Threats on the horizon: Understanding security threats in the era of cyber-physical systems
Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were
made possible by higher integration of physical and digital elements. In today's pervasive …
made possible by higher integration of physical and digital elements. In today's pervasive …
An approach for stego-insider detection based on a hybrid nosql database
One of the reasons for the implementation of information security threats in organizations is
the insider activity of its employees. There is a big challenge to detect stego-insiders …
the insider activity of its employees. There is a big challenge to detect stego-insiders …
Applying zero trust security principles to defence mechanisms against data exfiltration attacks
The zero‐trust principle explicitly verifies that the authentication and authorization of all
actions are performed regardless of the requesting user's credentials or permissions. This …
actions are performed regardless of the requesting user's credentials or permissions. This …
Towards a model for zero trust data
JM Pittman, S Alaee, C Crosby, T Honey… - American Journal of …, 2022 - ingentaconnect.com
The world has realized traditional cybersecurity models are flawed because users and
systems behind the perimeter are implicitly trusted. The response has been to treat access …
systems behind the perimeter are implicitly trusted. The response has been to treat access …
Enhancing and simplifying data security and privacy for multitiered applications
W Rjaibi, M Hammoudeh - Journal of Parallel and Distributed Computing, 2020 - Elsevier
While databases provide capabilities to enforce security and privacy policies, two major
issues still prevent applications from safely delegating such policies to the database. The …
issues still prevent applications from safely delegating such policies to the database. The …
Cloud and Edge Computing Security Using Artificial Intelligence and Soft Computing Techniques
Cloud computing extends its capabilities to the Internet of Things (IoT) devices at the
endpoint by handling and processing user-centric data, apart from providing services for …
endpoint by handling and processing user-centric data, apart from providing services for …
The ZEro Trust DECision Making (ZEDEC) Method: Selecting Relevant Zero Trust Concepts to Mitigate High-Priority Risks
B Dijen - 2023 - studenttheses.uu.nl
Zero trust is a security principle that allows organisations to be more resilient to cyber threats
than the traditional perimeter-based security solutions, by ensuring that users and devices …
than the traditional perimeter-based security solutions, by ensuring that users and devices …
[PDF][PDF] Downloaded from: http://e-space. mmu. ac. uk/625911
Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were
made possible by higher integration of physical and digital elements. In today's pervasive …
made possible by higher integration of physical and digital elements. In today's pervasive …
Model poučavanja agentske paradigme korištenjem simulacijskih okruženja
K Rakić - 2020 - repozitorij.pmfst.unist.hr
Sažetak Agentska paradigma objedinjuje istraživanja u kognitivnoj znanosti i umjetnoj
inteligenciji. Uključivanje interaktivnih tehnologija, koje omogućavaju učenicima svih …
inteligenciji. Uključivanje interaktivnih tehnologija, koje omogućavaju učenicima svih …