{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:22:28Z","timestamp":1757542948265,"version":"3.40.3"},"publisher-location":"Cham","reference-count":73,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030633066"},{"type":"electronic","value":"9783030633073"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-63307-3_18","type":"book-chapter","created":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T17:05:15Z","timestamp":1615395915000},"page":"275-295","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Cyber Security in the Age of COVID-19"],"prefix":"10.1007","author":[{"given":"Arome J.","family":"Gabriel","sequence":"first","affiliation":[]},{"given":"Ashraf","family":"Darwsih","sequence":"additional","affiliation":[]},{"given":"Aboul Ella","family":"Hassanien","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,11]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/S0168-7069(06)16004-8","volume":"16","author":"TR Tong","year":"2006","unstructured":"Tong, T.R.: Severe Acute Respiratory Syndrome Coronavirus (SARS-CoV). Perspect. Med. Virol. 16, 43\u201395 (2006). https:\/\/doi.org\/10.1016\/S0168-7069(06)16004-8","journal-title":"Perspect. Med. Virol."},{"key":"18_CR2","doi-asserted-by":"publisher","unstructured":"Tsang, K.W.: Severe Acute Respiratory Syndrome (SARS). Int. Encycl. Public Health 691\u2013695 (2008). https:\/\/doi.org\/10.1016\/B978-012373960-5.00219-7","DOI":"10.1016\/B978-012373960-5.00219-7"},{"issue":"4","key":"18_CR3","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1128\/CMR.00023-07","volume":"20","author":"VC Cheng","year":"2007","unstructured":"Cheng, V.C., Lau, S.K., Woo, P.C., Yuen, K.Y.: Severe acute respiratory syndrome coronavirus as an agent of emerging and reemerging infection. Clin. Microbiol. Rev. 20(4), 660\u2013694 (2007). https:\/\/doi.org\/10.1128\/CMR.00023-07","journal-title":"Clin. Microbiol. Rev."},{"issue":"2","key":"18_CR4","doi-asserted-by":"publisher","first-page":"233","DOI":"10.3904\/kjim.2018.031","volume":"33","author":"MD Oh","year":"2008","unstructured":"Oh, M.D., Park, W.B., Park, S.W., Choe, P.G., Bang, J.H., Song, K.H., Kim, E.S., Kim, H.B., Kim, N.J.: Middle East respiratory syndrome: what we learned from the 2015 outbreak in the Republic of Korea. Korean J. Intern. Med. 33(2), 233\u2013246 (2008). https:\/\/doi.org\/10.3904\/kjim.2018.031","journal-title":"Korean J. Intern. Med."},{"issue":"1","key":"18_CR5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1186\/s12879-016-2137-3","volume":"17","author":"FS Aleanizy","year":"2007","unstructured":"Aleanizy, F.S., Mohmed, N., Alqahtani, F.Y., El Hadi Mohamed, R.A.: Outbreak of Middle East respiratory syndrome coronavirus in Saudi Arabia: a retrospective study. BMC Infect. Dis. 17(1), 23 (2007). https:\/\/doi.org\/10.1186\/s12879-016-2137-3","journal-title":"BMC Infect. Dis."},{"key":"18_CR6","unstructured":"Sandhya, R.: Public health experts worry about the spread of COVID-19 misinformation. https:\/\/www.rollcall.com\/2020\/03\/18\/public-health-experts-worry-aboutspread-of-COVID-19-misinformation\/. Published in 2020"},{"key":"18_CR7","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600","author":"K Shu","year":"2017","unstructured":"Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media. ACM SIGKDD Explor. Newsl. (2017). https:\/\/doi.org\/10.1145\/3137597.3137600","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"18_CR8","unstructured":"Busari, S., Adebayo, B.: Nigeria records chloroquine poisoning after Trump endorses it for coronavirus treatment. CNN. https:\/\/www.cnn.com\/2020\/03\/23\/africa\/chloroquine-trump-nigeria-intl\/index.html. Published 2020"},{"key":"18_CR9","unstructured":"Joe, W.: Coronavirus: Indian man \u201cdied by suicide\u201d after becoming convinced he was infected. The Telegraph. https:\/\/www.telegraph.co.uk\/global-health\/science-and-disease\/coronavirus-indian-man-died-suicide-becoming-convinced-infected\/. Published 2020"},{"key":"18_CR10","unstructured":"Spencer, S.H.: False claims of nationwide lockdown for