A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

Metaverse security and privacy: An overview

Z Chen, J Wu, W Gan, Z Qi - … Conference on Big Data (Big Data …, 2022 - ieeexplore.ieee.org
Metaverse is a living space and cyberspace that realizes the process of virtualizing and
digitizing the real world. It integrates a plethora of existing technologies with the goal of …

Prochlo: Strong privacy for analytics in the crowd

A Bittau, Ú Erlingsson, P Maniatis, I Mironov… - Proceedings of the 26th …, 2017 - dl.acm.org
The large-scale monitoring of computer users' software activities has become commonplace,
eg, for application telemetry, error reporting, or demographic profiling. This paper describes …

[HTML][HTML] Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare

P Mamoshina, L Ojomoko, Y Yanovich, A Ostrovski… - Oncotarget, 2018 - ncbi.nlm.nih.gov
The increased availability of data and recent advancements in artificial intelligence present
the unprecedented opportunities in healthcare and major challenges for the patients …

Enterprise data security measures: a comparative review of effectiveness and risks across different industries and organization types

V Bandari - … Journal of Business Intelligence and Big Data …, 2023 - research.tensorgate.org
This research aims to investigate the types of data security measures commonly used by
enterprises to safeguard sensitive data and their effectiveness in preventing security …

Blockchain-based personal health data sharing system using cloud storage

X Zheng, RR Mukkamala, R Vatrapu… - 2018 IEEE 20th …, 2018 - ieeexplore.ieee.org
With the advent of rapid development of wearable technology and mobile computing, huge
amount of personal health-related data is being generated and accumulated on continuous …

[图书][B] Understanding cryptography

C Paar, J Pelzl - 2010 - Springer
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

k-anonymity: A model for protecting privacy

L Sweeney - International journal of uncertainty, fuzziness and …, 2002 - World Scientific
Consider a data holder, such as a hospital or a bank, that has a privately held collection of
person-specific, field structured data. Suppose the data holder wants to share a version of …

Privacy integrated queries: an extensible platform for privacy-preserving data analysis

FD McSherry - Proceedings of the 2009 ACM SIGMOD International …, 2009 - dl.acm.org
We report on the design and implementation of the Privacy Integrated Queries (PINQ)
platform for privacy-preserving data analysis. PINQ provides analysts with a programming …