[HTML][HTML] Web3: A comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions

PP Ray - Internet of Things and Cyber-Physical Systems, 2023 - Elsevier
Web3, the next generation web, promises a decentralized and democratized internet that
puts users in control of their data and online identities. However, Web3 faces significant …

Edge intelligence—research opportunities for distributed computing continuum systems

VC Pujol, PK Donta, A Morichetta… - IEEE Internet …, 2023 - ieeexplore.ieee.org
Edge intelligence and, by extension, any distributed computing continuum system will bring
to our future society a plethora of new and useful applications, which will certainly …

[HTML][HTML] Security of zero trust networks in cloud computing: A comparative review

S Sarkar, G Choudhary, SK Shandilya, A Hussain… - Sustainability, 2022 - mdpi.com
Recently, networks have shifted from traditional in-house servers to third-party-managed
cloud platforms due to its cost-effectiveness and increased accessibility toward its …

[HTML][HTML] A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

[HTML][HTML] Federated learning optimization: A computational blockchain process with offloading analysis to enhance security

S Shitharth, H Manoharan, A Shankar… - Egyptian informatics …, 2023 - Elsevier
Abstract The Internet of Things (IoT) technology in various applications used in data
processing systems requires high security because more data must be saved in cloud …

Machine learning in identity and access management systems: Survey and deep dive

S Aboukadri, A Ouaddah, A Mezrioui - Computers & Security, 2024 - Elsevier
The evolution of identity and access management (IAM) has been driven by the expansion
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …

Drone transportation system: Systematic review of security dynamics for smart mobility

SO Ajakwe, DS Kim, JM Lee - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The intelligence and integrity of a real-time cyber–physical system depend on how
trustworthy the data's legitimacy, appropriation, and authorization are during end-to-end …

Zero trust architecture empowered attack detection framework to secure 6g edge computing

H Sedjelmaci, N Ansari - IEEE Network, 2023 - ieeexplore.ieee.org
Recent advances in edge computing and its imminent adoption in Sixth Generation (6G)
wireless networks have led to a propitious paradigm defined as 6G edge computing …

Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

A critical analysis of Zero Trust Architecture (ZTA)

EB Fernandez, A Brazhuk - Computer Standards & Interfaces, 2024 - Elsevier
Zero Trust (ZT) has become a very hot approach for building secure systems, promoted by
industry and government as a new way to produce systems with a high degree of security …