
www.rsisinternational.org
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XV, Issue IV, April 2026
13. Liman Gambo, M., & Almulhem, A. (2025). Zero trust architecture: A systematic literature review.
Journal of Network and Systems Management.
https://doi.org/10.1007/s10922-025-09998-x
14. Nizamuddin, M. Investigating the cybersecurity risks of remote work: a systematic literature review of
organizational vulnerabilities and mitigation strategies. Int. J. Inf. Secur. 24, 187 (2025).
https://doi.org/10.1007/s10207-025-01095-z
15. NSTAC. (2022). Zero trust and trusted identity management: Report to the President. National Security
Telecommunications Advisory Committee.
16. https://www.cisa.gov/sites/default/files/publications/NSTAC%20Report%20to%20th
e%20President%20on%20Zero%20Trust%20and%20Trusted%20Identity%20Manag ement.pdf
17. Nzeako, C., & Shittu, A. (2024). Implementing zero trust security models in cloud computing
environments. World Journal of Advanced Research and Reviews, 24(3), 1647–1660.
https://doi.org/10.30574/wjarr.2024.24.3.3500
18. Ofili, B. T., Erhabor, E. O., & Obasuyi, T. (2025). Enhancing federal cloud security with AI: Zero trust,
threat intelligence and CISA compliance. World Journal of Advanced Research and Reviews, 25(2),
2377–2400. https://doi.org/10.30574/wjarr.2025.25.2.0620
19. Paul, J., Kessie, J. D., & Salawudeen, M. D. (2024). Zero trust architecture and AI: A synergistic
approach to next-generation cybersecurity frameworks. International Journal of Science and Research
Archive, 13(2), 4159–4169.
https://doi.org/10.30574/ijsra.2024.13.2.2583
20. Rodrigues, A. (2026). AI-integrated zero trust architectures: A socio-technical analysis of unified
enterprise cybersecurity platforms. International Journal for Research in Applied Science and
Engineering Technology, 14(1), 946–953.
https://doi.org/10.22214/ijraset.2026.76981
21. Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020d). Zero trust architecture.
https://doi.org/10.6028/nist.sp.800-207
22. Sabin, J. (2021). The future of security in a remote-work environment. Network Security, 2021(10), 15–
17. https://doi.org/10.1016/s1353-4858(21)00118-5
23. Sastry, R. (2025). Zero trust architecture implementation in dynamic workforce environments.
International Journal of Computer Engineering and Technology, 16(1), 92–99.
https://doi.org/10.34218/IJCET_16_01_092
24. Srivastava, S. (2025). Real time AI-driven threat detection with the integration of zero trust security
framework. TEJAS Journal of Technologies and Humanitarian Science, 4(4), 25–37.
https://doi.org/10.63920/tjths.44004
25. Ucheji, C. (2026). The future of zero-trust security architecture with AI automation. International Journal
of Research and Scientific Innovation, 13(1), 700–713.
https://doi.org/10.51244/ijrsi.2026.13010060
26. Ueno, H., Sawa, Y., Kim, J., Urakami, T., Oura, K., & Seaborn, K. (2024). Trust in human-AI interaction:
Scoping out models, measures, and methods. Proceedings of the CHI Conference on Human Factors in
Computing Systems Extended Abstracts, 1–7. https://doi.org/10.1145/3491101.3519772
27. Xu, J., Gondal, I., Yi, X., Susnjak, T., Watters, P., & McIntosh, S. (2025). The erosion of cybersecurity
zero-trust principles through generative AI: A survey on the challenges and future directions. Journal of
Cybersecurity and Privacy, 5(4), 87. https://doi.org/10.3390/jcp5040087
28. Zakhmi, K., Ushmani, A., Mohanty, M. R., Agrawal, S., Banduni, A., & Rao, S. S. K. (2025). Evolving
zero trust architectures for AI-driven cyber threats in healthcare and other high-risk data
environments: A systematic review. Cureus.
https://doi.org/10.7759/cureus.85446