• Title/Summary/Keyword: Pirate

Search Result 54, Processing Time 0.033 seconds

An Automated Technique for Illegal Site Detection using the Sequence of HTML Tags (HTML 태그 순서를 이용한 불법 사이트 탐지 자동화 기술)

  • Lee, Kiryong;Lee, Heejo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1173-1178
    • /
    • 2016
  • Since the introduction of BitTorrent protocol in 2001, everything can be downloaded through file sharing, including music, movies and software. As a result, the copyright holder suffers from illegal sharing of copyright content. In order to solve this problem, countries have enacted illegal share related law; and internet service providers block pirate sites. However, illegal sites such as pirate bay easily reopen the site by changing the domain name. Thus, we propose a technique to easily detect pirate sites that are reopened. This automated technique collects the domain names using the google search engine, and measures similarity using Longest Common Subsequence (LCS) algorithm by comparing the tag structure of the source web page and reopened web page. For evaluation, we colledted 2,383 domains from google search. Experimental results indicated detection of a total of 44 pirate sites for collected domains when applying LCS algorithm. In addition, this technique detected 23 pirate sites for 805 domains when applied to foreign pirate sites. This experiment facilitated easy detection of the reopened pirate sites using an automated detection system.

A Public Key Traitor Tracing Scheme with Key-update Method (개인키 업데이트가 가능한 공개키 기반 공모자 추적 암호 알고리즘)

  • Lee, Moon-Shik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.1
    • /
    • pp.46-56
    • /
    • 2012
  • Traitor Tracing schemes are broadcast encryption systems where at least one of the traitors who were implicated in the construction of a pirate decoder can be traced. This traceability is required in various contents delivery system like satellite broadcast, DMB, pay-TV, DVD and so on. In this paper, we propose a public key traitor tracing scheme with key-update method. If the system manager can update a secret key which is stored in an authorized decode, it makes a pirate decoder useless by updating a secret key A pirate decoder which cannot update a secret key does not decrypt contents in next session or during tracing a traitor, this scheme has merits which will make a pirate decoder useless, therefore this scheme raises the security to a higher level.

Toxicity of Pesticides to Minute Pirate Bug, Orius strigicollis Poppius (Hemiptera: Anthocoridae), a Predator of Thrips (총채벌레의 천적인 으뜸애꽃노린재에 대한 농약 독성)

  • Ahn Ki-Su;Lee Ki-Yeol;Kang Hyu-Jung;Park Sung-Kyu;Kim Gil-Hah
    • Korean journal of applied entomology
    • /
    • v.43 no.3 s.136
    • /
    • pp.257-262
    • /
    • 2004
  • Toxicities of 51 pesticides (25 insecticides, 11, acaricides, 11 fungicides and 4 adjuvants) commonly used to control greenhouse insect, mite, and disease pests were evaluated to minute pirate bug, Orius strigicollis nymphs and adults at the recommended concentration. Among 25 insecticides tested, fipronil, lufenuron, acetamiprid+fipronil, $\alpha$-cypermethrin+flufenoxuron and buprofezin + amitraz showed low toxicity to O. strigicollis. Among acaricides, acequinocyl, bifenazate, chlorfenapyr, etoxazole, fenpyroximate, flufenoxuron, milbemectin, spirodiclofen and tebufenpyrad showed low toxicity to O. strigicollis. All fungicides and adjuvants tested were very low toxicity. It may be suggested from these results that five insecticides, nine acaricides, eleven fungicides and four adjuvants could be incorporated into the integrated thrips management system with O. strigicollis in greenhouses.

A Study on Situations and Response Methods for Pirate Incidents in the Seas Southwest of the Philippines (필리핀 남서부 해적사고 현황과 대응방안 연구)

  • Na, Song-Jin
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.7
    • /
    • pp.829-833
    • /
    • 2017
  • Recently, pirate incidents involving passing ships have been continuously occurring in the seas southwest of the Philippines, the Sulu Sea and the Celebes Sea. Pirates in these areas are members of the "Abu Sayyaf Group", which consists of Islamic armed rebels. They have abducted and confined 59 ship crews over the last 13 months to obtain money for group operations. The activities of these pirates, abducting and killing crews, have became a significant threat for marine security in the Sulu and Celebes Seas and for logistic activities in Asia. This study examines and analyzes 22 recent incidents in terms of ships gross tonnage, kind, nationality, incident time, location, etc. The identity of the Abu Sayyaf Group, which has been committing this piracy and represents the de facto power behind the actors responsible, is also unpacked, along with current challenges to resolving these conflicts. Finally, responses passing ships, shipping companies, related countries and the international community should make are proposed.

A study on the Optimum Capacity of Citadel (선원대피처의 적정규모에 관한 연구)

  • Kim, Won-Ouk;Kim, Chang-Jae;Chae, Yang-Bum
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2011.11a
    • /
    • pp.142-143
    • /
    • 2011
  • As mentioned above, various safety measures are considered and discussed as hijacking of Korean vessels by pirates is increasing. Thus, the standard for ship's facilities has been partially revised and setting up an evacuation shelter on all vessels sailing dangerous zone has been reinforced. This research aims to discuss crew Citadel set up that has to sail long haul. In addition, measures against potential gas flow have to be taken due to recent pirate armed and portable rocket attacks. There is also a possibility of fire outbreak within the vessel due to its nature. Thus, this research assesses the relevant number of crew Citadel theoretically. It will also make a model by estimating the relevant number of shelters in the event of fire outbreak and implement simulation using FDS.

