Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

Industrial internet: A survey on the enabling technologies, applications, and challenges

JQ Li, FR Yu, G Deng, C Luo, Z Ming… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
This paper provides an overview of the Industrial Internet with the emphasis on the
architecture, enabling technologies, applications, and existing challenges. The Industrial …

A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations

MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin… - Applied Sciences, 2020 - mdpi.com
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …

[HTML][HTML] Insider threat mitigation: Systematic literature review

U Inayat, M Farzan, S Mahmood, MF Zia… - Ain Shams Engineering …, 2024 - Elsevier
The increasing prevalence of cybercrime necessitates the implementation of robust security
measures. The majority of these attacks are initiated by authorized users who possess …

A review of insider threat detection approaches with IoT perspective

A Kim, J Oh, J Ryu, K Lee - IEEE Access, 2020 - ieeexplore.ieee.org
Security professionals, government agencies, and corporate organizations have found an
inherent need to prevent or mitigate attacks from insider threats. Accordingly, active research …

A multi-tiered framework for insider threat prevention

RA Alsowail, T Al-Shehari - Electronics, 2021 - mdpi.com
As technologies are rapidly evolving and becoming a crucial part of our lives, security and
privacy issues have been increasing significantly. Public and private organizations have …

[HTML][HTML] Cybersecurity for tactical 6G networks: Threats, architecture, and intelligence

J Suomalainen, I Ahmad, A Shajan… - Future Generation …, 2025 - Elsevier
Edge intelligence, network autonomy, broadband satellite connectivity, and other concepts
for private 6G networks are enabling new applications for public safety authorities, eg, for …

Techniques and countermeasures for preventing insider threats

RA Alsowail, T Al-Shehari - PeerJ Computer Science, 2022 - peerj.com
With the wide use of technologies nowadays, various security issues have emerged. Public
and private sectors are both spending a large portion of their budget to protect the …

10 years of EPOC: A scoping review of Emotiv's portable EEG device

NS Williams, GM McArthur, NA Badcock - BioRxiv, 2020 - biorxiv.org
BACKGROUND Commercially-made low-cost electroencephalography (EEG) devices have
become increasingly available over the last decade. One of these devices, Emotiv EPOC, is …

Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques

U Upadhyay, A Kumar, G Sharma, AK Saini… - International Journal of …, 2024 - igi-global.com
The advent of the metaverse has revolutionized virtual interactions and navigation,
introducing intricate access control challenges. This paper addresses the need for effective …