Survey

Effects of COVID-19 pandemic on computational intelligence and cybersecurity: Survey

  • Received: 20 April 2022 Revised: 27 October 2022 Accepted: 01 November 2022 Published: 17 November 2022
  • In late December 2019, the World Health Organization (WHO) announced the outbreak of a new type of coronavirus, named the Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2), also known as COVID-19. The deadliness of the virus has forced governments and countries to socially isolate their populations, causing a worldwide impact on the economy. Pandemic management has stressed health systems to work beyond their limits, adding more to the tragedy of losing millions of lives. As a natural response to such disasters, intelligent systems have been developed for various reasons related to virus detection, tracking and control. The social lockdown created a record level of online platforms and applications being used to resume professional and educational activities in a virtual environment. This has triggered an unprecedented growth in cybercrime. This paper presents the effects of the pandemic on computational intelligence and cybersecurity.

    Citation: Mohamed Wiem Mkaouer, Tarek Gaber, and Zaineb Chelly Dagdia. Effects of COVID-19 pandemic on computational intelligence and cybersecurity: Survey[J]. Applied Computing and Intelligence, 2022, 2(2): 173-194. doi: 10.3934/aci.2022010

    Related Papers:

  • In late December 2019, the World Health Organization (WHO) announced the outbreak of a new type of coronavirus, named the Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2), also known as COVID-19. The deadliness of the virus has forced governments and countries to socially isolate their populations, causing a worldwide impact on the economy. Pandemic management has stressed health systems to work beyond their limits, adding more to the tragedy of losing millions of lives. As a natural response to such disasters, intelligent systems have been developed for various reasons related to virus detection, tracking and control. The social lockdown created a record level of online platforms and applications being used to resume professional and educational activities in a virtual environment. This has triggered an unprecedented growth in cybercrime. This paper presents the effects of the pandemic on computational intelligence and cybersecurity.



