1,225
Views
1
CrossRef citations to date
0
Altmetric
Review Article

Privacy-Preserving with Zero Trust Computational Intelligent Hybrid Technique to English Education Model

Article: 2219560 | Received 08 May 2023, Accepted 25 May 2023, Published online: 04 Jun 2023

References

  • Albarakati, A., B. Moussa, M. Debbabi, A. Youssef, B. L. Agba, and M. Kassouf. 2018. “Openstack-based evaluation framework for smart grid cyber security.” 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Aalborg, Denmark.
  • Alromaihi, S., W. Elmedany, and C. Balakrishna. 2018. “Cyber security challenges of deploying IoT in smart cities for healthcare applications.” 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Barcelona, Spain.
  • Bayardo, R. J., and R. Agrawal. 2005. “Data privacy through optimal k-anonymization.” 21st International conference on data engineering, Tokyo, Japan. (ICDE’05).
  • Behera, S., and J. R. Prathuri (2020). Application of homomorphic encryption in machine learning. In 2020 2nd PhD Colloquium on Ethically Driven Innovation and Technology for Society (PhD EDITS), 1–1853. Bangalore, India: IEEE.
  • Bellare, M., and O. Goldreich. 2006. On probabilistic versus deterministic provers in the definition of proofs of knowledge. IACR Cryptol ePrint Arch 2006: 359.
  • Berger, J. O. 2013. Statistical decision theory and Bayesian analysis. Berlin / Heidelberg, Germany: Springer Science & Business Media.
  • Bevish Jinila, Y., S. Prayla Shyry, and A. Christy. 2022. “A multi-component-based zero trust model to mitigate the threats in internet of medical things.” Data Engineering for Smart Systems: Proceedings of SSIC 2021, Manipal University Jaipur, India.
  • Bien, J., I. Gaynanova, J. Lederer, and C. L. Müller. 2019. Prediction error bounds for linear regression with the TREX. Test 28:451–74. doi:10.1007/s11749-018-0584-4.
  • Burgin, M., and P. Rocchi (2019). Ample probability in cognition. In 2019 IEEE 18th International Conference on Cognitive Informatics & Cognitive Computing (ICCI* CC), 62–65. Milan, Italy: IEEE.
  • Cavazos-Cadena, R., and R. Montes-de-Oca. 2003. The value iteration algorithm in risk-sensitive average Markov decision chains with finite state space. Mathematics of Operations Research 28 (4):752–76. doi:10.1287/moor.28.4.752.20515.
  • Dzogovic, B., B. Santos, I. Hassan, B. Feng, N. Jacot, and D. Thanh Van 2022. “Zero-Trust cybersecurity approach for dynamic 5g network slicing with network service mesh and segment-routing over IPv6.” 2022 International Conference on Development and Application Systems (DAS), Suceava, Romania.
  • Gao, P., L. Yan, Z. Chen, X. Wei, L. Guo, and R. Shi. 2021. “Research on zero-trust based network security protection for power internet of things.” 2021 IEEE 4th International Conference on Automation, Electronics and Electrical Engineering (AUTEEE), Shenyang, China.
  • Ghimire, B., and D. B. Rawat. 2021. Secure, privacy preserving, and verifiable federating learning using blockchain for internet of vehicles. IEEE Consumer Electronics Magazine 11 (6):67–74. doi:10.1109/MCE.2021.3097705.
  • Goldreich, O. 2011. Studies in complexity and cryptography: Miscellanea on the interplay between randomness and computation. vol. 6650. Springer. 10.1007/978-3-642-22670-0
  • Hamer, D. 2012. Probability, anti-resilience, and the weight of expectation. Law, Probability and Risk 11 (2–3):135–58. doi:10.1093/lpr/mgs004.
  • Hatakeyama, K., D. Kotani, and Y. Okabe. 2021. “Zero trust federation: Sharing context under user control towards zero trust in identity federation.” 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Kassel, Germany.
