Zero Trust

Zero Trust Architecture (ZTA) prioritizes continuous authentication and authorization of all network access requests, regardless of location, shifting from perimeter-based security. Current research focuses on applying ZTA to diverse contexts like IoT networks, UAVs, and power grids, employing techniques such as federated learning, anomaly detection (often using deep learning and unsupervised clustering), and generative adversarial networks to identify and mitigate threats. These advancements aim to enhance security and resilience in increasingly complex and distributed systems, impacting various sectors by providing robust and adaptable security solutions.

Papers