Multivocal Literature Review on Zero-Trust Security Implementation

C Itodo, M Ozer - Computers & Security, 2024 - Elsevier
The sudden shift from physical office location to a fully remote or hybrid work model
accelerated by the COVID-19 pandemic, is a phenomenon that changed how organizations …

[PDF][PDF] A safer future: Leveraging the AI power to improve the cybersecurity in critical infrastructures.

M Volk - Electrotechnical Review/Elektrotehniski Vestnik, 2024 - ev.fe.uni-lj.si
In the intricate landscape of the cybersecurity, critical infrastructures represent the most vital
systems underpinning the societal and economic wellbeing, with their disruption or …

A Novel Framework for the Adoption of Zero Trust Security for Small, Medium and Large-Scale Organizations

CA Itodo - 2024 - search.proquest.com
The transition to a fully remote or hybrid work model, expedited by the COVID-19 pandemic,
marks a significant shift in the traditional organizational work model, ushering in new …

WCFG: A Weighted Control Flow Graph Dataset Design for Malware Classification

T Nelson, A O'Brien, C Noteboom, S Xu - International Symposium on …, 2024 - Springer
In cybersecurity, malware classification is essential for identifying and examining malicious
software. This paper introduces the Weighted Control Flow Graph (WCFG) dataset to …

Adversarial Attacks in Problem Space for VBA Code Samples

B Fehrman, F Akowuah, S Xu - International Symposium on Intelligent …, 2024 - Springer
Abstract Machine learning is being used more frequently in cyber security. One area is in
antivirus software. Learning-based antivirus software is not perfect, since threat actors can …

The Research and Application of Zero Trust: A Review

Q Meng, J Fei, B Lu, X Wang, W Wu, Z Zhang… - Available at SSRN … - papers.ssrn.com
With the emergence of new technologies such as cloud computing, mobile internet, the
Internet of Things, and 5G, the internet ecosystem has undergone significant changes. The …