Results 101 to 110 of about 773 (179)

Robust Zero Trust Architecture: Joint Blockchain based Federated learning and Anomaly Detection based Framework

open access: yes
This paper introduces a robust zero-trust architecture (ZTA) tailored for the decentralized system that empowers efficient remote work and collaboration within IoT networks.
Li, Gang   +3 more
core  

Zero-Trust Post-quantum Cryptography Implementation Using Category Theory [PDF]

open access: yes
This paper blends post-quantum cryptography (PQC) and zero trust architecture (ZTA) to secure the access for AI models, formalized through the abstract mathematical lens of category theory.
Ciaran Clarke   +3 more
core  

Cybersecurity in Cloud Computing AI-Driven Intrusion Detection and Mitigation Strategies

open access: yesIEEE Access
This paper explores the development and evaluation of advanced machine learning models for intrusion detection in cloud environments. We focus on Transformer-based Spatio-Temporal Graph Neural Networks (ST-GNN), CNN, LSTM, Isolation Forest, and ...
Fei Wang, Sanshan Xie
doaj   +1 more source

Augmenting Zero Trust Architecture to endpoints using Distributed Ledger Technologies and Blockchain [PDF]

open access: yes
With the increasing adoption of cloud computing and remote working, traditional perimeter-based security models are no longer sufficient to protect organizations' digital assets.
Alevizos, Lampis
core   +1 more source

Synchronizing Concurrent Security Modernization Programs: A Systems Integration Framework for Post-Quantum Cryptography, Zero Trust Architecture, and AI Security

open access: yesSystems
Large organizations face a critical systems integration challenge when executing multiple concurrent security modernization programs. This paper examines the U.S.
Robert Campbell
doaj   +1 more source

EO-ZT : Economically Informed Zero-Trust for Secure Spectrum Trading in Open Radio Access Networks (O-RAN) [PDF]

open access: yes
The adoption of Zero-Trust Architecture (ZTA) in 6G O-RAN spectrum trading introduces additional energy overhead from continuous authentication and encryption, along with economic-security challenges such as moral hazard and reduced security investment ...
Ni, Qiang, Yu, Wenjuan, Zheng, Guhan
core  

Adaptive Zero Trust Policy Management Framework in 5G Networks

open access: yesMathematics
The rapid evolution and deployment of 5G networks have introduced complex security challenges due to their reliance on dynamic network slicing, ultra-low latency communication, decentralized architectures, and highly diverse use cases.
Abdulrahman K. Alnaim
doaj   +1 more source

ZTA-RAD: Conjunto de Dados de Avaliação de Risco para Ameaças Internas em Arquiteturas Zero Trust [PDF]

open access: yes
Internal threats, often referred to as insider threats, pose significant risks to informa- tion security, particularly in corporate environments that manage sensitive data.
Rocha, Radharani Santos
core  

An intelligent zero trust secure framework for software defined networking. [PDF]

open access: yesPeerJ Comput Sci, 2023
Guo X   +5 more
europepmc   +1 more source

SmartTrust: a hybrid deep learning framework for real-time threat detection in cloud environments using Zero-Trust Architecture

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
The rapid growth of cloud computing has brought scalability and flexibility to modern organizations, but it has also introduced a new wave of complex and evolving security threats.
Umesh Kumar Lilhore   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy