References
To learn more about the topics that were covered in this chapter, take a look at the following resources:
- Simpson, W. R., & Foltz, K. E. (2021). Network segmentation and zero trust architectures. In Lecture Notes in Engineering and Computer Science, Proceedings of the World Congress on Engineering (WCE) (pp. 201-206).
- Wagner, N., Şahin, C. Ş., Winterrose, M., Riordan, J., Pena, J., Hanson, D., & Streilein, W. W. (2016, December). Towards automated cyber decision support: A case study on network segmentation for security. In 2016 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 1-10). IEEE.
- Leischner, G., & Tews, C. (2007, April). Security through VLAN segmentation: Isolating and securing critical assets without loss of usability. In Proceedings of the 9th Annual Western Power Delivery and Automation Conference, Spokane, WA.
- Draney, B., Campbell, S., & Walter, H. (2007). NERSC Cyber Security Challenges That Require...