Results 101 to 110 of about 773 (179)
This paper introduces a robust zero-trust architecture (ZTA) tailored for the decentralized system that empowers efficient remote work and collaboration within IoT networks.
Li, Gang +3 more
core
Zero-Trust Post-quantum Cryptography Implementation Using Category Theory [PDF]
This paper blends post-quantum cryptography (PQC) and zero trust architecture (ZTA) to secure the access for AI models, formalized through the abstract mathematical lens of category theory.
Ciaran Clarke +3 more
core
Cybersecurity in Cloud Computing AI-Driven Intrusion Detection and Mitigation Strategies
This paper explores the development and evaluation of advanced machine learning models for intrusion detection in cloud environments. We focus on Transformer-based Spatio-Temporal Graph Neural Networks (ST-GNN), CNN, LSTM, Isolation Forest, and ...
Fei Wang, Sanshan Xie
doaj +1 more source
Augmenting Zero Trust Architecture to endpoints using Distributed Ledger Technologies and Blockchain [PDF]
With the increasing adoption of cloud computing and remote working, traditional perimeter-based security models are no longer sufficient to protect organizations' digital assets.
Alevizos, Lampis
core +1 more source
Large organizations face a critical systems integration challenge when executing multiple concurrent security modernization programs. This paper examines the U.S.
Robert Campbell
doaj +1 more source
EO-ZT : Economically Informed Zero-Trust for Secure Spectrum Trading in Open Radio Access Networks (O-RAN) [PDF]
The adoption of Zero-Trust Architecture (ZTA) in 6G O-RAN spectrum trading introduces additional energy overhead from continuous authentication and encryption, along with economic-security challenges such as moral hazard and reduced security investment ...
Ni, Qiang, Yu, Wenjuan, Zheng, Guhan
core
Adaptive Zero Trust Policy Management Framework in 5G Networks
The rapid evolution and deployment of 5G networks have introduced complex security challenges due to their reliance on dynamic network slicing, ultra-low latency communication, decentralized architectures, and highly diverse use cases.
Abdulrahman K. Alnaim
doaj +1 more source
ZTA-RAD: Conjunto de Dados de Avaliação de Risco para Ameaças Internas em Arquiteturas Zero Trust [PDF]
Internal threats, often referred to as insider threats, pose significant risks to informa- tion security, particularly in corporate environments that manage sensitive data.
Rocha, Radharani Santos
core
An intelligent zero trust secure framework for software defined networking. [PDF]
Guo X +5 more
europepmc +1 more source
The rapid growth of cloud computing has brought scalability and flexibility to modern organizations, but it has also introduced a new wave of complex and evolving security threats.
Umesh Kumar Lilhore +6 more
doaj +1 more source

