A distributed zero-trust scheme for airborne wireless sensor networks using dynamic identity authentication. [PDF]
Wang K, Hong Y, Li Y, Yan R, Feng J.
europepmc +1 more source
Zero Trust Architecture (ZTA) has emerged as a fundamental security framework for Information Technology (IT) companies seeking to enhance their cybersecurity posture. Nordic based IT companies, such as Atea, face challenges in manually implementing ZTA due to its complexity and the time required for individuals.
openaire +1 more source
Optimizing dispatch factor in smart energy networks using cloud-based computational resources. [PDF]
Abedin ZU +3 more
europepmc +1 more source
Understanding security challenges in the software supply chain through causal relationships. [PDF]
Adem A +4 more
europepmc +1 more source
Emerging Trends in Cybersecurity: A Holistic View on Current Threats, Assessing Solutions, and Pioneering New Frontiers. [PDF]
Zaid T, Garai S.
europepmc +1 more source
Abstract Hybrid cloud setups, scattered remote teams, and the boom in IoT devices have basically wiped out the old idea of a network perimeter. The network isn’t a closed castle anymore—it’s porous, sprawling, and way more complicated.
openaire +1 more source
A DAG-enabled cryptographic framework for secure drug traceability with identity-bound authentication and anomaly detection. [PDF]
C RS +6 more
europepmc +1 more source
A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions. [PDF]
Alotaibi A, Aldawghan H, Aljughaiman A.
europepmc +1 more source
Design of a Trustworthy Cloud-Native National Digital Health Information Infrastructure for Secure Data Management and Use. [PDF]
Zao JK +21 more
europepmc +1 more source
A drift-aware RS2FS pipeline with confidence gating for IDS. [PDF]
Sakthivel G, Kumarasamy AK.
europepmc +1 more source