COVID-19.https:\/\/www.factcheck.org\/2020\/03\/false-claims-of-nationwide-lockdown-for-covid-19\/"},{"key":"18_CR11","unstructured":"Kasulis, K.: Patient 31 and South Korea\u2019s sudden spike in coronavirus cases. Aljazeera. https:\/\/www.aljazeera.com\/news\/2020\/03\/31-south-korea-sudden-spike-coronavirus-cases-200303065953841.html"},{"key":"18_CR12","unstructured":"The Verge. Major tech platforms say they\u2019re \u2018jointly combating fraud and misinformation\u2019 about COVID-19. https:\/\/www.theverge.com\/2020\/3\/16\/21182726\/coronavirus-covid-19-facebook-google-twitter-youtube-joint-effort-misinformation-fraud"},{"key":"18_CR13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0141423","author":"S Collinson","year":"2015","unstructured":"Collinson, S., Khan, K., Heffernan, J.M.: The effects of media reports on disease spread and important public health measurements. PLoS ONE (2015). https:\/\/doi.org\/10.1371\/journal.pone.0141423","journal-title":"PLoS ONE"},{"key":"18_CR14","doi-asserted-by":"publisher","unstructured":"Pennycook, G., McPhetres, J., Zhang, Y., Rand, D.: Fighting COVID-19 misinformation on social media: experimental evidence for a scalable accuracy nudge intervention. PsyArXiv [Working Paper], 1\u201324 (2020). https:\/\/doi.org\/10.31234\/OSF.IO\/UHBK9","DOI":"10.31234\/OSF.IO\/UHBK9"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Ahmad, T.: Corona virus (COVID-19) pandemic and work from home: challenges of cybercrimes and cyber-security. Available at SSRN 3568830, 2020\u2014papers.ssrn.com","DOI":"10.2139\/ssrn.3568830"},{"key":"18_CR16","unstructured":"Gabriel, J.A., Egwuche, O.S.: Modeling employees\u2019 activities of public service sector using production rules. In: Annals Computer Science Series 13th Tome 2nd Fasc, Romania, 2015"},{"key":"18_CR17","unstructured":"Iwasokun, G.B., Egwuche, O.S., Gabriel, A.J.: Neural network-based health personnel monitoring system. Afr. J. Comput. ICT IEEE 8(1), 79\u201387 (2015)"},{"key":"18_CR18","unstructured":"Roomp, K., Oliver, N.: ACDC-tracing: towards anonymous citizen-driven contact tracing. Arxiv 2020 preprint, available at https:\/\/arxiv.org\/ftp\/arxiv\/papers\/2004\/2004.07463"},{"key":"18_CR19","unstructured":"Raskar, R., Schunemann, I., Barbar, R., Vilcans, K., Gray, J., Vepakomma, P., Kapa, S., Nuzzo, A., Gupta, R., Berke, A.: Apps gone rogue: maintaining personal privacy in an epidemic. arXiv preprint arXiv:2003.08567 (2020)"},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1515\/comp-2019-0018","volume":"9","author":"AJ Gabriel","year":"2019","unstructured":"Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S., Sarumi, O.A.: Post-quantum crystography system for secure electronic voting. Open Comput. Sci 9, 292\u2013298 (2019). https:\/\/doi.org\/10.1515\/comp-2019-0018","journal-title":"Open Comput. Sci"},{"key":"18_CR21","unstructured":"Asher, A.I.: 11 countries are now using people\u2019s phones to track the coronavirus pandemic, and it heralds a massive increase in surveillance. Accessed 15 May 2020. Online. Available: www.businessinsider.com\/countriestracking-citizensphones-coronavirus-2020-3?r=DEIR="},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Altuwaiyan, T., Hadian, M., Liang, X.: Epic: efficient privacy-preserving contact tracing for infection detection. In: 2018 IEEE International Conference on Communications (ICC), IEEE, pp. 1\u20136 (2018)","DOI":"10.1109\/ICC.2018.8422886"},{"key":"18_CR23","unstructured":"Tracetogether Accessed 23 April 2020. [Online]. Available https:\/\/www.tracetogether.gov.sg\/"},{"issue":"3\u20134","key":"18_CR24","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"18_CR25","unstructured":"Reichert, L., Brack, S., Scheuermann, B.: Privacy-preserving contact tracing of covid-19 patients. In: 2020. Cryptology eprint archive. Available at https:\/\/eprint.iacr.org\/2020\/375.pdf"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Brack, S., Reichert, L., Scheuermann, B.: Decentralized contact tracing using a dht and blind signatures. Cryptology eprint archive, 2020. Available at