Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust

C Buck, C Olenberger, A Schweizer, F Völter… - Computers & …, 2021 - Elsevier
In response to weaknesses of current network security solutions, the zero-trust model follows
the idea that no network–whether internal or external–is trustworthy. The concept of zero …

Software-defined perimeter (sdp): State of the art secure solution for modern networks

A Moubayed, A Refaey, A Shami - IEEE network, 2019 - ieeexplore.ieee.org
The boom in the evolution and adoption of new technologies, architectures, and paradigms
such as cloud computing, SDN, and NFV in recent years has led to a new set of security and …

MTH-IDS: A multitiered hybrid intrusion detection system for internet of vehicles

L Yang, A Moubayed, A Shami - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Modern vehicles, including connected vehicles and autonomous vehicles, nowadays
involve many electronic control units connected through intravehicle networks (IVNs) to …

Multi-stage optimized machine learning framework for network intrusion detection

MN Injadat, A Moubayed, AB Nassif… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber-security garnered significant attention due to the increased dependency of individuals
and organizations on the Internet and their concern about the security and privacy of their …

Detecting botnet attacks in IoT environments: An optimized machine learning approach

MN Injadat, A Moubayed… - 2020 32nd International …, 2020 - ieeexplore.ieee.org
The increased reliance on the Internet and the corresponding surge in connectivity demand
has led to a significant growth in Internet-of-Things (IoT) devices. The continued deployment …

Multi-perspective content delivery networks security framework using optimized unsupervised anomaly detection

L Yang, A Moubayed, A Shami… - … on Network and …, 2021 - ieeexplore.ieee.org
Content delivery networks (CDNs) provide efficient content distribution over the Internet.
CDNs improve the connectivity and efficiency of global communications, but their caching …

A critical analysis of Zero Trust Architecture (ZTA)

EB Fernandez, A Brazhuk - Computer Standards & Interfaces, 2024 - Elsevier
Zero Trust (ZT) has become a very hot approach for building secure systems, promoted by
industry and government as a new way to produce systems with a high degree of security …

[HTML][HTML] Theory and application of zero trust security: A brief survey

H Kang, G Liu, Q Wang, L Meng, J Liu - Entropy, 2023 - mdpi.com
As cross-border access becomes more frequent, traditional perimeter-based network
security models can no longer cope with evolving security requirements. Zero trust is a novel …

Softwarization, virtualization, and machine learning for intelligent and effective vehicle-to-everything communications

A Moubayed, A Shami - IEEE Intelligent Transportation Systems …, 2020 - ieeexplore.ieee.org
The concept of the 5G mobile network system has emerged in recent years as
telecommunication operators and service providers look to upgrade their infrastructure and …

Optimized random forest model for botnet detection based on DNS queries

A Moubayed, MN Injadat… - 2020 32nd international …, 2020 - ieeexplore.ieee.org
The Domain Name System (DNS) protocol plays a major role in today's Internet as it
translates between website names and corresponding IP addresses. However, due to the …