Security of zero trust networks in cloud computing: A comparative review

S Sarkar, G Choudhary, SK Shandilya, A Hussain… - Sustainability, 2022 - mdpi.com
Recently, networks have shifted from traditional in-house servers to third-party-managed
cloud platforms due to its cost-effectiveness and increased accessibility toward its …

CAN Signal Extinction‐based DoS Attack on In‐Vehicle Network

Y Lee, S Woo - Security and Communication Networks, 2022 - Wiley Online Library
As automobiles become more electrified, more and more Electronic Control Units (ECU) are
installed in vehicles. ECUs communicate with each other through dedicated protocols such …

A Transferable Deep Learning Framework for Improving the Accuracy of Internet of Things Intrusion Detection

H Kim, S Park, H Hong, J Park, S Kim - Future Internet, 2024 - mdpi.com
As the size of the IoT solutions and services market proliferates, industrial fields utilizing IoT
devices are also diversifying. However, the proliferation of IoT devices, often intertwined with …

Configuration method Of AWS security architecture that is applicable to the cloud lifecycle for sustainable social network

SJ Park, YJ Lee, WH Park - Security and Communication …, 2022 - Wiley Online Library
Recently, due to the many features and advantages of cloud computing,“cloud service” is
being introduced to countless industries around the world at an unbelievably rapid pace …

Consider the consequences: a risk assessment approach for industrial control systems

A Kim, J Oh, K Kwon, K Lee - Security and Communication …, 2022 - Wiley Online Library
The development of information and communication technologies extended the application
of digitalized industrial control systems (ICSs) to critical infrastructure. With this …

Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things

G Ra, S Kim, I Lee - IEICE TRANSACTIONS on Information and …, 2022 - search.ieice.org
Recently, the adoption of the industrial Internet of things (IIoT) has optimized many industrial
sectors and promoted industry “smartization.” Smart factories and smart industries connect …

Interrelation between Temporal Coordinates and Intrusion Detection Techniques in Cyber Physical Systems

S Jacob, G Balanagireddy, KS Kumar… - 2022 International …, 2022 - ieeexplore.ieee.org
Network traffic and its temporal coordinates of flow are affected by factors such as traffic
volume, peak or low usage times, and available resource bandwidth. The problem of …

[PDF][PDF] Intrusion Detection Using an Improved Cuckoo Search Optimization Algorithm

These days, intelligent cybersecurity models based on machine learning and data mining
techniques are prevalent. Several factors might affect the quality of these models, including …

[PDF][PDF] Lightweight IDS Framework Using Word Embeddings for In-Vehicle Network Security

H Kim, HM Song - jowua.com
As modern vehicle systems evolve into advanced cyber-physical systems, vehicle
vulnerability to cyber threats has significantly increased. This paper discusses the need for …

[引用][C] Communication Security in Socialnet-Oriented Cyber Spaces 2022