Author:
Alalmaie Abeer Z.,Nanda Priyadarsi,He Xiangjian,Alayan Mohrah Saad
Publisher
Springer International Publishing
Reference23 articles.
1. Lallie, H.S., et al.: Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)
2. GriffyBrown, C., Lazarikos, D., Chun, M.: How do you secure an environment without a perimeter? Using emerging technology processes to support information security efforts in an agile data center. J. Appl. Bus. Econom. 18(1), 90–102 (2016)
3. Puthal, D., Mohanty, S.P., Nanda, P., Choppali, U.: Building security perimeters to protect network systems against cyber threats [future directions]. IEEE Consum. Electron. Mag. 6(4), 24–27 (2017)
4. Assunção, P.: A zero trust approach to network security. In: Proceedings of the Digital Privacy and Security Conference (2019)
5. Ahmad, T.: Corona virus (COVID-19) pandemic and work from home: challenges of cybercrimes and cybersecurity. SSRN Electron. J. (2020)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Zero Trust Security Strategy for Collaboration Systems;2023 International Symposium on Networks, Computers and Communications (ISNCC);2023-10-23