  • Iezzi, M. 2020. “Practical privacy-preserving data science with homomorphic encryption: An overview.” 2020 IEEE International Conference on Big Data (Big Data), Atlanta, GA, USA.
  • Janicke, H., S. Abuadbba, and S. Nepal. 2020. “Security and privacy for a sustainable internet of things.” 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, Atlanta, GA, USA. (TPS–ISA).
  • Jaynes, E. T. 2003. Probability theory: The logic of science. Cambridge university press. doi:10.1017/CBO9780511790423.
  • Kaihua, F., W. Zhang, Q. Chen, D. Zeng, X. Peng, W. Zheng, and M. Guo. 2021. “Qos-aware and resource efficient microservice deployment in cloud-edge continuum.” 2021 IEEE International Parallel and Distributed Processing Symposium (IPDPS), Portland, OR, USA.
  • Karunarathne, S. M., N. Saxena, and M. Khurram Khan. 2021. Security and privacy in IoT smart healthcare. IEEE Internet Computing 25 (4):37–48. doi:10.1109/MIC.2021.3051675.
  • Lijun, Z., H. Guiqiu, L. Qingsheng, and D. Guanhua. 2021. An intuitionistic calculus to complex abnormal event recognition on data streams. Security and Communication Networks 2021:1–14. doi:10.1155/2021/3573753.
  • Magazzù, G., G. Ciarpi, and S. Saponara. 2018. “Design of a radiation-tolerant high-speed driver for mach Zehnder modulators in high energy physics.” 2018 IEEE International Symposium on Circuits and Systems (ISCAS), Florence, Italy.
  • Ohnishi, R., W. Di, T. Yamaguchi, and S. Ohnuki. 2018. “Numerical accuracy of finite-difference methods.” 2018 International Symposium on Antennas and Propagation (ISAP), Busan, Korea (South).
  • Pestana, G., I. Querejeta-Azurmendi, P. Papadopoulos, and B. Livshits. 2021. “Themis: A decentralized privacy-preserving ad platform with reporting integrity.” arXiv preprint arXiv:2106.01940.
  • Rodigari, S., D. O’Shea, P. McCarthy, M. McCarry, and S. McSweeney. 2021. “Performance analysis of zero-trust multi-cloud.” 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), Chicago, IL, USA.
  • Samaniego, M., and R. Deters. 2018. “Zero-trust hierarchical management in IoT.” 2018 IEEE international congress on Internet of Things (ICIOT), San Francisco, CA, USA.
  • Shan, L., M. Iqbal, and N. Saxena. 2022. Future industry internet of things with zero-trust security. Information Systems Frontiers 1–14. doi:10.1007/s10796-021-10199-5.
  • Sultana, M., A. Hossain, F. Laila, K. Abu Taher, and M. Nazrul Islam. 2020. Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology. BMC Medical Informatics & Decision Making 20 (1):1–10. doi:10.1186/s12911-020-01275-y.
  • Tang, P., W. Wang, J. Lou, and L. Xiong. 2021. Generating adversarial examples with distance constrained adversarial imitation networks. IEEE Transactions on Dependable and Secure Computing 19 (6):4145–55. doi:10.1109/TDSC.2021.3123586.
  • Vanickis, R., P. Jacob, S. Dehghanzadeh, and B. Lee. 2018. “Access control policy enforcement for zero-trust-networking.” 2018 29th Irish Signals and Systems Conference (ISSC), Belfast, UK.
  • Wang, F., L. Guangshun, Y. Wang, W. Rafique, M. R. Khosravi, G. Liu, Y. Liu, and Q. Lianyong. 2022. Privacy-aware traffic flow prediction based on multi-party sensor data with zero trust in smart city. ACM Transactions on Internet Technology (TOIT), . doi: 10.1145/3511904.
  • Zeng, R., N. Li, X. Zhou, and Y. Ma. (2021). Building a zero-trust security protection system in the environment of the power Internet of Things. In 2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT), Shanghai, China, 557–60. IEEE.
  • Zhang, P., C. Tian, T. Shang, L. Liu, L. Lei, W. Wang, and Y. Zhao. 2021. “Dynamic access control technology based on zero-trust light verification network model.” 2021 International Conference on Communications, Information System and Computer Engineering (CISCE), Beijing, China.