Security of zero trust networks in cloud computing: A comparative review

S Sarkar, G Choudhary, SK Shandilya, A Hussain… - Sustainability, 2022 - mdpi.com
Recently, networks have shifted from traditional in-house servers to third-party-managed
cloud platforms due to its cost-effectiveness and increased accessibility toward its …

A review in recent development of network threats and security measures

R Dastres, M Soori - International Journal of Information Sciences and …, 2021 - hal.science
Networks are vulnerable devices due to their basic feature of facilitating remote access and
data communication. The information in the networks needs to be kept secured and safe in …

A formal approach to network segmentation

N Mhaskar, M Alabbad, R Khedri - Computers & Security, 2021 - Elsevier
Network segmentation or compartmentalization, and layered protection are two strategies
that are critical in building a secure network. In the literature, layered protection has been …

Risk and threat mitigation techniques in internet of things (IoT) environments: a survey

M Salayma - Frontiers in The Internet of Things, 2024 - frontiersin.org
Security in the Internet of Things (IoT) remains a predominant area of concern. Although
several other surveys have been published on this topic in recent years, the broad spectrum …

Adversarial co-evolution of attack and defense in a segmented computer network environment

E Hemberg, JR Zipkin, RW Skowyra… - Proceedings of the …, 2018 - dl.acm.org
In computer security, guidance is slim on how to prioritize or configure the many available
defensive measures, when guidance is available at all. We show how a competitive co …

[PDF][PDF] Build a secure network using segmentation and micro-segmentation techniques

HA Al-Ofeishat, R Alshorman - International Journal of Computing …, 2023 - researchgate.net
Due to the increasing number of threats and attacks that have threatened the network in
recent years, novel methods and techniques have been improved to secure the …

Automatic generation of cyber architectures optimized for security, cost, and mission performance: A nature-inspired approach

N Wagner, CŞ Şahin, J Pena, WW Streilein - Advances in Nature-Inspired …, 2019 - Springer
Network segmentation refers to the practice of partitioning a computer network into multiple
segments and restricting communications between segments to inhibit a cyberattacker's …

[HTML][HTML] Hardening of network segmentation using automated referential penetration testing

M Alabbad, N Mhaskar, R Khedri - Journal of Network and Computer …, 2024 - Elsevier
We study the problem of hardening the security of existing networks. Dynamic and static
analysis are two main approaches that are used to address this problem. Dynamic analysis …

Two formal design solutions for the generalization of network segmentation

M Alabbad, N Mhaskar, R Khedri - Journal of Network and Computer …, 2024 - Elsevier
Computer networks are getting more and more complex with enormous number of
resources, diverse access control policies, and spanning over different platforms and …

A nature-inspired decision system for secure cyber network architecture

N Wagner, CS Sahin, J Pena… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
Cyber security experts have recommended splitting a computer network into multiple
segments to limit the damage that an attacker can cause after penetrating the network …