Information Fusion in Continuous Assurance

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information fusion in continuous assurance

We extend continuous assurance research by proposing a novel continuous assurance architecture grounded in information fusion research. Existing continuous assurance architectures focus primarily on methods of monitoring assurance clients’ systems to detect anomalous activities and have not addressed the question of how to process the detected anomalies. Consequently, actual implementations of ...

متن کامل

Continuous $k$-Fusion Frames in Hilbert Spaces

The study of the c$k$-fusions frames shows that the emphasis on the measure spaces introduces a new idea, although some similar properties with the discrete case are raised. Moreover, due to the nature of measure spaces, we have to use new techniques for new results. Especially, the topic of the dual of frames  which is important for frame applications, have been specified  completely for the c...

متن کامل

Construction of continuous $g$-frames and continuous fusion frames

A generalization of the known results in fusion frames and $g$-frames theory to continuous fusion frames which defined by M. H. Faroughi and R. Ahmadi, is presented in this study. Continuous resolution of the identity (CRI) is introduced, a new family of CRI is constructed, and a number of reconstruction formulas are obtained. Also, new results are given on the duality of continuous fusion fram...

متن کامل

Information Assurance

1.1 INTRODUCTION Recent advances in computer networks and information technology (IT) and the advent and growth of the Internet have created unprecedented levels of opportunities for the connectivity and interaction of information systems at a global level. This has provided significant new possibilities for advancing knowledge and societal interactions across the spectrum of human endeavors , ...

متن کامل

Information Assurance

As society increasingly relies on digitally stored and accessed information, applications have increasingly higher requirements on supporting the availability, integrity, and confidentiality of this information. However, as the quantity and severity of cyber vulnerabilities and attacks continuously increase, traditional information security technologies are increasingly limited in satisfying th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Systems

سال: 2012

ISSN: 0888-7985,1558-7959

DOI: 10.2308/isys-50216