[1]
|
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Applied Sciences,
2025
DOI:10.3390/app15020785
|
|
|
[2]
|
Analysis of Current Preventive Approaches in the Context of Cybersecurity
2022 IEEE International Carnahan Conference on Security Technology (ICCST),
2022
DOI:10.1109/ICCST52959.2022.9896499
|
|
|
[3]
|
A Comparative Study of Network Access Control and Software-Defined Perimeter
Proceedings of the 6th International Conference on Engineering & MIS 2020,
2020
DOI:10.1145/3410352.3410754
|
|
|
[4]
|
A Comparative Study of Network Access Control and Software-Defined Perimeter
Proceedings of the 6th International Conference on Engineering & MIS 2020,
2020
DOI:10.1145/3410352.3410754
|
|
|
[5]
|
A Comparative Study of Network Access Control and Software-Defined Perimeter
Proceedings of the 6th International Conference on Engineering & MIS 2020,
2020
DOI:10.1145/3410352.3410754
|
|
|
[6]
|
A Comparative Study of Network Access Control and Software-Defined Perimeter
Proceedings of the 6th International Conference on Engineering & MIS 2020,
2020
DOI:10.1145/3410352.3410754
|
|
|
[7]
|
A Comparative Study of Network Access Control and Software-Defined Perimeter
Proceedings of the 6th International Conference on Engineering & MIS 2020,
2020
DOI:10.1145/3410352.3410754
|
|
|
[8]
|
A Log Management System of Removable Storage Devices Based on Blockchain
The Journal of Korean Institute of Information Technology,
2020
DOI:10.14801/jkiit.2020.18.7.51
|
|
|
[9]
|
Industry 4.0 Value Roadmap
SpringerBriefs in Entrepreneurship and Innovation,
2019
DOI:10.1007/978-3-030-30066-1_8
|
|
|
[10]
|
Security and Privacy in Smart Sensor Networks
Advances in Information Security, Privacy, and Ethics,
2018
DOI:10.4018/978-1-5225-5736-4.ch010
|
|
|