ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.11929
  4. Cited By
Cyber Security in the Age of COVID-19: A Timeline and Analysis of
  Cyber-Crime and Cyber-Attacks during the Pandemic

Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic

21 June 2020
H. Lallie
Lynsay A. Shepherd
Jason R. C. Nurse
Arnau Erola
Gregory Epiphaniou
Carsten Maple
X. Bellekens
ArXivPDFHTML

Papers citing "Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic"

24 / 24 papers shown
Title
Cybersecurity Challenge Analysis of Work-from-Anywhere (WFA) and
  Recommendations guided by a User Study
Cybersecurity Challenge Analysis of Work-from-Anywhere (WFA) and Recommendations guided by a User Study
M. Mahyoub
Ashraf Matrawy
Kamal Isleem
Olakunle Ibitoye
AAML
26
0
0
11 Sep 2024
Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19
Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19
Adam Shostack
J. Dykstra
19
0
0
15 Aug 2024
Exploring Cybercriminal Activities, Behaviors and Profiles
Exploring Cybercriminal Activities, Behaviors and Profiles
Maria Bada
Jason R. C. Nurse
13
3
0
30 Aug 2023
Understanding Cyber Threats Against the Universities, Colleges, and
  Schools
Understanding Cyber Threats Against the Universities, Colleges, and Schools
H. Lallie
Andrew Thompson
Elzbieta Titis
P. Stephens
11
2
0
15 Jul 2023
Graph Mining for Cybersecurity: A Survey
Graph Mining for Cybersecurity: A Survey
Bo Yan
Cheng Yang
Chuan Shi
Yong Fang
Qi Li
Yanfang Ye
Junping Du
42
12
0
02 Apr 2023
Tainted Love: A Systematic Review of Online Romance Fraud
Tainted Love: A Systematic Review of Online Romance Fraud
A. Bilz
Lynsay A. Shepherd
G. Johnson
21
4
0
28 Feb 2023
Deep Breath: A Machine Learning Browser Extension to Tackle Online
  Misinformation
Deep Breath: A Machine Learning Browser Extension to Tackle Online Misinformation
Marc Kydd
Lynsay A. Shepherd
HAI
14
2
0
09 Jan 2023
From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security
  Ecosystem
From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem
A. Michalas
Constantinos Patsakis
D. Vergados
D. Vergados
29
1
0
18 Dec 2022
Building Resilience in Cybersecurity -- An Artificial Lab Approach
Building Resilience in Cybersecurity -- An Artificial Lab Approach
Kerstin Awiszus
Yannick Bell
Jan Lüttringhaus
Gregor Svindland
Alexander Voß
Stefan Weber
11
2
0
09 Nov 2022
Adopting the Cybersecurity Concepts into Curriculum The Potential
  Effects on Students Cybersecurity Knowledge
Adopting the Cybersecurity Concepts into Curriculum The Potential Effects on Students Cybersecurity Knowledge
Mohammad Azzeh
A. Altamimi
Mahmood Albashayreh
M. AL-Oudat
16
6
0
12 Sep 2022
AI-based Malware and Ransomware Detection Models
AI-based Malware and Ransomware Detection Models
Benjamin Marais
Tony Quertier
Stephane Morucci
12
10
0
05 Jul 2022
Data security as a top priority in the digital world: preserve data
  value by being proactive and thinking security first
Data security as a top priority in the digital world: preserve data value by being proactive and thinking security first
Anastasija Nikiforova
11
3
0
14 Jun 2022
cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex
  Models
cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models
R. Czekster
Roberto Metere
C. Morisset
16
3
0
07 Apr 2022
Load-Altering Attacks Against Power Grids under COVID-19 Low-Inertia
  Conditions
Load-Altering Attacks Against Power Grids under COVID-19 Low-Inertia Conditions
Subhash Lakshminarayana
Juan Ospina
Charalambos Konstantinou
41
25
0
25 Jan 2022
Bionic Optical Physical Unclonable Functions for Authentication and
  Encryption
Bionic Optical Physical Unclonable Functions for Authentication and Encryption
Yongbiao Wan
Pidong Wang
Feng Huang
J. Yuan
Dong Li
...
Qian Li
Taiping Zhang
Song Sun
Zhiguang Qiu
Yao Yao
11
17
0
08 Sep 2021
Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal
  Trends of Cyber Threats: Covid-19 Case Study
Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study
Othmane Cherqi
Hicham Hammouchi
Mounir Ghogho
H. Benbrahim
6
4
0
03 Sep 2021
Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and
  Risks to Security and Privacy
Remote Working Pre- and Post-COVID-19: An Analysis of New Threats and Risks to Security and Privacy
Jason R. C. Nurse
N. Williams
Emily Collins
N. Panteli
John M. Blythe
Ben Koppelman
11
15
0
08 Jul 2021
Developing a cyber security culture: Current practices and future needs
Developing a cyber security culture: Current practices and future needs
B. Uchendu
Jason R. C. Nurse
Maria Bada
S. Furnell
18
84
0
28 Jun 2021
The Cynicism of Modern Cybercrime: Automating the Analysis of Surface
  Web Marketplaces
The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces
Nikolaos Lykousas
Vasilios Koutsokostas
Fran Casino
Constantinos Patsakis
16
4
0
25 May 2021
Characterizing the Landscape of COVID-19 Themed Cyberattacks and
  Defenses
Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses
Mir Mehedi Ahsan Pritom
Kristin M. Schweitzer
Raymond M. Bateman
Min Xu
Shouhuai Xu
33
16
0
25 Feb 2021
A Review of Cyber-Ranges and Test-Beds: Current and Future Trends
A Review of Cyber-Ranges and Test-Beds: Current and Future Trends
Elochukwu A. Ukwandu
M. B. Farah
Hanan Hindy
David Brosset
D. Kavallieros
Robert C. Atkinson
Christos Tachtatzis
Miroslav Bures
I. Andonovic
X. Bellekens
27
74
0
14 Oct 2020
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed
  Cryptocurrency Scams
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams
Pengcheng Xia
Haoyu Wang
Xiapu Luo
Lei Wu
Yajin Zhou
Guangdong Bai
Guoai Xu
Gang Huang
Xuanzhe Liu
35
44
0
27 Jul 2020
Human-Computer Interaction Considerations When Developing Cyber Ranges
Human-Computer Interaction Considerations When Developing Cyber Ranges
Lynsay A. Shepherd
S. Paoli
J. Conacher
11
3
0
09 Jul 2020
Network Anomaly Detection based on Tensor Decomposition
Network Anomaly Detection based on Tensor Decomposition
A. Streit
Gustavo H. A. Santos
R. M. Leão
E. D. S. E. Silva
Daniel S. Menasché
Don Towsley
27
14
0
20 Apr 2020
1