[HTML][HTML] A deeper look into cybersecurity issues in the wake of Covid-19: A survey

M Alawida, AE Omolara, OI Abiodun… - Journal of King Saud …, 2022 - Elsevier
This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime,
highlighting the wide spectrum of cyberattacks that occurred around the world. The modus …

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

Exploring the challenges of and solutions to sharing personal genomic data for use in healthcare

L Parvinen, A Alamäki, H Hallikainen… - Health Informatics …, 2023 - journals.sagepub.com
Boosted by the COVID-19 pandemic, as well as the tightened General Data Protection
Regulation (GDPR) legislation within the European Union (EU), individuals have become …

Study on the evolution of Chinese characters based on few-shot learning: From oracle bone inscriptions to regular script

M Wang, Y Cai, L Gao, R Feng, Q Jiao, X Ma, Y Jia - Plos one, 2022 - journals.plos.org
Oracle bone inscriptions (OBIs) are ancient Chinese scripts originated in the Shang Dynasty
of China, and now less than half of the existing OBIs are well deciphered. To date …

HoneyDetails: A prototype for ensuring patient's information privacy and thwarting electronic health record threats based on decoys

A Esther Omolara, A Jantan… - Health informatics …, 2020 - journals.sagepub.com
Advancements in electronic health record system allow patients to store and selectively
share their medical records as needed with doctors. However, privacy concerns represent …

Differential privacy and natural language processing to generate contextually similar decoy messages in honey encryption scheme

K Panchal - arxiv preprint arxiv:2010.15985, 2020 - arxiv.org
Honey Encryption is an approach to encrypt the messages using low min-entropy keys, such
as weak passwords, OTPs, PINs, credit card numbers. The ciphertext is produces, when …

[PDF][PDF] Honey Encryption Security Techniques: A Review Paper

A Gharbi, A Nori - AL-Rafidain Journal of Computer Sciences and …, 2022 - iasj.net
From time to time, we hear in the news about a breach or attack on some well-known
companies as just news, but it is a serious problem because it is the privacy of citizens, their …

Honey Encryption: implementation challenges and solutions

R Lindholm - 2019 - jyx.jyu.fi
Most encryption techniques have one essential problem: they are vulnerable to brute-force
attacks. In 2014, a new defence mechanism was introduced against brute-force attack and …

Secure Storage System Using Cryptographic Techniques

M AlShalaan, R AlSubaie, A Ara - … of Women in Data Science at …, 2022 - ieeexplore.ieee.org
In the era of Internet usage growth, storage services are widely used where users' can store
their data, while hackers techniques pose massive threats to users' data security. The …

Security analysis of an efficient null space-based homomorphic MAC scheme against tag pollution attacks in RLNC

J Chang, B Shao, A Zhang, G Bian, Y Ji, M Xu - IEEE Access, 2019 - ieeexplore.ieee.org
Recently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message
authentication code (MAC) scheme for the random linear network coding (RLNC) to resist …