Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust
In response to weaknesses of current network security solutions, the zero-trust model follows
the idea that no network–whether internal or external–is trustworthy. The concept of zero …
the idea that no network–whether internal or external–is trustworthy. The concept of zero …
Zero trust architecture (zta): A comprehensive survey
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …
number of advocates in the critical infrastructure risk management space. The article …
MTH-IDS: A multitiered hybrid intrusion detection system for internet of vehicles
Modern vehicles, including connected vehicles and autonomous vehicles, nowadays
involve many electronic control units connected through intravehicle networks (IVNs) to …
involve many electronic control units connected through intravehicle networks (IVNs) to …
Multi-stage optimized machine learning framework for network intrusion detection
Cyber-security garnered significant attention due to the increased dependency of individuals
and organizations on the Internet and their concern about the security and privacy of their …
and organizations on the Internet and their concern about the security and privacy of their …
A comprehensive survey on vehicular networking: Communications, applications, challenges, and upcoming research directions
Nowadays, advanced communication technologies are being utilized to develop intelligent
transportation management and driving assistance. Through the ability to exchange traffic …
transportation management and driving assistance. Through the ability to exchange traffic …
Blockchain for digital twins: Recent advances and future research challenges
The advent of blockchain technology can refine the concept of DTs by ensuring
transparency, decentralized data storage, data immutability, and peer-to-peer …
transparency, decentralized data storage, data immutability, and peer-to-peer …
Security of zero trust networks in cloud computing: A comparative review
S Sarkar, G Choudhary, SK Shandilya, A Hussain… - Sustainability, 2022 - mdpi.com
Recently, networks have shifted from traditional in-house servers to third-party-managed
cloud platforms due to its cost-effectiveness and increased accessibility toward its …
cloud platforms due to its cost-effectiveness and increased accessibility toward its …
Detecting botnet attacks in IoT environments: An optimized machine learning approach
MN Injadat, A Moubayed… - 2020 32nd International …, 2020 - ieeexplore.ieee.org
The increased reliance on the Internet and the corresponding surge in connectivity demand
has led to a significant growth in Internet-of-Things (IoT) devices. The continued deployment …
has led to a significant growth in Internet-of-Things (IoT) devices. The continued deployment …
A graph neural network method for distributed anomaly detection in IoT
Recent IoT proliferation has undeniably affected the way organizational activities and
business procedures take place within several IoT domains such as smart manufacturing …
business procedures take place within several IoT domains such as smart manufacturing …
Hierarchical security paradigm for iot multiaccess edge computing
The rise in embedded and IoT device usage comes with an increase in LTE usage as well.
About 70% of an estimated 18 billion IoT devices will be using cellular LTE networks for …
About 70% of an estimated 18 billion IoT devices will be using cellular LTE networks for …