Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust

C Buck, C Olenberger, A Schweizer, F Völter… - Computers & …, 2021 - Elsevier
In response to weaknesses of current network security solutions, the zero-trust model follows
the idea that no network–whether internal or external–is trustworthy. The concept of zero …

Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

MTH-IDS: A multitiered hybrid intrusion detection system for internet of vehicles

L Yang, A Moubayed, A Shami - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Modern vehicles, including connected vehicles and autonomous vehicles, nowadays
involve many electronic control units connected through intravehicle networks (IVNs) to …

Multi-stage optimized machine learning framework for network intrusion detection

MN Injadat, A Moubayed, AB Nassif… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber-security garnered significant attention due to the increased dependency of individuals
and organizations on the Internet and their concern about the security and privacy of their …

A comprehensive survey on vehicular networking: Communications, applications, challenges, and upcoming research directions

NH Hussein, CT Yaw, SP Koh, SK Tiong… - IEEE Access, 2022 - ieeexplore.ieee.org
Nowadays, advanced communication technologies are being utilized to develop intelligent
transportation management and driving assistance. Through the ability to exchange traffic …

Blockchain for digital twins: Recent advances and future research challenges

I Yaqoob, K Salah, M Uddin, R Jayaraman… - Ieee …, 2020 - ieeexplore.ieee.org
The advent of blockchain technology can refine the concept of DTs by ensuring
transparency, decentralized data storage, data immutability, and peer-to-peer …

Security of zero trust networks in cloud computing: A comparative review

S Sarkar, G Choudhary, SK Shandilya, A Hussain… - Sustainability, 2022 - mdpi.com
Recently, networks have shifted from traditional in-house servers to third-party-managed
cloud platforms due to its cost-effectiveness and increased accessibility toward its …

Detecting botnet attacks in IoT environments: An optimized machine learning approach

MN Injadat, A Moubayed… - 2020 32nd International …, 2020 - ieeexplore.ieee.org
The increased reliance on the Internet and the corresponding surge in connectivity demand
has led to a significant growth in Internet-of-Things (IoT) devices. The continued deployment …

A graph neural network method for distributed anomaly detection in IoT

A Protogerou, S Papadopoulos, A Drosou, D Tzovaras… - Evolving Systems, 2021 - Springer
Recent IoT proliferation has undeniably affected the way organizational activities and
business procedures take place within several IoT domains such as smart manufacturing …

Hierarchical security paradigm for iot multiaccess edge computing

J Singh, Y Bello, AR Hussein, A Erbad… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The rise in embedded and IoT device usage comes with an increase in LTE usage as well.
About 70% of an estimated 18 billion IoT devices will be using cellular LTE networks for …