[HTML][HTML] Web3: A comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions
PP Ray - Internet of Things and Cyber-Physical Systems, 2023 - Elsevier
Web3, the next generation web, promises a decentralized and democratized internet that
puts users in control of their data and online identities. However, Web3 faces significant …
puts users in control of their data and online identities. However, Web3 faces significant …
Edge intelligence—research opportunities for distributed computing continuum systems
Edge intelligence and, by extension, any distributed computing continuum system will bring
to our future society a plethora of new and useful applications, which will certainly …
to our future society a plethora of new and useful applications, which will certainly …
[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …
considered as trusted until proven. The Zero-trust model emphasizes the importance of …
A review of anomaly detection strategies to detect threats to cyber-physical systems
N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …
components. CPS has experienced rapid growth over the past decade in fields as disparate …
Security of zero trust networks in cloud computing: A comparative review
Recently, networks have shifted from traditional in-house servers to third-party-managed
cloud platforms due to its cost-effectiveness and increased accessibility toward its …
cloud platforms due to its cost-effectiveness and increased accessibility toward its …
[HTML][HTML] Federated learning optimization: A computational blockchain process with offloading analysis to enhance security
S Shitharth, H Manoharan, A Shankar… - Egyptian informatics …, 2023 - Elsevier
Abstract The Internet of Things (IoT) technology in various applications used in data
processing systems requires high security because more data must be saved in cloud …
processing systems requires high security because more data must be saved in cloud …
Machine learning in identity and access management systems: Survey and deep dive
The evolution of identity and access management (IAM) has been driven by the expansion
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …
Drone transportation system: Systematic review of security dynamics for smart mobility
The intelligence and integrity of a real-time cyber–physical system depend on how
trustworthy the data's legitimacy, appropriation, and authorization are during end-to-end …
trustworthy the data's legitimacy, appropriation, and authorization are during end-to-end …
Zero trust architecture empowered attack detection framework to secure 6g edge computing
H Sedjelmaci, N Ansari - IEEE Network, 2023 - ieeexplore.ieee.org
Recent advances in edge computing and its imminent adoption in Sixth Generation (6G)
wireless networks have led to a propitious paradigm defined as 6G edge computing …
wireless networks have led to a propitious paradigm defined as 6G edge computing …
Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey
The advent of sixth-generation (6G) networks is expected to start a new era in mobile
networks, characterized by unprecedented high demands on dense connectivity, ultra …
networks, characterized by unprecedented high demands on dense connectivity, ultra …