Information Fusion in Continuous Assurance
نویسندگان
چکیده
منابع مشابه
Information fusion in continuous assurance
We extend continuous assurance research by proposing a novel continuous assurance architecture grounded in information fusion research. Existing continuous assurance architectures focus primarily on methods of monitoring assurance clients’ systems to detect anomalous activities and have not addressed the question of how to process the detected anomalies. Consequently, actual implementations of ...
متن کاملContinuous $k$-Fusion Frames in Hilbert Spaces
The study of the c$k$-fusions frames shows that the emphasis on the measure spaces introduces a new idea, although some similar properties with the discrete case are raised. Moreover, due to the nature of measure spaces, we have to use new techniques for new results. Especially, the topic of the dual of frames which is important for frame applications, have been specified completely for the c...
متن کاملConstruction of continuous $g$-frames and continuous fusion frames
A generalization of the known results in fusion frames and $g$-frames theory to continuous fusion frames which defined by M. H. Faroughi and R. Ahmadi, is presented in this study. Continuous resolution of the identity (CRI) is introduced, a new family of CRI is constructed, and a number of reconstruction formulas are obtained. Also, new results are given on the duality of continuous fusion fram...
متن کاملInformation Assurance
1.1 INTRODUCTION Recent advances in computer networks and information technology (IT) and the advent and growth of the Internet have created unprecedented levels of opportunities for the connectivity and interaction of information systems at a global level. This has provided significant new possibilities for advancing knowledge and societal interactions across the spectrum of human endeavors , ...
متن کاملInformation Assurance
As society increasingly relies on digitally stored and accessed information, applications have increasingly higher requirements on supporting the availability, integrity, and confidentiality of this information. However, as the quantity and severity of cyber vulnerabilities and attacks continuously increase, traditional information security technologies are increasingly limited in satisfying th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Systems
سال: 2012
ISSN: 0888-7985,1558-7959
DOI: 10.2308/isys-50216