As recent cyber-attacks have been increasing exponentially, the importance of security training for employees also has become growing ever than before. In addition, it is suggested that security training and education be an effective method for discerning cyber-attacks within academia and industries. Despite the importance and the necessity of the training, prior study did not investigate the quantitative utility of security training in an organizational level. Due to the absence of referential studies, many firms are having troubles in making decisions with respect to arranging optimal security training programs with limited security budgets. The main objective of this study is to find out a relationship between cybersecurity training and the number of incidents of organizations. Thus, this study quantified the effectiveness of security training on security incidents as the first study. This research examined the relationship among three main factors; education time, education participants, and outsourcing with numbers of cybersecurity incidents. 7089 firm level data is analyzed through Poisson regression method. Based on analysis results, we found that the negative relationship between security trainings and the occurrence of cybersecurity incidents. This study sheds light on the role of security training and education by suggesting its positive association with reducing the number of incidents in organizations from the quantitative perspective. The result of this study can be used as a referential guide for information security training decision-making procedure in organizations.
Massive MIMO (also known as the “Large-Scale Antenna System”) enables a significant reduction of latency on the air interface with the use of a large excess of service-antennas over active terminals and time division duplex operation. For large-scale MIMO, several technical issues need to be addressed (e.g., pilot pattern design and low-antenna power transmission design) and theoretically addressed (e.g., channel estimation and power allocation schemes). In this paper, we analyze the ergodic spectral efficiency upper bound of a large-scale MIMO, and the key technologies including channel uplink detection. We also present new approaches for detection and power allocation. Assuming arbitrary antenna correlation and user distributions, we derive approximations of achievable rates with linear detection techniques, namely zero forcing, maximum ratio combining, minimum mean squared error (MMSE) and eigen-value decomposition power allocation (EVD-PA). While the approximations are tight in the large system limit with an infinitely large number of antennas and user terminals, they also match our simulations for realistic system dimensions. We further show that a simple EVD-PA detection scheme can achieve the same performance as MMSE with one order of magnitude fewer antennas in both uncorrelated and correlated fading channels. Our simulation results show that our proposal is a better detection scheme than the conventional scheme for LSAS. Also, we used two channel environment channels for further analysis of our algorithm: the Long Term Evolution Advanced channel and the Millimeter wave Mobile Broadband channel.
The analysis and design of relay protocols is a hot issue in 3GPP Long Term Evolution—Advanced. In this paper, we discuss interference cancellation in a multiuser MIMO environment using Amplify-and-Forward (AF), Decode-and-Forward (DF) and De-Modulate-and-Forward (DMF) as relay protocols, and using Thomilson Harashima Precoding and Dirty Paper Coding as precoding techniques, with Zero-Forcing, Minimum Mean Square Error, Successive Interference Cancellation and Ordered Successive Interference Cancellation detection techniques. By using a combination of classical precoding schemes and detection techniques with weighted matrix, we propose a new interference cancellation technique that is capable of cancelling interference. The interference cancellation is managed by AF, DF and DMF relay node protocols and the interference free codeword is transmitted to the selected User Equipment. The proposed algorithm when used with DMF protocol shows best performance, compared to the conventional system or the no-relay system case, it gives best performance. The observation results shows that DMF protocol gives the best results for BER and Throughput performance in a high interference environment. 相似文献
Wireless Personal Communications - Wireless solar blind ultraviolet (UV) scattering communication is a new type of atmosphere optics communication technology with the important and potential... 相似文献
Wireless Personal Communications - Generally, a ground telemetry station for a launch vehicle (LV) includes a tracking function only; therefore, position measurements for LV depend on received... 相似文献
Wireless Personal Communications - In general, a ground telemetry station for a launch vehicle (LV) includes a tracking function only; therefore, position measurements for LV depend on received... 相似文献
Although cybersecurity is considered a critical area of information technology, women continue to be underrepresented among its ranks. This study, which is the first of female cybersecurity professionals, examines the skills women need to succeed in the industry, as well as the nature of the barriers and challenges they face at all points in their careers. Using face-to-face interviews and paper-based questionnaires, the study explored the views of high-ranking female cybersecurity officers and gained insights into how the needs of women might better be addressed, whether they're starting out in the educational system or advancing to the board rooms of major corporations. As cybersecurity provides an increasing number of IT jobs and becomes central to managerial operations within companies, women's advancement to executive and managerial positions will be important both for gender equity and to meet the needs of the market. 相似文献
Discovering the correct dataset in an efficient fashion is critical for effective simulations in the atmospheric sciences. Unlike text-based web documents, many of the large scientific datasets often contain binary encoded data that is hard to discover using popular search engines. In the atmospheric sciences, there has been a significant growth in public data hosting services. However, the ability to index and search has been limited by the metadata provided by the data host. We have developed an infrastructure-Atmospheric Data Discovery System (ADDS)-that provides an efficient data discovery environment for observational datasets in the atmospheric sciences. To support complex querying capabilities, we automatically extract and index fine-grained metadata. Datasets are indexed based on periodic crawling of popular sites and also of files requested by the users. Users are allowed to access subsets of a large dataset through our data customization feature. Our focus is the overall architecture, data subsetting scheme, and a performance evaluation of our system. 相似文献