Table 4 Comparative analysis (2)—Test (2).
Context of Comparison | Zero-trust architecture (%) | Collaborative technique for distributed access control architecture management (%) | Classical access control (%) | Overall (%) |
|---|---|---|---|---|
Network Intrusion Identification | 98.7% | 90.1% | 87.6% | 93% |
Malware detection in industrial units | 92.5% | 87.9% | 83.5% | 91% |
IoT vulnerabilities | 94.6% | 84.4% | 80.4% | 89% |
Other cyber threats | 93.3% | 84.6% | 81.8% | 90% |