{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T18:47:20Z","timestamp":1767034040364,"version":"3.37.3"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100006013","name":"United Arab Emirates University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006013","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,21]]},"DOI":"10.1109\/educon46332.2021.9454089","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T20:36:14Z","timestamp":1624048574000},"page":"726-731","source":"Crossref","is-referenced-by-count":6,"title":["Boosting Students and Teachers Cybersecurity Awareness During COVID-19 Pandemic"],"prefix":"10.1109","author":[{"given":"Saed","family":"Alrabaee","sequence":"first","affiliation":[]},{"given":"Raed","family":"Manna","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/CCECE.2015.7129383"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/ISCC47284.2019.8969663"},{"key":"ref33","article-title":"Hackers hijack routers&#x2019; dns to spread malicious covid-19 apps","author":"abrams","year":"2020","journal-title":"Bleeping Computer"},{"key":"ref32","article-title":"New android app offers coronavirus safety mask but delivers sms trojan","author":"desai","year":"2020","journal-title":"zScaler"},{"key":"ref31","article-title":"Threat intel | cyber attacks leveraging the covid-19\/coronavirus pandemic","author":"walter","year":"2020","journal-title":"The Sentinel"},{"key":"ref30","article-title":"Covid-19 - malware makes hay during a pandemic","author":"kamik","year":"2020","journal-title":"McAfee"},{"year":"0","journal-title":"FBI Warns of Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic","key":"ref37"},{"key":"ref36","article-title":"Global ransomware and cyberattacks on healthcare spike during pandemic","author":"arsene","year":"2020","journal-title":"Bitdefender"},{"year":"2020","author":"lyons hardcastle","journal-title":"Ransomware attacks spike 148SDXCentral","key":"ref35"},{"key":"ref34","article-title":"New hawkeye reborn variant emerges following ownership change","author":"brumaghin","year":"2020","journal-title":"Cisco Talos"},{"key":"ref10","article-title":"Why education is more susceptible to cyber attacks during covid-19","author":"catricala","year":"2020","journal-title":"Uzado"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/URC49805.2020.9099187"},{"key":"ref11","article-title":"Rush to adopt online learning under covid-19 exposes schools to cyberattacks","author":"barth","year":"2020","journal-title":"SC Media"},{"year":"0","journal-title":"Cyber warning issued for key healthcare organisations in uk and usa","article-title":"National Cyber Security Center","key":"ref12"},{"key":"ref13","article-title":"Coronavirus: Cyber-spies hunt covid-19 research, us and uk warn","author":"corera","year":"2020","journal-title":"BBC"},{"key":"ref14","article-title":"Hackers are targeting uk universities to steal coronavirus research, nese warns","author":"osborne","year":"2020","journal-title":"ZDNet"},{"key":"ref15","article-title":"Hostile states trying to steal coronavirus research, says uk agency","author":"grierson","year":"2020","journal-title":"The Guardian"},{"key":"ref16","article-title":"State hackers target uk unis for covidl9 vaccine research","author":"muncaster","year":"2020","journal-title":"Information Security Group"},{"key":"ref17","article-title":"Contact tracing apps unsafe if bluetooth vulnerabilities not fixed","author":"yu","year":"2020","journal-title":"ZDNet"},{"key":"ref18","article-title":"The u.k.&#x2019;s covid-19 contact tracing app: Everything you need to know","author":"o\u2019flaherty","year":"2020","journal-title":"Forbes"},{"key":"ref19","article-title":"India&#x2019;s covid-19 contact tracing app could leak patient locations","author":"greenberg","year":"2020","journal-title":"Wired"},{"year":"0","journal-title":"Covid-19 cyber attack investigation","key":"ref28"},{"key":"ref4","article-title":"Zoom pulls in more than 200 million daily video users during worldwide lockdowns","author":"patnail","year":"2020","journal-title":"Reuters"},{"key":"ref27","article-title":"Remote spring: the rise of rdp bruteforce attacks","author":"galov","year":"2020","journal-title":"Reuters"},{"year":"2020","journal-title":"Khaleej Times","article-title":"Combating covid-19: Video app zoom rockets to fame, with some hiccups, amid pandemic","key":"ref3"},{"key":"ref6","article-title":"Intruders are hijacking zoom calls with noise and gross images &#x2014; here&#x2019;s how to avoid becoming a victim of&#x2018;zoombombing&#x2019;","author":"novet","year":"2020","journal-title":"CNBC"},{"year":"2020","journal-title":"TrendMicro","article-title":"Developing story: Covid-19 used in malicious campaigns","key":"ref29"},{"key":"ref5","article-title":"Fbi: Covid-19 spurs increase in zoom, video-conferencing hijacking","author":"davis","year":"2020","journal-title":"Health IT Security"},{"year":"0","journal-title":"Cyber actors take advantage of covid-19 pandemic to exploit increased use of virtual environments","article-title":"FBI Internet Crime Complaint Center (IC3)","key":"ref8"},{"key":"ref7","article-title":"How zoom became so popular during social distancing","author":"evans","year":"2020","journal-title":"CNBC"},{"year":"2020","journal-title":"Covid-19 dashboard by the center for systems science and engineering (esse) at johns hopkins university (jhu)","key":"ref2"},{"key":"ref9","article-title":"Remote learning: Cybersecurity and compliance in the covid-19 age","author":"quinones","year":"2020","journal-title":"District Administration"},{"year":"2020","journal-title":"Is the world ready for the coronavirus?&#x2014; distrust in science and institutions could be a major problem if the outbreak worsens","key":"ref1"},{"year":"2020","journal-title":"Digitpol","article-title":"Contact tracing smartphone apps raise privacy concerns","key":"ref20"},{"year":"2020","journal-title":"BleepingComputerNews","article-title":"World health organization warns of coronvirus phishing attacks","key":"ref22"},{"key":"ref21","article-title":"The nhs coronavirus app could track how long you spend outside","author":"volpicelli","year":"2020","journal-title":"Wired"},{"year":"0","journal-title":"Beware of criminals pretending to be wHO","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1016\/j.diin.2014.03.012"},{"year":"0","journal-title":"Cyberattack report 2019","key":"ref23"},{"year":"2020","journal-title":"Interpolation","article-title":"Interpol launches awareness campaign on covid-19 cyberthreats","key":"ref26"},{"year":"0","journal-title":"COVID-19 Cyberthreats","key":"ref25"}],"event":{"name":"2021 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2021,4,21]]},"location":"Vienna, Austria","end":{"date-parts":[[2021,4,23]]}},"container-title":["2021 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9453798\/9453843\/09454089.pdf?arnumber=9454089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:35Z","timestamp":1652197355000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9454089\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,21]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/educon46332.2021.9454089","relation":{},"subject":[],"published":{"date-parts":[[2021,4,21]]}}}