Results 31 to 40 of about 773 (179)

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

Integrating Zero Trust Architecture in O-RAN: A Comprehensive Survey and Analysis

open access: yesIEEE Open Journal of the Communications Society
Open Radio Access Network (O-RAN) is a new approach to mobile networks that disaggregates the network architecture into multi-vendor interoperable physical and software-defined network components connected through standardized open interfaces.
Ali Mehrban   +3 more
doaj   +1 more source

Enhancing Zero Trust Cybersecurity using Machine Learning and Deep Learning Approaches

open access: yesJournal of Informatics and Web Engineering
The recent Zero-Trust Architecture (ZTA) is progressively adopted to the develop network security by assuming no implicit trust within or outside an organization’s boundary.
Danial Haider   +3 more
doaj   +3 more sources

Cybersecurity Safeguards: What Cybersecurity Safeguards Could Have Prevented the Intelligence/Data Breach by a Member of the Air National Guard [PDF]

open access: yes, 2023
Jack Teixeira, a 21-year-old IT specialist Air National Guard found himself on the wrong side of the US law after sharing what is considered classified and extremely sensitive information about USA\u27s operations and role in Ukraine and Russia war. Like
Royal, Christopher Curtis
core   +1 more source

Access Control in Healthcare IoT: A Comprehensive Survey

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir   +3 more
wiley   +1 more source

Toward zero trust in 5G Industrial Internet collaboration systems

open access: yesDigital Communications and Networks
With the introduction of 5G, users and devices can access the industrial network from anywhere in the world. Therefore, traditional perimeter-based security technologies for industrial networks can no longer work well.
Han Zhang, Ziyan Zhang, Liquan Chen
doaj   +1 more source

EBV Genome Variations and Association With Diseases

open access: yesJournal of Medical Virology, Volume 98, Issue 4, April 2026.
ABSTRACT The Epstein‐Barr virus (EBV) is associated with a range of diseases, including malignancies and autoimmune disorders. Driven by advances in deep sequencing technologies, recent studies have systematically characterized EBV genomic landscapes in diverse clinical specimens, uncovering distinct geographic patterns in strain distribution. However,
Xueer Lin   +5 more
wiley   +1 more source

The Erosion of Cybersecurity Zero-Trust Principles Through Generative AI: A Survey on the Challenges and Future Directions

open access: yesJournal of Cybersecurity and Privacy
Generative artificial intelligence (AI) and persistent empirical gaps are reshaping the cyber threat landscape faster than Zero-Trust Architecture (ZTA) research can respond. We reviewed 10 recent ZTA surveys and 136 primary studies (2022–2024) and found
Dan Xu   +5 more
doaj   +1 more source

Implementasi Zero Trust Architecture untuk Meningkatkan Keamanan Jaringan: Pendekatan Berbasis Simulasi [PDF]

open access: yes
Penelitian ini mengeksplorasi penerapan Zero Trust Architecture (ZTA) sebagai pendekatan keamanan untuk mengatasi tantangan keamanan jaringan yang dihadapi oleh perusahaan modern, terutama dengan meningkatnya jumlah perangkat Internet of Things (IoT ...
Kartadie, Rikie   +2 more
core   +2 more sources

Zero Trust Architectures: A Comprehensive Analysis and Implementation Guide [PDF]

open access: yes, 2023
As organizations navigate an increasingly complex and dynamic cyber threat landscape, the conventional paradigms of cybersecurity are being reevaluated. This thesis delves into the evolution of zero trust architectures (ZTA), tracing the origins of zero ...
Seymour, Nathan Lynn
core   +1 more source

Home - About - Disclaimer - Privacy