[1]许盛伟, 田宇, 邓烨, 等. 基于角色和属性的零信任访问控制模型研究[J]. 信息安全研究, 2024, 10(3): 241247[2]Priya R, Hera V, Prathela T, et al. Decentralized training for secure network security: Leveraging RFB protocol and federated learning in zero trust network[C] Proc of 2023 Int Conf on System, Computation, Automation and Networking (ICSCAN). Piscataway, NJ: IEEE, 2023: 17[3]Singh J, Bello Y, Hussein A R, et al. Hierarchical security paradigm foriot multiaccess edge computing [J]. IEEE Internet of Things Journal, 2020, 8(7): 57945805[4]Moubayed A, Refaey A, Shami A. Softwaredefined perimeter (SDP): State of the art secure solution for modern networks [J]. IEEE Network, 2019, 33(5): 226233[5]Lefebvre M, Nair S, Engels D W, et al. Building a software defined perimeter (SDP) for network introspection[C] Proc of 2021 IEEE Conf on Network Function Virtualization and Software Defined Networks (NFVSDN). Piscataway, NJ: IEEE, 2021: 9195[6]Sallam A, Refaey A, Shami A. On the security of SDN: A completed secure and scalable framework using the softwaredefined perimeter [J]. IEEE Access, 2019, 7: 146577146587[7]Palmo Y, Tanimoto S, Sato H, et al. Optimal federation method for embedding Internet of things in softwaredefined perimeter [J]. IEEE Consumer Electronics Magazine, 2022, 12(5): 6875[8]段炼, 张智森, 秦益飞, 等. 面向零信任架构的访问安全态势评估[J]. 信息安全与通信保密, 2023 (10): 3949[9]马俊明. 一种基于IBC的零信任安全解决方案[J]. 信息安全与通信保密, 2022 (1): 8188[10]Yang Q, Liu Y, Chen T, et al. Federated machine learning: Concept and applications [J]. ACM Trans on Intelligent Systems and Technology, 2019, 10(2): 119[11]Vucovich M, Quinn D, Choi K, et al. FedBayes: A zerotrust federated learning aggregation to defend against adversarial attacks[C] Proc of the 14th 2024 IEEE Annual Computing and Communication Workshop and Conference (CCWC). Piscataway, NJ: IEEE, 2024: 00280035[12]Hosney E S, Halim I T A, Yousef A H. An artificial intelligence approach for deploying zero trust architecture (ZTA)[C] Proc of the 5th Int Conf on Computing and Informatics (ICCI). Piscataway, NJ: IEEE, 2022: 343350[13]曹忠. 零信任网络中基于区块链的访问风险评估模型构建[J]. 无线互联科技, 2023, 20(16): 127130[14]吴克河, 程瑞, 姜啸晨, 等. 基于SDP的电力物联网安全防护方案[J]. 信息网络安全, 2022, 22(2): 3238[15]杨观赐, 杨静, 李少波, 等. 基于Dopout与ADAM优化器的改进CNN算法[J]. 华中科技大学学报: 自然科学版, 2018, 46(7): 122127 |