Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

Using machine learning for dynamic authentication in telehealth: A tutorial

M Hazratifard, F Gebali, M Mamun - Sensors, 2022 - mdpi.com
Telehealth systems have evolved into more prevalent services that can serve people in
remote locations and at their homes via smart devices and 5G systems. Protecting the …

Deep learning-based continuous authentication for an IoT-enabled healthcare service

AK Sahu, S Sharma, R Raja - Computers and Electrical Engineering, 2022 - Elsevier
Abstract The Internet of Things (IoT) has introduced a new dimension to the Internet in the
last decade; nonetheless, security, particularly attacks on authentication, continue to be a …

A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022 - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …

Authentication in Cloud Computing: Open Problems

Z Khudoykulov, A Karimov… - … on Electronics and …, 2023 - ieeexplore.ieee.org
An authentication mechanism plays an essential role in access control. Authentication
methods vary depending on the environment used, and many authentication methods are …

Design and implementation of a contextual-based continuous authentication framework for smart homes

Y Ashibani, D Kauling, QH Mahmoud - Applied System Innovation, 2019 - mdpi.com
There has been a rapid increase in the number of Internet of Things (IoT) devices in the last
few years, providing a wide range of services such as camera feeds, light controls, and door …

F-RBA: A Federated Learning-based Framework for Risk-based Authentication

H Fereidouni, AS Hafid, D Makrakis… - arXiv preprint arXiv …, 2024 - arxiv.org
The proliferation of Internet services has led to an increasing need to protect private data.
User authentication serves as a crucial mechanism to ensure data security. Although robust …

RETRACTED ARTICLE: Integrative optimization with Qos using multi-level security in medical cloud

V Jaikumar, K Venkatachalapathy - Journal of Ambient Intelligence and …, 2021 - Springer
Cloud environment improves the utilization of spread sources by sharing them with others in
an open platform. Security is an important concern, since, the data is being managed by …

[PDF][PDF] Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial

M Hazratifard, F Gebali, M Mamun - Prime Archives in Sensors, 2023 - videleaf.com
Telehealth systems have evolved into more prevalent services that can serve people in
remote locations and at their homes via smart devices and 5G systems. Protecting the …

Behavioral Features of Users as a Security Solution in Cloud Computing

MF Sheet, MJ Saeed - 2022 8th International Conference on …, 2022 - ieeexplore.ieee.org
A large number of establishments and organizations implement clouds to store their
databases. More active attacks are used on clouds to get unauthorized access or to do …