Min-kyu Choi
Hannam University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Min-kyu Choi.
International Conference on Security Technology | 2009
Rosslin John Robles; Min-kyu Choi
Traditionally SCADA is connected only in a limited private network. With new technology and facilities, there are also demands of connecting SCADA though the internet. The internet SCADA facility has brought a lot of advantages in terms of control, data viewing and generation. Aside from connecting SCADA to the internet, there are also operators who want to connect their system wirelessly. This can save budget for communication lines. Along with the advantages it brings, are security issues regarding wireless internet SCADA. In this paper, we discuss internet SCADA, its connection through wireless communication and the security issues surrounding it. To answer the security issues, a symmetric-key encryption for wireless internet SCADA is proposed.
2008 International Symposium on Ubiquitous Multimedia Computing | 2008
Rosslin John Robles; Min-kyu Choi; Sang-Soo Yeo; Tai-hoon Kim
Most access control approaches are based on individual users. Access control should also cover the enterprise wide systems. Role-based access control (RBAC) with the support of cookies is the solution to this problem. Cookies can be used to support RBAC on the Web by storing userspsila role information. However, cookies also have some technical drawbacks. In particular, they do not always accurately identify users or they can be used for security attacks. In this paper, we discuss the implementation of role-based access control with role hierarchies on the Web by secure cookies.
2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security | 2009
Feruza Sattarova Yusufovna; Farkhod Alisherov Alisherovich; Min-kyu Choi; Eun-suk Cho; Furkhat Tadjibayev Abdurashidovich; Tai-hoon Kim
A research on current condition and problems of critical infrastructures and critical information infrastructures is described in this paper. This article includes issues, the discussion of problems and comments about each of the common Critical Infrastructures from an international, national, local and individual perspective. There are many threats to these infrastructures. And it remains a challenge to the society to deliver solutions to problems such as these. Also the situation in Korea on each sector of Critical Infrastructure is considered in the article.
2009 International e-Conference on Advanced Science and Technology | 2009
Rosslin John Robles; Min-kyu Choi; Eun-suk Cho
File sharing is a common practice since the introduction of computer networks. It involves using technology that allows network users to share files that are stored on their individual computers. Peer-to-peer or simply P2P applications, such as those used to share multimedia files, are some of the most common forms of file-sharing technology. However, P2P applications are vulnerable to security risks that may put your information or your computer in jeopardy. In this paper, Issues and solution in P2P Sharing are discussed. We also suggest a method in file sharing which include the splitting of the file into chunks before the sending process. Our methods process and applicability is also covered.
International Conference on Security-Enriched Urban Computing and Smart Grid | 2010
Timir Maitra; Anindya Jyoti Pal; Min-kyu Choi; Tai-hoon Kim
A recent and very promising approach for combinatorial optimization is to embed local search into the framework of evolutionary algorithms. In this paper, we present one efficient hybrid algorithms for the graph coloring problem. Here we have considered the hybridization of Boltzmann Machine (BM) of Artificial Neural Network with Genetic Algorithms. Genetic algorithm we have used to generate different coloration of a graph quickly on which we have applied boltzmann machine approach. Unlike traditional approaches of GA and ANN the proposed hybrid algorithm is guranteed to have 100% convergence rate to valid solution with no parameter tuning. Experiments of such a hybrid algorithm are carried out on large DIMACS Challenge benchmark graphs. Results prove very competitive. Analysis of the behavior of the algorithm sheds light on ways to further improvement.
2008 Advanced Software Engineering and Its Applications | 2008
Farzana Yousuf; Aamer Nadeem; Zahid Zaman; Tai-hoon Kim; Min-kyu Choi
Component based software engineering (CBSE) is a new archetype to construct the systems by using reusable components ldquoas it isrdquo. To achieve high dependability in such systems, there must be appropriate fault tolerance mechanism in them at the architectural level. This paper presents a fault tolerant component based architecture that relies on the C2 architectural style and is based on design diverse and exception handling fault tolerance strategies. The proposed fault tolerant component architecture employs special-purpose connectors called design diverse-multiple version connectors (DD-MVC). These connectors allow design diverse n-versions of components to run in parallel. The proposed architecture has a fault tolerant connector (FTC), which detects and tolerates different kinds of errors. The proposed architecture adjusts the tradeoff between dependability and efficiency at run time and exhibits the ability to tolerate the anticipated and unanticipated faults effectively. The applicability of proposed architecture is demonstrated with a case study.
international conference on future generation information technology | 2012
Min-kyu Choi; Goreti Marreiros; Myunggwon Hwang; Zita Vale; Hoon Ko
Optimal Intelligent Supervisory Control System (OISCS) is the program which has an evaluation / a monitor and a control functions for home / office devices from outdoor [1][2]. For their controlling, we usually use Mobile Devices (MD). Also, we can avoid energy wasting by using MDs. However, because they use a network system, all security problems will belong to MDs such as a man in the middle attack. If attackers take transferring contents between MDs and a home/a office, they can see inside. It will be potential troubles. To avoid it, we designed and implemented to all contents which are transferring in network.
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology | 2010
Debnath Bhattacharyya; Arup Kumar Bhaumik; Min-kyu Choi; Tai-hoon Kim
In this paper, we propose a data hiding and extraction procedure for high resolution AVI videos. Although AVI videos are large in size but it can be transmitted from source to target over network after processing the source video by using these Data hiding and Extraction procedure securely. There are two different procedures, which are used here at the senders end and receivers end respectively. The procedures are used here as the key of Data Hiding and Extraction.
Archive | 2009
Debnath Bhattacharyya; Rahul Ranjan; A Farkhod Alisherov; Min-kyu Choi
Archive | 2008
Min-kyu Choi; Rosslin John Robles; Chang-hwa Hong; Tai-hoon Kim