СПЕЦИФІКА ПОБУДОВИ АРХІТЕКТУРИ НУЛЬОВОЇ ДОВІРИ В ГІБРИДНИХ ІНФРАСТРУКТУРАХ [PDF]
Популярність використання гібридних інфраструктур стрімко зростає, оскільки вони дозволяють поєднувати переваги локальних обчислювальних ресурсів — контроль, рентабельність, відповідність регуляторним вимогам — з масштабованістю, гнучкістю та високою ...
Роман Сиротинський +1 more
doaj +3 more sources
ZenGuard a machine learning based zero trust framework for context aware threat mitigation using SIEM SOAR and UEBA [PDF]
Perimeter-based security models, which rely on predefined network boundaries, are increasingly ineffective against modern threats such as insider misuse, supply chain attacks, and Advanced Persistent Threats (APTs). Zero Trust Architecture (ZTA) offers a
Aamina Hassan +4 more
doaj +2 more sources
Categorical framework for quantum-resistant zero-trust AI security [PDF]
The rapid deployment of AI models demands robust, quantum-resistant security against adversarial threats. We present a novel framework integrating post-quantum cryptography (PQC) with zero trust architecture (ZTA), formally grounded in category theory to
I. Cherkaoui +3 more
doaj +2 more sources
Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations
The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources.
Vedran Dakić +3 more
doaj +3 more sources
The Evolution of Zero Trust Architecture (ZTA) from Concept to Implementation
Zero Trust Architecture (ZTA) is one of the paradigm changes in cybersecurity, from the traditional perimeter-based model to perimeterless. This article studies the core concepts of ZTA, its beginning, a few use cases and future trends. Emphasising the always verify and least privilege access, some key tenets of ZTA have grown to be integration ...
Iftekhar Salam
exaly +3 more sources
LEACH Protocol Evolution in WSN: A Review of Energy Consumption Optimization and Security Reinforcement [PDF]
As a foundational protocol in wireless sensor networks (WSNs), LEACH has long contended with the dual challenges of energy load balancing and security defense.
Aijia Chu, Tianning Zhang, Chengyi Wang
doaj +2 more sources
Autonomous identity-based threat segmentation for zero trust architecture
Zero Trust Architecture (ZTA) fundamentally redefine network security by adopting a ''trust nothing, verify everything'' approach requiring identity verification for all access.
Sina Ahmadi
doaj +3 more sources
Zero Trust Architecture: Trend and Impacton Information Security [PDF]
Traditional-based security models are a threat to information security; they have been regarded as weak and ineffective to meet the dynamics of information system trust. An emerging framework, Zero Trust Architecture (ZTA) seeks to close the trust gap in
Adebiyi, Shakiru +5 more
core +2 more sources
Why Zero Trust Framework Adoption has Emerged During and After Covid-19 Pandemic [PDF]
The rise of COVID-19 brought an unprecedented change in the way people lived. It left several people in a work-from-home situation. This Paper aims to investigate the recent works which applied Zero Trust and the reason that this framework adoption has ...
Alalmaie, AZ +3 more
core +1 more source
Polyampholyte Polymers‐Based Sensors: A Review on Stimuli and Applications
Polyampholytes are a specific type of zwitterionic material composed of monomers with both positive and negative charges. They can undergo conformational changes in response to external stimuli like pH variations, temperature fluctuations, or changes in salt concentration.
Ali Zardehi‐Tabriz +5 more
wiley +1 more source

