1. Cho, H., Ippolito, D., Yu, Y.W.: Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs (2020)
2. Lallie, H.S., et al.: Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the paandemic. arXiv, pp. 1–20 (2020)
3. Nejabatkhah, F., Li, Y.W., Liang, H., Ahrabi, R.R.: Cyber-security of smart microgrids: a survey. Energies 14, 27 (2021)
4. Shetty, V.S., Anusha, R., Dileep, K., Hegde, P.: A survey on performance analysis of block cipher algorithms. In: Proceeding of 5th International Conference Invented Computer Technology ICICT 2020, pp. 167–174 (2020). https://doi.org/10.1109/ICICT48043.2020.9112491
5. Islam, M.A., Kobita, A.A., Hossen, M.S., Rumi, L.S., Karim, R., Tabassum, T.: Data security system for a bank based on two different asymmetric algorithm cryptographies. In: International Conference on Evolutionary Computing and Mobile Sustainable Networks (2020)