Security of zero trust networks in cloud computing: A comparative review

S Sarkar, G Choudhary, SK Shandilya, A Hussain… - Sustainability, 2022 - mdpi.com
Recently, networks have shifted from traditional in-house servers to third-party-managed
cloud platforms due to its cost-effectiveness and increased accessibility toward its …

CAN Signal Extinction‐based DoS Attack on In‐Vehicle Network

Y Lee, S Woo - Security and Communication Networks, 2022 - Wiley Online Library
As automobiles become more electrified, more and more Electronic Control Units (ECU) are
installed in vehicles. ECUs communicate with each other through dedicated protocols such …

A Transferable Deep Learning Framework for Improving the Accuracy of Internet of Things Intrusion Detection

H Kim, S Park, H Hong, J Park, S Kim - Future Internet, 2024 - mdpi.com
As the size of the IoT solutions and services market proliferates, industrial fields utilizing IoT
devices are also diversifying. However, the proliferation of IoT devices, often intertwined with …

Configuration method Of AWS security architecture that is applicable to the cloud lifecycle for sustainable social network

SJ Park, YJ Lee, WH Park - Security and Communication …, 2022 - Wiley Online Library
Recently, due to the many features and advantages of cloud computing,“cloud service” is
being introduced to countless industries around the world at an unbelievably rapid pace …

Consider the consequences: a risk assessment approach for industrial control systems

A Kim, J Oh, K Kwon, K Lee - Security and Communication …, 2022 - Wiley Online Library
The development of information and communication technologies extended the application
of digitalized industrial control systems (ICSs) to critical infrastructure. With this …

Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things

G Ra, S Kim, I Lee - IEICE TRANSACTIONS on Information and …, 2022 - search.ieice.org
Recently, the adoption of the industrial Internet of things (IIoT) has optimized many industrial
sectors and promoted industry “smartization.” Smart factories and smart industries connect …

Interrelation between Temporal Coordinates and Intrusion Detection Techniques in Cyber Physical Systems

S Jacob, G Balanagireddy, KS Kumar… - 2022 International …, 2022 - ieeexplore.ieee.org
Network traffic and its temporal coordinates of flow are affected by factors such as traffic
volume, peak or low usage times, and available resource bandwidth. The problem of …

[PDF][PDF] Intrusion Detection Using an Improved Cuckoo Search Optimization Algorithm

MK Alsmadi, RMA Mohammad, M Alzaqebah… - researchgate.net
These days, intelligent cybersecurity models based on machine learning and data mining
techniques are prevalent. Several factors might affect the quality of these models, including …

[引用][C] Communication Security in Socialnet-Oriented Cyber Spaces 2022