Title Experimental study to verify the safety and efficiency of the use of Beauty Care Device for facial skin Category Beauty & Health
Author KyungSang Sung1, Heejoo Im2, Seonggyu Kim3, Wonshik Na Organigation ICCIT2021
Abstract   Submit Date 2021
In this experimental research paper, we tried to objectively verify the safety and effectiveness of the LED Mask by analyzing the effect of improving pores, skin brightness, skin tone, sebum, etc. As a result of the experiment, when using the LED Mask according to the skin type, the effect of about 70% on the improvement and maintenance of the facial skin was proved, and the result of the questionnaire was also able to confirm the stability.

 

Title A Study on military cyber threat cases and countermeasures Category Security
Author Kyung-Sang Sung1, Hyun-Chang Lee 2, Wonshik Na Organigation ICCIT2020
Abstract   Submit Date 2020
As such, countries all over the world are seeking to strengthen their defense capacity and prepare reliable cybersecurity strategies by linking the private, public, and defense sectors at the national strategy level. This paper will look at the concept of the Fourth Industrial Revolution, case studies of intelligent cyber threats, model cases of countering cyber threats, and the status quo of Korea. Based on this, the paper will present countermeasures for the South Korean military that will allow it to actively transform its defense system.

 

Title A Study on the Implementation of a System Providing Reliable Malware Information Service Category Security
Author Kyung-Sang Sung, Wonshik Na Organigation IJEEE
Abstract   Submit Date 2019
Malware can be diagnosed several ways or even pass under the radar at times. This can cause confusion in the users, who do not welcome a flood of unorganized information in general. This paper proposes an extraction method that can provide reliable and established results in order to tackle the issue from the user's point of view. To guarantee the reliability of AVS and AVS against the malware, this paper tested malware that can actually be found in use. Such processes allow this paper to extract and provide the most reliable information to users.
In addition, this paper can help the students who study security establish the concept of malicious code. And research subjects are enough to prepare malicious code countermeasures for security graduate students.

+ Recent posts