{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T06:04:25Z","timestamp":1747202665462,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031286933"},{"type":"electronic","value":"9783031286940"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28694-0_17","type":"book-chapter","created":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T06:02:47Z","timestamp":1678773767000},"page":"181-192","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Why Zero Trust Framework Adoption has Emerged During and After Covid-19 Pandemic"],"prefix":"10.1007","author":[{"given":"Abeer Z.","family":"Alalmaie","sequence":"first","affiliation":[]},{"given":"Priyadarsi","family":"Nanda","sequence":"additional","affiliation":[]},{"given":"Xiangjian","family":"He","sequence":"additional","affiliation":[]},{"given":"Mohrah Saad","family":"Alayan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,15]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Lallie, H.S., et al.: Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)","DOI":"10.1016\/j.cose.2021.102248"},{"issue":"1","key":"17_CR2","first-page":"90","volume":"18","author":"C GriffyBrown","year":"2016","unstructured":"GriffyBrown, C., Lazarikos, D., Chun, M.: How do you secure an environment without a perimeter? Using emerging technology processes to support information security efforts in an agile data center. J. Appl. Bus. Econom. 18(1), 90\u2013102 (2016)","journal-title":"J. Appl. Bus. Econom."},{"issue":"4","key":"17_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCE.2017.2714744","volume":"6","author":"D Puthal","year":"2017","unstructured":"Puthal, D., Mohanty, S.P., Nanda, P., Choppali, U.: Building security perimeters to protect network systems against cyber threats [future directions]. IEEE Consum. Electron. Mag. 6(4), 24\u201327 (2017)","journal-title":"IEEE Consum. Electron. Mag."},{"key":"17_CR4","unstructured":"Assun\u00e7\u00e3o, P.: A zero trust approach to network security. In: Proceedings of the Digital Privacy and Security Conference (2019)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Ahmad, T.: Corona virus (COVID-19) pandemic and work from home: challenges of cybercrimes and cybersecurity. SSRN Electron. J. (2020)","DOI":"10.2139\/ssrn.3568830"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Al Hajj, A., Rony, M.: Cyber security in the age of COVID-19: an analysis of cyber-crime and attacks. Int. J. Res. Appl. Sci. Eng. Technol. (IJRASET). 8(VIII), 1476\u20131480 (2020)","DOI":"10.22214\/ijraset.2020.31216"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"94497","DOI":"10.1109\/ACCESS.2019.2928048","volume":"7","author":"BA Tama","year":"2019","unstructured":"Tama, B.A., Comuzzi, M., Rhee, K.-H.: TSE-IDS: a two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7, 94497\u201394507 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2928048","journal-title":"IEEE Access"},{"issue":"11","key":"17_CR8","doi-asserted-by":"publisher","first-page":"e6838","DOI":"10.1002\/cpe.6838","volume":"34","author":"S Krishnaveni","year":"2022","unstructured":"Krishnaveni, S., Sivamohan, S., Sridhar, S., Prabhakaran, S.: Network intrusion detection based on ensemble classification and feature selection method for cloud computing. Concurr. Comput. Pract. Exp. 34(11), e6838 (2022). https:\/\/doi.org\/10.1002\/cpe.6838","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"51","key":"17_CR9","first-page":"84","volume":"14","author":"N Tohidi","year":"2022","unstructured":"Tohidi, N., Rustamov, R.B.: Short overview of advanced metaheuristic methods. Int. J. Techn. Phys. Probl. Eng. (IJTPE) 14(51), 84\u201397 (2022)","journal-title":"Int. J. Techn. Phys. Probl. Eng. (IJTPE)"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"29","DOI":"10.5772\/intechopen.94033","volume-title":"Geographic Information Systems in Geospatial Intelligence","author":"N Tohidi","year":"2020","unstructured":"Tohidi, N., Rustamov, R.B.: A review of the machine learning in GIS for megacities application. In: Rustamov, R.B. (ed.) Geographic Information Systems in Geospatial Intelligence, pp. 29\u201353. IntechOpen, London (2020). https:\/\/doi.org\/10.5772\/intechopen.94033"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Abolghasemi, M., Dadkhah, C., Tohidi, N.: HTS-DL: hybrid text summarization system using deep