    加载中


    [1] R. S. Istepanian, T. AlAnzi, Mobile health (m-health): Evidence-based progress or scientific retrogression, Biomedical Information Technology, (2020), 717–733. https://doi.org/10.1016/B978-0-12-816034-3.00022-5 doi: 10.1016/B978-0-12-816034-3.00022-5
    [2] C. D. Tran, T. T. Nguyen, Health vs. privacy? the risk-risk tradeoff in using covid-19 contact-tracing apps, Technol. Soc., 67 (2021), 101755. https://doi.org/10.1016/j.techsoc.2021.101755 doi: 10.1016/j.techsoc.2021.101755
    [3] J. L. Boyles, A. Smith, M. Madden, Apps and privacy: More than half of app users have uninstalled or decided to not install an app due to concerns about their personal information, 2015.
    [4] N. A. Khan, S. N. Brohi, N. Zaman, Ten deadly cyber security threats amid covid-19 pandemic, 2020.
    [5] A. S. John, It's not just zoom. Google meet, Microsoft teams, and webex have privacy issues too, 2020. Consumer Reports.
    [6] A. R. Brough, K. D. Martin, Consumer privacy during (and after) the covid-19 pandemic, J. Public Policy Mark., 40 (2021), 108–110. https://doi.org/10.1177/0743915620929999 doi: 10.1177/0743915620929999
    [7] M. Burgess, Hackers are targeting hospitals crippled by coronavirus, 2020. WIRED.
    [8] N. C. S. C. Advisory, Covid-19 exploited by malicious cyber actors, 2021.
    [9] S. Morgan, Cybercrime to cost the world fanxiexian_myfh10.5 trillion annually by 2025, Cybercrime Magazine, 13 (2020).
    [10] D. L. Shinder, M. Cross, Scene of the Cybercrime, Elsevier, 2008.
    [11] H. S. Lallie, L. A. Shepherd, J. R. Nurse, A. Erola, G. Epiphaniou, C. Maple, et al., Cyber security in the age of Covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic, Comput. Secur., 105 (2021), 102248. https://doi.org/10.1016/j.cose.2021.102248 doi: 10.1016/j.cose.2021.102248
    [12] J. R. C. Nurse, Cybercrime and you: How criminals attack and the human factors that they seek to exploit, 2018. https://doi.org/10.1093/oxfordhb/9780198812746.013.35
    [13] K. Tysiac, How cybercriminals prey on victims of natural disasters, 2020.
    [14] E. Elsworthy, Hundreds of bushfire donation scams circulating, 2020.
    [15] T. Foltýn, You have not won! a look at fake fifa world cup-themed lotteries and giveaways, 2018.
    [16] NHS, 9 tips to help if you are worried about covid-19, 2020.
    [17] P. D. las Cuevas, P. García-Sánchez, Z. Chelly Dagdia, M. I. García-Arenas, J. J. Merelo Guervós, Automatic rule extraction from access rules using genetic programming, In International Conference on the Applications of Evolutionary Computation (Part of EvoStar), (2020), 54–69. Springer. https://doi.org/10.1007/978-3-030-43722-0_4
    [18] CGI, Helping defend against a 30,000% increase in phishing attacks related to covid-19 scams, 2020.
    [19] INTERPOL, Interpol report shows alarming rate of cyberattacks during covid-19, 2020.
    [20] J. Davis, Covid-19 impact on ransomware, threats, healthcare cybersecurity, 2020.
    [21] J. Davis, Google blocking 18m coronavirus scam emails every day, 2020.
    [22] Statista, Where do it professionals see an increase in cyber attacks and attack attempts following the covid-19 pandemic?, 2021.
    [23] M. Obiso, I. Neto, M. Baayen, How tailored national cybersecurity strategies enable safe, inclusive and sustainable digital development, 2022.
    [24] Global Cybersecurity Index, Global cybersecurity index 2020, 2020.
    [25] NCS Guide 2021, 2nd edition of the guide to developing a national cybersecurity strategy, 2021.
    [26] G. Iakovakis, C. G. Xarhoulacos, K. Giovas, D. Gritzalis, Analysis and classification of mitigation tools against cyberattacks in covid-19 era, Secur. Commun. Netw., 2021 (2021), 3187205. https://doi.org/10.1155/2021/3187205 doi: 10.1155/2021/3187205
    [27] Yahoo.com., Global virtual private network (vpn) markets report 2022, 2022.
    [28] J. Joe, Safely scaling virtual private network for a major telecom company during a pandemic, Available at SSRN, (2022).
    [29] marketsandmarkets.com., Multi-factor authentication market (2022 - 2026), 2022.
    [30] A. Y. F. Alsahlani, A. Popa, Lmaas-iot: Lightweight multi-factor authentication and authorization scheme for real-time data access in iot cloud-based environment, J. Netw. Comput. Appl., 192 (2021), 103177. https://doi.org/10.1016/j.jnca.2021.103177 doi: 10.1016/j.jnca.2021.103177
