Zobrazeno 1 - 10
of 169
pro vyhledávání: '"zero-trust architecture"'
Publikováno v:
Digital Communications and Networks, Vol 10, Iss 5, Pp 1211-1220 (2024)
Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication, access control, dynamic evaluation, and so on. This work focuses on authentication technology in the zero trust network.
Externí odkaz:
https://doaj.org/article/fbe1da169b13409992ec0b0fcba09301
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 4, Iss 3, Pp 762-776 (2024)
Cyber threats are continually evolving and becoming increasingly complex, affecting various industries. Healthcare institutions are the second most targeted industry, preceded by manufacturing. The industry is on the lookout for a reliable cybersecur
Externí odkaz:
https://doaj.org/article/984def138f2643369fe889a621a6cfde
Autor:
Peepliwal, Ashok Kumar a, ⁎, Pandey, Hari Mohan b, Prakash, Surya c, Chowhan, Sudhinder Singh a, Kumar, Vinesh d, Sharma, Rahul a, Mahajan, Anand A. e, f
Publikováno v:
In Blockchain: Research and Applications December 2024 5(4)
Autor:
Syed Muhammad Zohaib, Syed Muhammad Sajjad, Zafar Iqbal, Muhammad Yousaf, Muhammad Haseeb, Zia Muhammad
Publikováno v:
Information, Vol 15, Iss 11, p 734 (2024)
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employee
Externí odkaz:
https://doaj.org/article/010ac02a41724e538835a68afbdd77e9
Publikováno v:
IEEE Access, Vol 12, Pp 176033-176056 (2024)
Over the last couple of years, the application of autonomous systems such as drones has been widely accepted, and these applications are used in the defense, safety, logistics, delivery, and consumer sectors. Unmanned Aerial Vehicles (UAVs) play a ma
Externí odkaz:
https://doaj.org/article/36059c5287b540cd859446dd3ac7eee2
Publikováno v:
IEEE Access, Vol 12, Pp 119868-119883 (2024)
Smart grid (SG) has evolved as a recent topic of discussion and research globally, due to the integration of communication and internet in its network. It facilitates the bidirectional flow of information and power making it vulnerable to attacks inc
Externí odkaz:
https://doaj.org/article/35a970dd55b74183b2292c4458d946f1
Publikováno v:
IEEE Access, Vol 12, Pp 99201-99212 (2024)
The Edge-Cloud Continuum refers to the dynamic provisioning of distributed computing and network resources that can be scaled to support the creation of secure, resource-efficient, and decentralised digital ecosystems, which also support federated to
Externí odkaz:
https://doaj.org/article/fd394b7342be488587f8ca79f5d422ac
Publikováno v:
IEEE Access, Vol 12, Pp 94753-94764 (2024)
As sixth-generation (6G) cellular networks emerge, promising unparalleled connectivity and capabilities, yet it amplifies concerns regarding security vulnerabilities. These networks include a broader array of devices and sensors compared to earlier g
Externí odkaz:
https://doaj.org/article/8f10076cf2424dcca1894e08dc6171e3
Autor:
S. Pooja, C. B. Chandrakala
Publikováno v:
IEEE Access, Vol 12, Pp 92386-92399 (2024)
The current publishing landscape grapples with opacity in the review process. In response, a proposal for a blockchain-driven system is put forth to establish transparent and auditable records for evaluations. However, despite its decentralized natur
Externí odkaz:
https://doaj.org/article/7c3ad0290bd7412bb45c5163913ca581
Publikováno v:
IEEE Access, Vol 12, Pp 89322-89338 (2024)
The field programmable gate array (FPGA) supply chain is vulnerable to security issues from untrusted participants involved, resulting in the significant research being conducted in this domain. These challenges include, but are not limited to intell
Externí odkaz:
https://doaj.org/article/30357bbe332d4c66b08ab5016aed02e7