https:\/\/eprint.iacr.org\/2020\/398.pdf","DOI":"10.1109\/LCN48667.2020.9314850"},{"key":"18_CR27","unstructured":"Berke, A., Bakker, M., Vepakomma, P., Raskar, R., Larson, K., Pentland, A.: Assessing disease exposure risk with location histories and protecting privacy: a cryptographic approach in response to a global pandemic. arXiv preprint arXiv:2003.14412 (2020)"},{"issue":"6","key":"18_CR28","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"18_CR29","unstructured":"Vaudenay, S.: Analysis of DP-3T. Accessed: 23 April 2020. [Online]. Available: https:\/\/eprint.iacr.org\/2020\/399 (2020)"},{"key":"18_CR30","doi-asserted-by":"publisher","first-page":"57","DOI":"10.28945\/4008","volume":"15","author":"OD Alowolodu","year":"2018","unstructured":"Alowolodu, O.D., Adelaja, G.K., Alese, B.K., Olayemi, O.C.: Medical image security using quantum cryptography. Issues Informing Sci. Inf. Technol. 15, 57\u201367 (2018)","journal-title":"Issues Informing Sci. Inf. Technol."},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Zheng, C., Deng, X., Fu, Q., Zhou, Q., Feng, J., Ma, H.: Deep learning-based detection for COVID-19 from chest CT using weak label. MedRxiv (2020)","DOI":"10.1101\/2020.03.12.20027185"},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Cao, Y., Xu, Z., Feng, J., Jin, C., Han, X., Wu, H.: Longitudinal assessment of COVID-19 using a deep learning\u2013based quantitative CT pipeline: illustration of two cases. Radiol. Cardiothorac. Imaging 2, e200082 (2020)","DOI":"10.1148\/ryct.2020200082"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Huang, L., Han, R., Ai, T., Yu, P., Kang, H., Tao, Q.: Serial quantitative chest CT assessment of COVID-19: deep-learning approach. Radiol. Cardiothorac. Imaging 2, e200075 (2020)","DOI":"10.1148\/ryct.2020200075"},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Qi, X., Jiang, Z., Yu, Q., Shao, C., Zhang, H., Yue, H.: Machine learning-based CT radiomics model for predicting hospital stay in patients with pneumonia associated with SARS-CoV-2 infection: a multicenter study. MedRxiv (2020)","DOI":"10.1101\/2020.02.29.20029603"},{"key":"18_CR35","unstructured":"Gozes, O., Frid-Adar, M., Greenspan, H., Browning, Y., Zhang, H., Ji, W.: Rapid AI development cycle for the coronavirus (covid-19) pandemic: initial results for automated detection and patient monitoring using deep learning ct image analysis. arXiv:2003.05037 (2020)"},{"key":"18_CR36","unstructured":"Li, L., Qin, L., Xu, Z., Yin, Y., Wang, X., Kong, B.: Artificial intelligence distinguishes COVID-19 from community acquired pneumonia on chest CT. Radiology 200905 (2020)"},{"key":"18_CR37","doi-asserted-by":"crossref","unstructured":"Chen, J., Wu, L., Zhang, J., Zhang, L., Gong, D., Zhao, Y.: Deep learning-based model for detecting 2019 novel coronavirus pneumonia on high-resolution computed tomography: a prospective study. MedRxiv (2020)","DOI":"10.1101\/2020.02.25.20021568"},{"key":"18_CR38","doi-asserted-by":"crossref","unstructured":"Jin, S. Wang, B. Xu, H. Luo, C. Wei, Y. Zhao, W., \u201cAI-assisted CT imaging analysis for COVID-19 screening: Building and deploying a medical AI system in four weeks,\u201d MedRxiv, 2020","DOI":"10.1101\/2020.03.19.20039354"},{"key":"18_CR39","unstructured":"Shan, F., Gao, Y., Wang, J., Shi, W., Shi, N., Han, M.: Lung infection quantification of COVID-19 in CT images with deep learning. arXiv:2003.04655 (2020)"},{"key":"18_CR40","doi-asserted-by":"crossref","unstructured":"Tang, L., Zhang, X., Wang, Y., Zeng, X.: Severe COVID-19 Pneumonia: assessing inflammation burden with volume-rendered chest CT. Radiol. Cardiothorac. Imaging 2, e200044 (2020)","DOI":"10.1148\/ryct.2020200044"},{"key":"18_CR41","doi-asserted-by":"crossref","unstructured":"Shen, C., Yu, N., Cai, S., Zhou, J., Sheng, J., Liu, K.: Quantitative computed tomography analysis for stratifying the severity of coronavirus disease 2019. J. Pharm. Anal. (2020)","DOI":"10.1016\/j.jpha.2020.03.004"},{"key":"18_CR42","unstructured":"Ghoshal, B., Tucker, A.: Estimating uncertainty and interpretability in deep learning for coronavirus (COVID-19) detection. arXiv:2003.10769 (2020)"},{"key":"18_CR43","doi-asserted-by":"crossref","unstructured":"Narin, A., Kaya, C., Pamuk, Z.: Automatic detection of coronavirus disease (COVID-19) using X-ray images and deep convolutional neural networks. arXiv:2003.10849 (2020)","DOI":"10.1007\/s10044-021-00984-y"},{"key":"18_CR44","unstructured":"Zhang, J., Xie, Y., Li, Y., Shen, C., Xia, Y.: COVID-19 screening on chest X-ray images using deep learning based anomaly detection. arXiv:2003.12338 (2020)"},{"key":"18_CR45","doi-asserted-by":"crossref","unstructured":"Wang, L., Wong, A.: COVID-net: a tailored deep convolutional neural network design for detection of COVID-19 cases from chest radiography images. arXiv:2003.09871 (2020)","DOI":"10.1038\/s41598-020-76550-z"},{"key":"18_CR46","doi-asserted-by":"crossref","unstructured":"Jin, C., Cheny, W., Cao, Y., Xu, Z., Zhang, X., Deng, L.: Development and evaluation of an AI system for COVID-19 diagnosis. MedRxiv (2020)","DOI":"10.1101\/2020.03.20.20039834"},{"key":"18_CR47","doi-asserted-by":"crossref","unstructured":"Wang, S., Kang, B., Ma, J., Zeng, X., Xiao, M., Guo, J.: A deep learning algorithm using CT images to screen for Corona Virus Disease (COVID-19). MedRxiv (2020)","DOI":"10.1101\/2020.02.14.20023028"},{"key":"18_CR48","doi-asserted-by":"crossref","unstructured":"Song, Y., Zheng, S., Li, L., Zhang, X., Zhang, X., Huang, Z.: Deep learning enables accurate diagnosis of novel Coronavirus (COVID-19) with CT images. MedRxiv (2020)","DOI":"10.1109\/TCBB.2021.3065361"},{"key":"18_CR49","doi-asserted-by":"crossref","unstructured":"Xu, X., Jiang, X., Ma, C., Du, P., Li, X., Lv, S.: Deep learning system to screen Coronavirus disease 2019 peumonia. arXiv:2002.09334 (2020)","DOI":"10.1016\/j.eng.2020.04.010"},{"key":"18_CR50","doi-asserted-by":"crossref","unstructured":"Shi, F., Xia, L., Shan, F., Wu, D., Wei, Y., Yuan, H.: Large-scale screening of COVID-19 from community acquired pneumonia using infection size-aware classification. arXiv:2003.09860 (2020)","DOI":"10.1088\/1361-6560\/abe838"},{"key":"18_CR51","unstructured":"Tang, Z., Zhao, W., Xie, X., Zhong, Z., Shi, F., Liu, J.: Severity assessment of coronavirus disease 2019 (COVID-19) using quantitative features from chest CT images. arXiv:2003.11988 (2020)"},{"key":"18_CR52","unstructured":"Wang, J.: Privacy-preserving recommender systems facilitated by the machine learning approach. PhD Thesis at the Universit\u00e9 du Luxembourg (2018)"},{"issue":"05","key":"18_CR53","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"18_CR54","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k- anonymization. In: ICDE 2005 Proceedings 21st International Conference on Data Engineering, 217\u2013228. IEEE, 2005"},{"key":"18_CR55","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: ICDE 2007 IEEE 23rd International Conference on Data Engineering, 128, 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"18_CR56","doi-asserted-by":"crossref","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends\u00ae Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","DOI":"10.1561\/0400000042"},{"key":"18_CR57","unstructured":"Hunt, T., Zhu, Z., Xu, Y., Peter, S., Ryoan, E.W.: A distributed and box for untrusted computation on secret data. In OSDI, 533\u2013549 (2016)"},{"key":"18_CR58","unstructured":"Hynes, N., Cheng, R., Song, D.: Efficient deep learning on multi-source private data. arXiv preprint arXiv:1807.06689 (2018)"},{"key":"18_CR59","doi-asserted-by":"crossref","unstructured":"McKeen, F., Alexandrovich, I., Berenzon, A., Rozas, C.V., Shafi, H., Shanbhogue, V., Savagaonkar, U.R.: Innovative instructions and software model for isolated execution. HASP@ISCA 10 (2013)","DOI":"10.1145\/2487726.2488368"},{"key":"18_CR60","doi-asserted-by":"crossref","unstructured":"Lam, S., Frankowski, D., Riedl, J.: Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. In: Muller, G. (ed.) Emerging trends in information and communication security, volume 3995 of Lecture Notes in Computer Science, Ch. 2, p. 14, vol 29. Springer