  • PDF

A study on the construction of aafer citadel (보다 안전한 선원대피처 구축에 관한 연구)

  • Ha, Weon-Jae
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.3
    • /
    • pp.318-324
    • /
    • 2014
  • A Citadel is a designated pre-constructed space in the ship for the crew protection, in the event of imminent boarding by pirates. A Citadel is to be designed and constructed to resist for a certain period against pirate attack. A Citadel constructed in secret place of the ship based on the provisions of international and national requirements, is the last refuge from the pirates attack. This study try to identity identify the limitation and weakness of the current Citadel and suggest to applicable improvement on the Rules for Ship's Facilities for safer and more secure Citadel.

Pirates in History and International Law Centering around the Viking Pirates (역사상 해적과 국제법상 해적 : 바이킹 해적을 중심으로)

  • Kim, Joo-Sik
    • Strategy21
    • /
    • s.30
    • /
    • pp.263-285
    • /
    • 2012
  • History, demonstrating convincingly that pirates have arisen continuously for a lengthy period of time throughout the world, is able to become a cooperative study of international law in terms of pirates matters ; Viking pirates. There are beneficial topics for the study of true nature of viking activities and the settlement of present pirates matters ; How were the pirates activities of Vikings, What sort of relations do they have between Vikings and other pirates which have arisen in world history, What are the differences compared to present concept of pirates. There were active pirates activities in the coast and waters of Scandinavia even before the period of the Migration Age because of geographical condition. With those experiences, Vikings began to ambush Britain Islands sailing across the North Sea since the late 8C, ages of migration in earnest. They ambushed all coasts of the European Continent expending boundary until the late of 11C. Pirate activities in a sort of guerrilla operations were operated when they encountered Islams in the Iberian Peninsula and the coast of North Africa. They showed twofold attitudes ; if the defence of the region and sea was weak, they plundered, or if strong, traded. In plundered europeans' position, Vikings were pirates with cruelty and barbarians. In vikings position, they were normal human beings who did a pirate activity to lead a better life. Viking pirates showed different characteristics in terms of three aspects ; area and aspect of action, activity after piracy. Meanwhile, Viking pirates showed several differences with pirates defined in terms of modern international law. Among the satisfying conditions of pirates, required by the international law of the sea, Vikings fulfilled animus furandi, desire for gain, activities for hatred and revenge, and private ends. Other conditions including attacking authority of the vessels, activities toward private ships, activities in the coast and the land, and illegal terroristic activities toward ships are found in viking pirates. However, Viking pirates do not show the activities in high seas and in the outside of a State's jurisdiction. In addition, it cannot be excluded that they pirated with vessels of regional leaders and the Sovereign, not private ships. Contrary to the definition of concept in terms of modern international law toward pirates, Viking invaded foreign waters, came on shore to foreign land and island, went up-stream the rivers to the back of interior, and attacked churches and abbeys. Strangely, they sometimes settled down in the places where they had pirated. Today, pirates appearing in history and defined in international law exist simultaneously and separately. It means, the historical nature and the nature under the international law are turning up differently. Historical cases of pirates should be reflected to modern international law. If so, it seems that the clue to solve pirate problems can be arranged. History is the immortal living thing, which not just existed as a past but reflects present.

  • PDF

The Relation Between Fashion Design of Vivienne Westwood and Her Political Attitude (비비안 웨스트우드의 패션디자인과 정치 성향의 관계)

  • Lee Seung-Ok
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.7 no.2
    • /
    • pp.101-110
    • /
    • 2005
  • Vivienne Westwood could be placed in a unique position in the contemporary fashion design. She has never belonged in a core group of mainstream fashion designer but not been always in an outsider position. She got from mainstream fashion designer circles enormous appreciation, even established fashion industry was influenced by her fashion design. She began her fashion design with rebellious T-shirts like 'destroy' T-shirt, chicken-bone T-shirt, and nipple-zipper T-shirt, all of which revealed her disgust against establishment. All these T-shirts testify her total negation tendency in her youth. However, she did not continue to keep such a kind of total negation attitude against establishment In 1980s she changed her political attitude towards establishment, and this change also found a reflection in her fashion design. In her pirate-collection the dark image of her fashion in the 1970s changed into a totally different bright image with full of gold colour. Although this collection had radiated brightness, it contained still outsider character from mainstream fashion design. The following fashion design in 1980s and 1990s evolved further on the line of Pirate-collection, but they continued to contain certain outsider characteristics. Vivienne Westwood kept some kind of anti-establishment attitude, and this attitude more or little came to the surface of her design. She was always political and critical to the establishment. In 2005, in her 64, she designed a liberty T-shirt, which showed her political attitude and her engagement in social issues. Also it showed the change from the early total negation to the constructive critical affirmation. In this paper the relation between the fashion design of Vivienne Westwood and her political attitude and the influence of her political attitude to her fashion design is analyzed.

  • PDF

User Study for Legalization of Pirate Comics Market (만화 온라인 불법복제물 시장의 양성화를 위한 이용자 연구)

  • Hwang, Sun Tae;Jin Jeon, Eun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.550-559
    • /
    • 2015
  • Despite of the long history of comic industry in Korea, self-motivated sound ecosystem is not determinded due to the pirated contents. The file-sharing literature has focused mainly on how pirated contents could be eradicated, with less attention to the effective strategy. This research is focusing more on pirate comic market within the framework of users. The target user is people who pay for using file sharing site. The research methods are a online survey and a written interview. The goal of this research is to analyze the correlation between morality and websites uses, the user convenience of file-sharing site and the main factors for attracting user to legal portal site. According to our results, legal portal sites needs to improve purchasing factors such as diversity of contents, improvement of payment system and offer of a detailed information.