learning. In: The 27th International Computer Conference, the Computer Society of Iran, Tehran (2022)","DOI":"10.1109\/CSICC55295.2022.9780395"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"32464","DOI":"10.1109\/ACCESS.2020.2973730","volume":"8","author":"K Jiang","year":"2020","unstructured":"Jiang, K., Wang, W., Wang, A., Wu, H.: Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8, 32464\u201332476 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"17_CR13","doi-asserted-by":"publisher","first-page":"2419","DOI":"10.1007\/s12083-020-00986-3","volume":"14","author":"D Preethi","year":"2020","unstructured":"Preethi, D., Khare, N.: Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions. Peer-to-Peer Netw. Appl. 14(4), 2419\u20132429 (2020). https:\/\/doi.org\/10.1007\/s12083-020-00986-3","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"102031","DOI":"10.1016\/j.simpat.2019.102031","volume":"101","author":"M Almiani","year":"2020","unstructured":"Almiani, M., AbuGhazleh, A., AlRahayfeh, A., Atiewi, S., Razaque, A.: Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory 101, 102031 (2020). https:\/\/doi.org\/10.1016\/j.simpat.2019.102031","journal-title":"Simul. Model. Pract. Theory"},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/TMM.2020.2978637","volume":"23","author":"I Lee","year":"2020","unstructured":"Lee, I., Kim, D., Lee, S.: 3-D human behavior understanding using generalized TS-LSTM networks. IEEE Trans. Multimed. 23, 415\u2013428 (2020)","journal-title":"IEEE Trans. Multimed."},{"issue":"3","key":"17_CR16","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1089\/big.2020.0263","volume":"9","author":"I AlTuraiki","year":"2021","unstructured":"AlTuraiki, I., Altwaijry, N.: A convolutional neural network for improved anomaly-based network intrusion detection. Big Data 9(3), 233\u2013252 (2021)","journal-title":"Big Data"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Soman, K.P., Poornachandran, P.: Applying convolutional neural network for network intrusion detection. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India (2017)","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Yin, Y., et al.: IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset. arXiv:2203.16365 (2022)","DOI":"10.1186\/s40537-023-00694-8"},{"issue":"9","key":"17_CR19","doi-asserted-by":"publisher","first-page":"4184","DOI":"10.3390\/app12094184","volume":"12","author":"B Cao","year":"2022","unstructured":"Cao, B., Li, C., Song, Y., Qin, Y., Chen, C.: Network intrusion detection model based on CNN and GRU. Appl. Sci. 12(9), 4184 (2022). https:\/\/doi.org\/10.3390\/app12094184","journal-title":"Appl. Sci."},{"issue":"2","key":"17_CR20","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1007\/s10586-019-03008-x","volume":"23","author":"V Kumar","year":"2019","unstructured":"Kumar, V., Sinha, D., Das, A.K., Pandey, S.C., Goswami, R.T.: An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset. Clust. Comput. 23(2), 1397\u20131418 (2019). https:\/\/doi.org\/10.1007\/s10586-019-03008-x","journal-title":"Clust. Comput."},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Rose, S., Borchert, O., Mitchell, S., Connelly, S.: Zero trust architecture. In: National Institute of Standards and Technology (NIST) (2020)","DOI":"10.6028\/NIST.SP.800-207"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Yan, X., Wang, H.: Survey on zero-trust network security. In: International Conference on Artificial Intelligence and Security, Singapore (2020)","DOI":"10.1007\/978-981-15-8083-3_5"},{"key":"17_CR23","unstructured":"Uttecht, K.: Zero Trust (ZT) Concepts for Federal Government Architectures. Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, Massachusets (2020)"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28694-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T06:10:51Z","timestamp":1678774251000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28694-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031286933","9783031286940"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28694-0_17","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Juiz de Fora","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazil","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 March 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}