Results 161 to 170 of about 773 (179)
Some of the next articles are maybe not open access.
An Artificial Intelligence Approach for Deploying Zero Trust Architecture (ZTA)
2022 5th International Conference on Computing and Informatics (ICCI), 2022Islam Tharwat Abdel Halim +1 more
exaly +2 more sources
IPO-ZTA: An Intelligent Policy Orchestration Zero Trust Architecture for B5G and 6G
Computer NetworksWei Yi, Jin Cao, Yulong Fu
exaly +2 more sources
Implementation of Enhanced Security Measures in Oracle ERP Cloud with Zero Trust Architecture (ZTA)
2025 International Conference on Communication Technologies (ComTech)Adiah Qazi, Sadiqa Arshad
exaly +2 more sources
2025 International Wireless Communications and Mobile Computing (IWCMC)
Sanaz Amanlou
exaly +2 more sources
Sanaz Amanlou
exaly +2 more sources
Towards Deployment of a Zero-Trust Architecture (ZTA) for Automated Vehicles (AV)
SAE Technical Paper Series, 2023<div class="section abstract"><div class="htmlview paragraph">Automated Vehicles (A)V development historically placed a significant focus on functionality and less on security. Programs such as Cybersecurity for Robotics and Autonomous Systems Hardening (CRASH) are addressing AV cybersecurity,
Victor Murray +2 more
openaire +1 more source
A critical analysis of Zero Trust Architecture (ZTA)
Computer Standards & Interfaces, 2022Eduardo B. Fernández, Andrei Brazhuk
openaire +1 more source
2023
Identity is an increasingly important aspect of how users interface with the internet. In this report, I delved into the technical and societal aspects involved in how the development of user identity has impacted how users authenticate their identity to access internet resources and how e-commerce companies have influenced network technology to ...
openaire +1 more source
Identity is an increasingly important aspect of how users interface with the internet. In this report, I delved into the technical and societal aspects involved in how the development of user identity has impacted how users authenticate their identity to access internet resources and how e-commerce companies have influenced network technology to ...
openaire +1 more source
Current Trends in Engineering Science (CTES)
Businesses are becoming more interested in developing and testing Large Language Models (LLMs) in their own settings to support decision-making and growth as a result of the rapid emergence of AI and cloud computing. Here’s the dilemma, though: to what extent do you believe these models and the data they were trained on?
openaire +1 more source
Businesses are becoming more interested in developing and testing Large Language Models (LLMs) in their own settings to support decision-making and growth as a result of the rapid emergence of AI and cloud computing. Here’s the dilemma, though: to what extent do you believe these models and the data they were trained on?
openaire +1 more source
An analysis of zero-trust architecture and its cost-effectiveness for organizational security
Computers and Security, 2022Asad Waqar Malik, Zahid Anwar
exaly
Augmenting zero trust architecture to endpoints using blockchain: A state‐of‐the‐art review
Security and Privacy, 2022Lampis Alevizos, Mahmoud Hashem Eiza
exaly

