Author:
Bin Dongmei,Yang Chunyan,Li Xin,Ling Ying,Lu Jieke
Publisher
Springer Nature Singapore
Reference13 articles.
1. Campbell, M.: Beyond zero trust: trust is a vulnerability. Computer 53(10), 110–113 (2020)
2. Barry, S.: How a zero-trust approach can help to secure your AWS environment. Netw. Secur. 2018(3), 5–8 (2018)
3. Greenwood, D.: Applying the principles of zero-trust architecture to protect sensitive and critical data. Netw. Secur. 2021(6), 7–9 (2021)
4. Gu, Z., Tang, Y., Sun, H., et al.: Study on framework of comprehensive defense architecture for power system security and stability. Proc. Chinese Soc. Electr. Eng. 39(4), 943–952 (2019)
5. Hasanvand, S., Fallahzadeh-Abarghouei, H., Mahboubi-Moghaddam, E.: Power system security improvement using an OPA model and IPSO algorithm. Simulation 96(3), 325–335 (2019)