Security of zero trust networks in cloud computing: A comparative review

S Sarkar, G Choudhary, SK Shandilya, A Hussain… - Sustainability, 2022 - mdpi.com
Recently, networks have shifted from traditional in-house servers to third-party-managed
cloud platforms due to its cost-effectiveness and increased accessibility toward its …

[PDF][PDF] Simulation for cybersecurity: state of the art and future directions

H Kavak, JJ Padilla, D Vernon-Bido… - Journal of …, 2021 - academic.oup.com
In this article, we provide an introduction to simulation for cybersecurity and focus on three
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …

A formal approach to network segmentation

N Mhaskar, M Alabbad, R Khedri - Computers & Security, 2021 - Elsevier
Network segmentation or compartmentalization, and layered protection are two strategies
that are critical in building a secure network. In the literature, layered protection has been …

[HTML][HTML] Cybersecurity for tactical 6G networks: Threats, architecture, and intelligence

J Suomalainen, I Ahmad, A Shajan… - Future Generation …, 2025 - Elsevier
Edge intelligence, network autonomy, broadband satellite connectivity, and other concepts
for private 6G networks are enabling new applications for public safety authorities, eg, for …

[HTML][HTML] A comprehensive review and assessment of cybersecurity vulnerability detection methodologies

K Bennouk, N Ait Aali, Y El Bouzekri El Idrissi… - … of Cybersecurity and …, 2024 - mdpi.com
The number of new vulnerabilities continues to rise significantly each year. Simultaneously,
vulnerability databases have challenges in promptly sharing new security events with …

Intrusion prevention through optimal stopping

K Hammar, R Stadler - IEEE Transactions on Network and …, 2022 - ieeexplore.ieee.org
We study automated intrusion prevention using reinforcement learning. Following a novel
approach, we formulate the problem of intrusion prevention as an (optimal) multiple stopping …

Detecting and classifying man-in-the-middle attacks in the private area network of smart grids

MF Elrawy, L Hadjidemetriou, C Laoudias… - … Energy, Grids and …, 2023 - Elsevier
The sustainable development of smart grids requires the massive deployment of renewable
energy, in a highly distributed manner, introducing new challenges for the system operation …

[HTML][HTML] Requirements and operational guidelines for secure and sustainable digital phenotyping: Design and development study

RR Jagesar, JA Vorstman, MJ Kas - Journal of Medical Internet Research, 2021 - jmir.org
Background Digital phenotyping, the measurement of human behavioral phenotypes using
personal devices, is rapidly gaining popularity. Novel initiatives, ranging from software …

Learning near-optimal intrusion responses against dynamic attackers

K Hammar, R Stadler - IEEE Transactions on Network and …, 2023 - ieeexplore.ieee.org
We study automated intrusion response and formulate the interaction between an attacker
and a defender as an optimal stopping game where attack and defense strategies evolve …

Development of sectoral intellectualized expert systems and decision making support systems in cybersecurity

B Akhmetov, V Lakhno, B Akhmetov… - Intelligent Systems in …, 2019 - Springer
The paper considers the prerequisites for the integration of various expert and decision
support systems for information security and cybersecurity. Analyzed the possibility of …