Berlin\/Heidelberg, Berlin, Heidelberg (2006 Cited on page 36)","DOI":"10.1007\/11766155_2"},{"key":"18_CR61","unstructured":"Foner, L.N.: Political artifacts and personal privacy: the yenta multi-agent distributed matchmaking system. PhD thesis, Program in Media Arts and Sciences, School of Architecture and Planning, Massachusetts Institute of Technology (June 1999, Cited on pages 4 and 36)"},{"key":"18_CR62","unstructured":"Williams, C.: Profile injection attack detection for securing collaborative recommender systems center for web intelligence. DePaul University School of Computer Science, Telecommunication, and Information Systems Chicago, Illinois, USA"},{"issue":"4","key":"18_CR63","first-page":"344","volume":"3","author":"AJ Gabriel","year":"2014","unstructured":"Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography based security framework for cloud computing. J. Int. Technol. Secured Trans. 3(4), 344\u2013350 (2014)","journal-title":"J. Int. Technol. Secured Trans."},{"key":"18_CR64","doi-asserted-by":"crossref","unstructured":"Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography: a combination of post-quantum cryptography and steganography. In: The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), Technically Co-sponsored by IEEE UK\/RI Computer Chapter, 9th-12th Dec 2013, London, UK, pp. 454\u2013457","DOI":"10.1109\/ICITST.2013.6750240"},{"key":"18_CR65","unstructured":"Adebayo, O.T., Alese, B.K., Gabriel, A.J.: A model for computer worm detection in a computer network. Int. J. Comput. Appl. (0975\u20138887). 66(2), 22\u201328 (2013)"},{"key":"#cr-split#-18_CR66.1","unstructured":"Alese, B.K., Gabriel, A.J., Olukayode, O., Daramola, O.A.: Modelling of risk management procedures for cybercrime control systems. In: The 2014 International Conference of Information Security and Internet Engineering, World Congress on Engineering, ISBN 978-988-19252-7-7"},{"key":"#cr-split#-18_CR66.2","unstructured":"pp. 505-509. (United Kingdom, 2014)"},{"key":"18_CR67","unstructured":"Alese, B.K., Gabriel, A.J., Adetunmbi, A.O.: Design and implementation of internet protocol security filtering rules in a network environment. Int. J. Comput. Sci. Inf. Secur. USA 9(7), 134\u2013143. Available at www.academia.edu (2011)"},{"key":"18_CR68","doi-asserted-by":"crossref","unstructured":"Bakken, D.E., Rarameswaran, R., Blough, D.M., Franz, A.A., Palmer, T.J.: Data obfuscation: anonymity and desensitization of usable data sets. IEEE Secur. Priv. 2(6), 34 (41, November 2004, Cited on page 39)","DOI":"10.1109\/MSP.2004.97"},{"key":"18_CR69","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: International Conference on Management of Proceedings of the 2000 ACM SIGMOD","DOI":"10.1145\/342009.335438"},{"key":"18_CR70","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. PhD thesis, Stanford, CA, USA (2009). AAI3382729"},{"key":"18_CR71","unstructured":"Yao, A.C.-C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science, 1986, pp. 162\u2013167. IEEE, 1986"},{"key":"18_CR72","doi-asserted-by":"publisher","unstructured":"Braga, D.D., Niemann, M., Hellingrath, B., Neto, F.B.: Survey on computational trust and reputation models. ACM Comput. Surv. 51, 5, 101 (Nov. 2018, 40 pages). https:\/\/doi.org\/10.1145\/3236008","DOI":"10.1145\/3236008"}],"container-title":["Studies in Systems, Decision and Control","Digital Transformation and Emerging Technologies for Fighting COVID-19 Pandemic: Innovative Approaches"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63307-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T01:06:53Z","timestamp":1671584813000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-63307-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030633066","9783030633073"],"references-count":73,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63307-3_18","relation":{},"ISSN":["2198-4182","2198-4190"],"issn-type":[{"type":"print","value":"2198-4182"},{"type":"electronic","value":"2198-4190"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"11 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}