Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    REVIEW

    Implementing a Cybersecurity Continuous User Evaluation Program

    Josh McNett1, Jackie McNett2,*

    Journal of Cyber Security, Vol.7, pp. 279-306, 2025, DOI:10.32604/jcs.2025.067514 - 25 July 2025

    Abstract This review explores the implementation and effectiveness of continuous evaluation programs in managing and mitigating insider threats within organizations. Continuous evaluation programs involve the ongoing assessment of individuals’ suitability for access to sensitive information and resources by monitoring their behavior, access patterns, and other indicators in real-time. The review was conducted using a comprehensive search across various academic and professional databases, including IEEE Xplore, SpringerLink, and Google Scholar and papers were selected from a time span of 2015–2023. The review outlines the importance of defining the scope and objectives of such programs, which should include… More >

  • Open Access

    ARTICLE

    Continuous Monitoring of Multi-Robot Based on Target Point Uncertainty

    Guodong Yuan1,*, Jin Xie2

    Journal on Artificial Intelligence, Vol.7, pp. 1-16, 2025, DOI:10.32604/jai.2025.061437 - 14 March 2025

    Abstract This paper addresses the problem of access efficiency in multi-robot systems to the monitoring area. A distributed algorithm for multi-robot continuous monitoring, based on the uncertainty of target points, is used to minimize the uncertainty and instantaneous idle time of all target points in the task domain, while maintaining a certain access frequency to the entire task domain at regular time intervals. During monitoring, the robot uses shared information to evaluate the cumulative uncertainty and idle time of the target points, and combines the update list collected from adjacent target points with a utility function More >

  • Open Access

    ARTICLE

    NCCMF: Non-Collaborative Continuous Monitoring Framework for Container-Based Cloud Runtime Status

    Tao Zheng1, Wenyi Tang1,2,4,*, Xingshu Chen1,3,4, Changxiang Shen1,3,4

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1687-1701, 2024, DOI:10.32604/cmc.2024.056141 - 15 October 2024

    Abstract The security performance of cloud services is a key factor influencing users’ selection of Cloud Service Providers (CSPs). Continuous monitoring of the security status of cloud services is critical. However, existing research lacks a practical framework for such ongoing monitoring. To address this gap, this paper proposes the first Non-Collaborative Container-Based Cloud Service Operation State Continuous Monitoring Framework (NCCMF), based on relevant standards. NCCMF operates without the CSP’s collaboration by: 1) establishing a scalable supervisory index system through the identification of security responsibilities for each role, and 2) designing a Continuous Metrics Supervision Protocol (CMA) More >

Displaying 1-10 on page 1 of 3. Per Page