-
1
Web-Biometrics for User Authenticity Verification in Zero Trust Access Control
Published 2024-01-01Subjects: Get full text
Article -
2
A SURVEY ON ZERO TRUST SECURITY – APPLICATIONS AND CHALLENGES
Published 2025-03-01Subjects: “…zero trust security…”
Get full text
Article -
3
Using the Zero Trust Five-Step Implementation Process with Smart Environments: State-of-the-Art Review and Future Directions
Published 2025-07-01Subjects: “…zero trust…”
Get full text
Article -
4
Towards the computer systems design based on Zero Trust Architecture
Published 2024-12-01Subjects: Get full text
Article -
5
A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology
Published 2024-09-01Subjects: “…zero-trust…”
Get full text
Article -
6
Research on security protection of unmanned aerial vehicle systems based on zero trust
Published 2025-04-01Subjects: “…zero trust…”
Get full text
Article -
7
Zero trust framework for protecting federal networks and cloud services
Published 2025-04-01Subjects: Get full text
Article -
8
Zero Trust Cybersecurity: Procedures and Considerations in Context
Published 2024-10-01Subjects: “…zero trust…”
Get full text
Article -
9
A zero-trust based scheme for detecting illegal terminals in the Internet of Things of smart grid
Published 2025-03-01Subjects: Get full text
Article -
10
Hardware/Software Implementation of a Chip-to-Chip Communication Protocol Based on SPDM
Published 2024-01-01Subjects: “…Zero-trust…”
Get full text
Article -
11
-
12
Adaptive Zero Trust Policy Management Framework in 5G Networks
Published 2025-05-01Subjects: “…zero trust…”
Get full text
Article -
13
A Verifiable, Privacy-Preserving, and Poisoning Attack-Resilient Federated Learning Framework
Published 2025-03-01Subjects: Get full text
Article -
14
Integration of Security Service Functions Into Network-Level Access Control
Published 2024-01-01Subjects: Get full text
Article -
15
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01Subjects: Get full text
Article -
16
Security Hardening and Compliance Assessment of Kubernetes Control Plane and Workloads
Published 2025-06-01Subjects: Get full text
Article -
17
Adaptive Trust Management for Data Poisoning Attacks in MEC-Based FL Infrastructures
Published 2025-01-01Subjects: Get full text
Article -
18
Design and Application Prospects of Zero-Trust Architecture for Near-Space Networks
Published 2024-10-01Subjects: Get full text
Article -
19
Design and Basic Evaluation of Virtual IPv4-based CYPHONIC adapter
Published 2022-06-01Subjects: Get full text
Article -
20
Enhancing Microservice Security Through Vulnerability-Driven Trust in the Service Mesh Architecture
Published 2025-02-01Subjects: Get full text
Article