[HTML][HTML] Web3: A comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions

PP Ray - Internet of Things and Cyber-Physical Systems, 2023 - Elsevier
Web3, the next generation web, promises a decentralized and democratized internet that
puts users in control of their data and online identities. However, Web3 faces significant …

Connected and automated vehicles: Infrastructure, applications, security, critical challenges, and future aspects

M Sadaf, Z Iqbal, AR Javed, I Saba, M Krichen… - Technologies, 2023 - mdpi.com
Autonomous vehicles (AV) are game-changing innovations that promise a safer, more
convenient, and environmentally friendly mode of transportation than traditional vehicles …

A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model

P Dhiman, N Saini, Y Gulzar, S Turaev, A Kaur… - Sensors, 2024 - mdpi.com
The Zero Trust safety architecture emerged as an intriguing approach for overcoming the
shortcomings of standard network security solutions. This extensive survey study provides a …

Theory and application of zero trust security: A brief survey

H Kang, G Liu, Q Wang, L Meng, J Liu - Entropy, 2023 - mdpi.com
As cross-border access becomes more frequent, traditional perimeter-based network
security models can no longer cope with evolving security requirements. Zero trust is a novel …

Personalized device authentication scheme using Q-learning-based decision-making with the aid of transfer fuzzy learning for IIoT devices in zero trust network (PDA …

A Singh, RK Dhanaraj, AK Sharma - Computers and Electrical Engineering, 2024 - Elsevier
The IIoT infrastructure builds around devices without human intervention. Likewise, human
identification and authentication before accessing the devices, the machines involved in the …

Cyber-physical zero trust architecture for industrial cyber-physical systems

X Feng, S Hu - IEEE Transactions on Industrial Cyber-Physical …, 2023 - ieeexplore.ieee.org
In recent years, zero trust architecture (ZTA) has become an emerging security architecture.
When deploying to industrial systems, an important consideration of the ZTA is the effective …

Multivocal Literature Review on Zero-Trust Security Implementation

C Itodo, M Ozer - Computers & Security, 2024 - Elsevier
The sudden shift from physical office location to a fully remote or hybrid work model
accelerated by the COVID-19 pandemic, is a phenomenon that changed how organizations …

Automation and orchestration of zero trust architecture: Potential solutions and challenges

Y Cao, SR Pokhrel, Y Zhu, R Doss, G Li - Machine Intelligence Research, 2024 - Springer
Zero trust architecture (ZTA) is a paradigm shift in how we protect data, stay connected and
access resources. ZTA is non-perimeter-based defence, which has been emerging as a …

Comprehensive review of emerging cybersecurity trends and developments

M Ibrar, S Yin, H Li, S Karim… - International Journal of …, 2024 - inderscienceonline.com
Pakistan views cyberspace as a critical source of power in the twenty-first century when
governments no longer have complete control over power games. Private entities, terrorist …