Results 51 to 60 of about 773 (179)

IMPLEMENTASI ZTA PADA WEBSITE ASPIRASI KAMPUS [PDF]

open access: yes
Penelitian ini bertujuan untuk mengimplementasikan konsep Zero Trust Architecture (ZTA) pada Website Portal Aspirasi Kampus merupakan langkah tepat untuk peningkatan level keamanan data, terutama keamanan data mahasiswa dalam pengiriman pesan kritik ...
AL-HAFIZ, AHMAD
core   +2 more sources

Comprehensive Strategies for Enhancing SD‐WAN: Integrating Security, Dynamic Routing and Quality of Service Management

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
‘Software‐defined wide area networks (SD‐WAN) offer a modern solution to traditional network challenges by integrating advanced routing, enhanced security and quality service management. This paper presents innovative strategies to optimise SD‐WAN deployment, addressing security through IPsec encryption and zero trust frameworks, enhancing connectivity
Raied Ibrahim   +3 more
wiley   +1 more source

Advanced cloud security framework based on zero trust architecture and adaptive deep learning for next-generation systems [PDF]

open access: yes
Static rule-based models and cloud access security brokers (CASBs) — traditional cloud security frameworks— can no longer effectively mitigate modern and evolving cyber threats.
Basim, Israa   +2 more
core   +2 more sources

Cyber‐Physical Vulnerabilities of Wireless Sensor Networks in the Oil and Gas Industry: A Literature Review

open access: yesThe Journal of Engineering, Volume 2025, Issue 1, January/December 2025.
This article reviews the cyber‐physical vulnerabilities of wireless sensor networks (WSNs) in oil and gas operations. It examines real‐world attack scenarios, highlights key threat vectors such as spoofing and malware, and outlines best practices for securing WSNs within industrial control environments.
Ali Sayghe
wiley   +1 more source

Secure and responsible training: the key role of cybersecurity in simulation-based medical education. Implementing a Zero Trust Architecture [PDF]

open access: yes
This article examines the challenges and solutions related to enhancing cybersecurity in the use of medical simulators for training healthcare professionals.
Manushev, Daniel, Vankova, Desislava
core   +2 more sources

Challenges in Implementing IoT for Enhanced Reliability and Effectiveness in Smart Grids: Literature Review

open access: yesInternational Transactions on Electrical Energy Systems, Volume 2025, Issue 1, 2025.
Challenges in power quality and reliability present significant difficulties in conventional power grids for both service providers and customers. Smart grids (SGs) provide the opportunity to integrate renewable energy resources, and integrating Internet of Things (IoT) in the grid can enhance the capabilities of the SG.
Ahmed S. Alsafran   +3 more
wiley   +1 more source

A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks

open access: yesIEEE Access
As sixth-generation (6G) cellular networks emerge, promising unparalleled connectivity and capabilities, yet it amplifies concerns regarding security vulnerabilities.
Nurun Nahar   +3 more
doaj   +1 more source

Facets of security and safety problems and paradigms for smart aerial mobility and intelligent logistics

open access: yesIET Intelligent Transport Systems, Volume 18, Issue S1, Page 2827-2855, December 2024.
Sporadic deployment of unmanned aerial vehicles for priority‐based logistics demands inclusive safety‐driven and security smartness to address the myriads of associated risks. The incremental integration of explainable AI, blockchain, and zero trust cybersecurity paradigms is essential to achieving this, albeit with several requirements and ...
Simeon Okechukwu Ajakwe   +1 more
wiley   +1 more source

Systematic literature review: Digital twins' role in enhancing security for Industry 4.0 applications

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 5, September/October 2024.
Abstract Connectivity and data exchange are key features of Industry 4.0. In this paradigm, (Industrial) Internet of Things ((I)IoT) devices are a vital component facilitating the collection and transmission of environmental data from the physical system to the central station for processing and analysis (digital twin [DT]).
Mohammed El‐Hajj   +2 more
wiley   +1 more source

Zero Trust and Advanced Persistent Threats: Who Will Win the War? [PDF]

open access: yes, 2022
Advanced Persistent Threats (APTs) are state-sponsored actors who break into computer networks for political or industrial espionage. Because of the nature of cyberspace and ever-changing sophisticated attack techniques, it is challenging to prevent and ...
Karabacak, Bilge, Whittaker, Todd
core   +1 more source

Home - About - Disclaimer - Privacy