Results 11 to 20 of about 773 (179)

СПЕЦИФІКА ПОБУДОВИ АРХІТЕКТУРИ НУЛЬОВОЇ ДОВІРИ В ГІБРИДНИХ ІНФРАСТРУКТУРАХ [PDF]

open access: yesКібербезпека: освіта, наука, техніка
Популярність використання гібридних інфраструктур стрімко зростає, оскільки вони дозволяють поєднувати переваги локальних обчислювальних ресурсів — контроль, рентабельність, відповідність регуляторним вимогам — з масштабованістю, гнучкістю та високою ...
Роман Сиротинський   +1 more
doaj   +3 more sources

ZenGuard a machine learning based zero trust framework for context aware threat mitigation using SIEM SOAR and UEBA [PDF]

open access: yesScientific Reports
Perimeter-based security models, which rely on predefined network boundaries, are increasingly ineffective against modern threats such as insider misuse, supply chain attacks, and Advanced Persistent Threats (APTs). Zero Trust Architecture (ZTA) offers a
Aamina Hassan   +4 more
doaj   +2 more sources

Categorical framework for quantum-resistant zero-trust AI security [PDF]

open access: yesScientific Reports
The rapid deployment of AI models demands robust, quantum-resistant security against adversarial threats. We present a novel framework integrating post-quantum cryptography (PQC) with zero trust architecture (ZTA), formally grounded in category theory to
I. Cherkaoui   +3 more
doaj   +2 more sources

Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations

open access: yesJournal of Cybersecurity and Privacy
The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources.
Vedran Dakić   +3 more
doaj   +3 more sources

The Evolution of Zero Trust Architecture (ZTA) from Concept to Implementation

open access: yes2025 29th International Conference on Information Technology (IT)
Zero Trust Architecture (ZTA) is one of the paradigm changes in cybersecurity, from the traditional perimeter-based model to perimeterless. This article studies the core concepts of ZTA, its beginning, a few use cases and future trends. Emphasising the always verify and least privilege access, some key tenets of ZTA have grown to be integration ...
Iftekhar Salam
exaly   +3 more sources

LEACH Protocol Evolution in WSN: A Review of Energy Consumption Optimization and Security Reinforcement [PDF]

open access: yesSensors
As a foundational protocol in wireless sensor networks (WSNs), LEACH has long contended with the dual challenges of energy load balancing and security defense.
Aijia Chu, Tianning Zhang, Chengyi Wang
doaj   +2 more sources

Autonomous identity-based threat segmentation for zero trust architecture

open access: yesCyber Security and Applications
Zero Trust Architecture (ZTA) fundamentally redefine network security by adopting a ''trust nothing, verify everything'' approach requiring identity verification for all access.
Sina Ahmadi
doaj   +3 more sources

Zero Trust Architecture: Trend and Impacton Information Security [PDF]

open access: yes, 2022
Traditional-based security models are a threat to information security; they have been regarded as weak and ineffective to meet the dynamics of information system trust. An emerging framework, Zero Trust Architecture (ZTA) seeks to close the trust gap in
Adebiyi, Shakiru   +5 more
core   +2 more sources

Why Zero Trust Framework Adoption has Emerged During and After Covid-19 Pandemic [PDF]

open access: yes, 2023
The rise of COVID-19 brought an unprecedented change in the way people lived. It left several people in a work-from-home situation. This Paper aims to investigate the recent works which applied Zero Trust and the reason that this framework adoption has ...
Alalmaie, AZ   +3 more
core   +1 more source

Polyampholyte Polymers‐Based Sensors: A Review on Stimuli and Applications

open access: yesMacromolecular Materials and Engineering, Volume 308, Issue 12, December 2023., 2023
Polyampholytes are a specific type of zwitterionic material composed of monomers with both positive and negative charges. They can undergo conformational changes in response to external stimuli like pH variations, temperature fluctuations, or changes in salt concentration.
Ali Zardehi‐Tabriz   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy