Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
Integrating Zero Trust Architecture in O-RAN: A Comprehensive Survey and Analysis
Open Radio Access Network (O-RAN) is a new approach to mobile networks that disaggregates the network architecture into multi-vendor interoperable physical and software-defined network components connected through standardized open interfaces.
Ali Mehrban +3 more
doaj +1 more source
Enhancing Zero Trust Cybersecurity using Machine Learning and Deep Learning Approaches
The recent Zero-Trust Architecture (ZTA) is progressively adopted to the develop network security by assuming no implicit trust within or outside an organization’s boundary.
Danial Haider +3 more
doaj +3 more sources
Cybersecurity Safeguards: What Cybersecurity Safeguards Could Have Prevented the Intelligence/Data Breach by a Member of the Air National Guard [PDF]
Jack Teixeira, a 21-year-old IT specialist Air National Guard found himself on the wrong side of the US law after sharing what is considered classified and extremely sensitive information about USA\u27s operations and role in Ukraine and Russia war. Like
Royal, Christopher Curtis
core +1 more source
Access Control in Healthcare IoT: A Comprehensive Survey
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir +3 more
wiley +1 more source
Toward zero trust in 5G Industrial Internet collaboration systems
With the introduction of 5G, users and devices can access the industrial network from anywhere in the world. Therefore, traditional perimeter-based security technologies for industrial networks can no longer work well.
Han Zhang, Ziyan Zhang, Liquan Chen
doaj +1 more source
EBV Genome Variations and Association With Diseases
ABSTRACT The Epstein‐Barr virus (EBV) is associated with a range of diseases, including malignancies and autoimmune disorders. Driven by advances in deep sequencing technologies, recent studies have systematically characterized EBV genomic landscapes in diverse clinical specimens, uncovering distinct geographic patterns in strain distribution. However,
Xueer Lin +5 more
wiley +1 more source
Generative artificial intelligence (AI) and persistent empirical gaps are reshaping the cyber threat landscape faster than Zero-Trust Architecture (ZTA) research can respond. We reviewed 10 recent ZTA surveys and 136 primary studies (2022–2024) and found
Dan Xu +5 more
doaj +1 more source
Implementasi Zero Trust Architecture untuk Meningkatkan Keamanan Jaringan: Pendekatan Berbasis Simulasi [PDF]
Penelitian ini mengeksplorasi penerapan Zero Trust Architecture (ZTA) sebagai pendekatan keamanan untuk mengatasi tantangan keamanan jaringan yang dihadapi oleh perusahaan modern, terutama dengan meningkatnya jumlah perangkat Internet of Things (IoT ...
Kartadie, Rikie +2 more
core +2 more sources
Zero Trust Architectures: A Comprehensive Analysis and Implementation Guide [PDF]
As organizations navigate an increasingly complex and dynamic cyber threat landscape, the conventional paradigms of cybersecurity are being reevaluated. This thesis delves into the evolution of zero trust architectures (ZTA), tracing the origins of zero ...
Seymour, Nathan Lynn
core +1 more source

