[HTML][HTML] Emerging Authentication Technologies for Zero Trust on the Internet of Things

C Bast, KH Yeh - Symmetry, 2024 - mdpi.com
The large and interconnected nature of the Internet of Things (IoT) presents unique security
challenges, even as it revolutionizes various sectors. With numerous devices, often limited in …

Defense and Security Mechanisms in the Internet of Things: A Review.

S Szymoniak, J Piątkowski… - Applied Sciences (2076 …, 2025 - search.ebscohost.com
Abstract The Internet of Things (IoT) transforms traditional technology by introducing smart
devices into almost every field, enabling real-time monitoring and automation. Despite the …

[HTML][HTML] Zero Trust Cybersecurity: Procedures and Considerations in Context

BD Lund, TH Lee, Z Wang, T Wang, NR Mannuru - Encyclopedia, 2024 - mdpi.com
Definition In response to the increasing complexity and sophistication of cyber threats,
particularly those enhanced by advancements in artificial intelligence, traditional security …

Implementation of Zero Trust Security in MSME Enterprise Architecture: Challenges and Solutions

A Rahman, E Indrajit, A Unggul… - Sinkron: jurnal dan …, 2024 - jurnal.polgan.ac.id
This research examines the implementation of Zero Trust Security in Enterprise Architecture
in Micro, Small, and Medium Enterprises to improve cybersecurity. The background of this …

Cloud Edge Integrated Security Architecture of New Cloud Manufacturing System

L Zhao, B Li, H Yuan - Journal of Systems Engineering and …, 2024 - ieeexplore.ieee.org
With the rapid development of cloud manufacturing technology and the new generation of
artificial intelligence technology, the new cloud manufacturing system (NCMS) built on the …

Leveraging machine learning for enhanced cybersecurity: an intrusion detection system

WM Sahib, ZAA Alhuseen, IDI Saeedi… - … Oriented Computing and …, 2024 - Springer
Classification remains vital in cybersecurity since different data require different protection
measures against threats. This paper compares the Decision Tree, K-Nearest Neighbor …

Advancing cybersecurity: Strategic insights into multifactor authentication

SL Burton - … Readiness and Research: Security, Management, and …, 2025 - igi-global.com
This research investigates the efficacy and challenges of Multifactor Authentication (MFA) in
enhancing cybersecurity within organizational settings. Employing a qualitative design, this …

Enhancing Network Access Control using Multi-Modal Biometric Authentication Framework

A Mohammed, A Salama, N Shebka… - Engineering, Technology & …, 2025 - etasr.com
This study presents an innovative multi-modal biometric authentication framework that
integrates Deep Learning (DL) techniques with zero-trust architecture principles for …

[PDF][PDF] Enhancing Incident Response Strategies in US Healthcare Cybersecurity

AY Balogun, OO Olaniyi, AO Olisa, MO Gbadebo… - researchgate.net
This study explores the enhancement of incident response strategies in the US healthcare
sector, leveraging data from the Verizon Data Breach Investigations Report, the HHS Breach …

[PDF][PDF] Trends and Challenges in Securing Cloud Computing Environments: An Overview of Current Techniques

W Ahmed - premierscience.com
Cloud computing has changed the way organizations manage their data and applications. It
is highly scalable and cost-efficient. Nevertheless, the widespread adoption of cloud …