    [31] D. Vargo, L. Zhu, B. Benwell, Z. Yan, Digital technology use during covid-19 pandemic: A rapid review, Human Behavior and Emerging Technologies, 3 (2021), 13–24. https://doi.org/10.1002/hbe2.242 doi: 10.1002/hbe2.242
    [32] J. T. Wu, K. Leung, G. M. Leung, Nowcasting and forecasting the potential domestic and international spread of the 2019-ncov outbreak originating in wuhan, china: a modelling study, The Lancet, 395 (2020), 689–697. https://doi.org/10.1016/S0140-6736(20)30260-9 doi: 10.1016/S0140-6736(20)30260-9
    [33] S. Roy, W. Menapace, S. Oei, B. Luijten, E. Fini, C. Saltori, et al., Deep learning for classification and localization of covid-19 markers in point-of-care lung ultrasound, IEEE T. Med. Imaging, 39 (2020), 2676–2687. https://doi.org/10.1109/TMI.2020.2994459 doi: 10.1109/TMI.2020.2994459
    [34] L. Wang, Z. Q. Lin, A. Wong, Covid-net: A tailored deep convolutional neural network design for detection of covid-19 cases from chest x-ray images, Scientific Reports, 10 (2020), 1–12. https://doi.org/10.1038/s41598-020-76550-z doi: 10.1038/s41598-020-76550-z
    [35] H. Panwar, P. K. Gupta, M. K. Siddiqui, R. Morales-Menendez, V. Singh, Application of deep learning for fast detection of covid-19 in x-rays using ncovnet, Chaos, Solitons & Fractals, 138 (2020), 109944. https://doi.org/10.1016/j.chaos.2020.109944 doi: 10.1016/j.chaos.2020.109944
    [36] S. Wang, Y. Zha, W. Li, Q. Wu, X. Li, M. Niu, et al., A fully automatic deep learning system for covid-19 diagnostic and prognostic analysis, Eur. Respir. J., 56 (2020), 2000775. https://doi.org/10.1183/13993003.00775-2020 doi: 10.1183/13993003.00775-2020
    [37] Y. Oh, S. Park, J. C. Ye, Deep learning covid-19 features on cxr using limited training data sets, IEEE T. Med. Imaging, 39 (2020), 2688–2700. https://doi.org/10.1109/TMI.2020.2993291 doi: 10.1109/TMI.2020.2993291
    [38] S. Vaid, R. Kalantar, M. Bhandari, Deep learning covid-19 detection bias: accuracy through artificial intelligence, Int. Orthop., 44 (2020), 1539–1542. https://doi.org/10.1007/s00264-020-04609-7 doi: 10.1007/s00264-020-04609-7
    [39] D. Singh, V. Kumar, Vaishali, M. Kaur, Classification of covid-19 patients from chest ct images using multi-objective differential evolution–based convolutional neural networks, Eur. J. Clin. Microbiol., 39 (2020), 1379–1389. https://doi.org/10.1007/s10096-020-03901-z doi: 10.1007/s10096-020-03901-z
    [40] L. Bai, D. Yang, X. Wang, L. Tong, X. Zhu, N. Zhong, et al., Chinese experts' consensus on the internet of things-aided diagnosis and treatment of coronavirus disease 2019 (covid-19), Clinical eHealth, 3 (2020), 7–15.
    [41] V. Chamola, V. Hassija, V. Gupta, M. Guizani, A comprehensive review of the covid-19 pandemic and the role of iot, drones, ai, blockchain, and 5g in managing its impact, Ieee access, 8 (2020), 90225–90265. https://doi.org/10.1109/ACCESS.2020.2992341 doi: 10.1109/ACCESS.2020.2992341
    [42] Z. Han, B. Wei, Y. Hong, T. Li, J. Cong, X. Zhu, et al., Accurate screening of covid-19 using attention-based deep 3d multiple instance learning, IEEE T. Med. Imaging, 39 (2020), 2584–2594. https://doi.org/10.1109/TMI.2020.2996256 doi: 10.1109/TMI.2020.2996256
    [43] D. C. Nguyen, P. N. Pathirana, M. Ding, A. Seneviratne, Blockchain for 5g and beyond networks: A state of the art survey, J. Netw. Comput. Appl., 166 (2020), 102693. https://doi.org/10.1016/j.jnca.2020.102693 doi: 10.1016/j.jnca.2020.102693
    [44] S. K. Lo, X. Xu, M. Staples, L. Yao, Reliability analysis for blockchain oracles, Comput. Electr. Eng., 83 (2020), 106582. https://doi.org/10.1016/j.compeleceng.2020.106582 doi: 10.1016/j.compeleceng.2020.106582
    [45] Z. C. Dagdia, A. C. S. e Silva, Effects of covid-19 pandemic on education and society, STEM Education, 2 (2022), 197–220. https://doi.org/10.3934/steme.2022013 doi: 10.3934/steme.2022013
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1631) PDF downloads(42) Cited by(0)

Article outline

Figures and Tables

Figures(6)  /  Tables(1)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog