Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust
In response to weaknesses of current network security solutions, the zero-trust model follows
the idea that no network–whether internal or external–is trustworthy. The concept of zero …
the idea that no network–whether internal or external–is trustworthy. The concept of zero …
Software-defined perimeter (sdp): State of the art secure solution for modern networks
The boom in the evolution and adoption of new technologies, architectures, and paradigms
such as cloud computing, SDN, and NFV in recent years has led to a new set of security and …
such as cloud computing, SDN, and NFV in recent years has led to a new set of security and …
MTH-IDS: A multitiered hybrid intrusion detection system for internet of vehicles
Modern vehicles, including connected vehicles and autonomous vehicles, nowadays
involve many electronic control units connected through intravehicle networks (IVNs) to …
involve many electronic control units connected through intravehicle networks (IVNs) to …
Multi-stage optimized machine learning framework for network intrusion detection
Cyber-security garnered significant attention due to the increased dependency of individuals
and organizations on the Internet and their concern about the security and privacy of their …
and organizations on the Internet and their concern about the security and privacy of their …
Detecting botnet attacks in IoT environments: An optimized machine learning approach
MN Injadat, A Moubayed… - 2020 32nd International …, 2020 - ieeexplore.ieee.org
The increased reliance on the Internet and the corresponding surge in connectivity demand
has led to a significant growth in Internet-of-Things (IoT) devices. The continued deployment …
has led to a significant growth in Internet-of-Things (IoT) devices. The continued deployment …
Multi-perspective content delivery networks security framework using optimized unsupervised anomaly detection
Content delivery networks (CDNs) provide efficient content distribution over the Internet.
CDNs improve the connectivity and efficiency of global communications, but their caching …
CDNs improve the connectivity and efficiency of global communications, but their caching …
A critical analysis of Zero Trust Architecture (ZTA)
EB Fernandez, A Brazhuk - Computer Standards & Interfaces, 2024 - Elsevier
Zero Trust (ZT) has become a very hot approach for building secure systems, promoted by
industry and government as a new way to produce systems with a high degree of security …
industry and government as a new way to produce systems with a high degree of security …
[HTML][HTML] Theory and application of zero trust security: A brief survey
H Kang, G Liu, Q Wang, L Meng, J Liu - Entropy, 2023 - mdpi.com
As cross-border access becomes more frequent, traditional perimeter-based network
security models can no longer cope with evolving security requirements. Zero trust is a novel …
security models can no longer cope with evolving security requirements. Zero trust is a novel …
Softwarization, virtualization, and machine learning for intelligent and effective vehicle-to-everything communications
A Moubayed, A Shami - IEEE Intelligent Transportation Systems …, 2020 - ieeexplore.ieee.org
The concept of the 5G mobile network system has emerged in recent years as
telecommunication operators and service providers look to upgrade their infrastructure and …
telecommunication operators and service providers look to upgrade their infrastructure and …
Optimized random forest model for botnet detection based on DNS queries
A Moubayed, MN Injadat… - 2020 32nd international …, 2020 - ieeexplore.ieee.org
The Domain Name System (DNS) protocol plays a major role in today's Internet as it
translates between website names and corresponding IP addresses. However, due to the …
translates between website names and corresponding IP addresses. However, due to the …