Threats on the horizon: Understanding security threats in the era of cyber-physical systems

S Walker-Roberts, M Hammoudeh, O Aldabbas… - The Journal of …, 2020 - Springer
Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were
made possible by higher integration of physical and digital elements. In today's pervasive …

An approach for stego-insider detection based on a hybrid nosql database

I Kotenko, A Krasov, I Ushakov, K Izrailov - Journal of Sensor and …, 2021 - mdpi.com
One of the reasons for the implementation of information security threats in organizations is
the insider activity of its employees. There is a big challenge to detect stego-insiders …

Applying zero trust security principles to defence mechanisms against data exfiltration attacks

H Egerton, M Hammoudeh, D Unal… - Security and Privacy in …, 2021 - Wiley Online Library
The zero‐trust principle explicitly verifies that the authentication and authorization of all
actions are performed regardless of the requesting user's credentials or permissions. This …

Towards a model for zero trust data

JM Pittman, S Alaee, C Crosby, T Honey… - American Journal of …, 2022 - ingentaconnect.com
The world has realized traditional cybersecurity models are flawed because users and
systems behind the perimeter are implicitly trusted. The response has been to treat access …

Enhancing and simplifying data security and privacy for multitiered applications

W Rjaibi, M Hammoudeh - Journal of Parallel and Distributed Computing, 2020 - Elsevier
While databases provide capabilities to enforce security and privacy policies, two major
issues still prevent applications from safely delegating such policies to the database. The …

Cloud and Edge Computing Security Using Artificial Intelligence and Soft Computing Techniques

NSG Ganesh, RR Chandrika… - The Fusion of Artificial …, 2024 - taylorfrancis.com
Cloud computing extends its capabilities to the Internet of Things (IoT) devices at the
endpoint by handling and processing user-centric data, apart from providing services for …

The ZEro Trust DECision Making (ZEDEC) Method: Selecting Relevant Zero Trust Concepts to Mitigate High-Priority Risks

B Dijen - 2023 - studenttheses.uu.nl
Zero trust is a security principle that allows organisations to be more resilient to cyber threats
than the traditional perimeter-based security solutions, by ensuring that users and devices …

[PDF][PDF] Downloaded from: http://e-space. mmu. ac. uk/625911

S Walker-Roberts, M Hammoudeh… - The Journal of …, 2020 - core.ac.uk
Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were
made possible by higher integration of physical and digital elements. In today's pervasive …

Model poučavanja agentske paradigme korištenjem simulacijskih okruženja

K Rakić - 2020 - repozitorij.pmfst.unist.hr
Sažetak Agentska paradigma objedinjuje istraživanja u kognitivnoj znanosti i umjetnoj
inteligenciji. Uključivanje interaktivnih tehnologija, koje omogućavaju učenicima svih …