their interests.Article 2 (Definition) : ① Definitions of terms used in this Act is described below. A "cybercrime" is a criminal behavior which causes the country and people to experience damage by intruding into an information and communication network without permission for access to the network, threatening, disturbing, paralyzing, or destroying information and communication resources by means of hacking attacks, computer virus, service interruption, electromagnetic waves or remote co ntrol, stealing, distorting, propagating, infringing or draining information, misusing rights, operating illegal websites, corrupting or deleting information. A " cyber-terror attack" is the case that at least 2 cybercrimes including s...
Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LGU+) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect. 키워드IP-PBX, 해킹 공격, 공격 분석, 취약점
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.