• COVID-19 and Global Increases in Cybersecurity Attacks: Review of Possible Adverse Artificial Intelligence Attacks 

      Alzarqawee, Aws Naser Jaber; Fritsch, Lothar (International Computer Science and Engineering Conference (ICSEC);2021 25th International Computer Science and Engineering Conference, Conference object, 2022)
      The World Health Organization's (WHO) coronavirus disease dashboard has recorded over 207 million confirmed infections and over 4 million deaths. There has been an increasing vulnerability in cybersecurity amongst businesses, ...
    • Early Labour App: Developing a practice-based mobile health application for digital early labour support 

      Iwaya, Leonardo Horn; Nordin, Anna; Fritsch, Lothar; Børøsund, Elin; Johansson, Margareta; Varsi, Cecilie; Ängeby, Karin (Peer reviewed; Journal article, 2023)
      Background: Pregnant women in early labour have felt excluded from professional care, and their partners have been restricted from being involved in the birthing process. Expectant parents must be better prepared to deal ...
    • Electronic identity mass compromize: Options for recovery 

      Fritsch, Lothar (Lecture Notes in Informatics;, Chapter; Peer reviewed, 2023)
      A National Digital Identity Framework should be designed in a proactive manner, should focus on a resilience-oriented approach, and should be aimed at limiting the risks that may originate from identity data management ...
    • Emerging Biometric Modalities and their Use: Loopholes in the Terminology of the GDPR and Resulting Privacy Risks 

      Bisztray, Tamas; Gruschka, Nils; Bourlai, Thirimachos; Fritsch, Lothar (Conference object, 2021)
      Technological advancements allow biometric applications to be more omnipresent than in any other time before. This paper argues that in the current EU data protection regulation, classification applications using biometric ...
    • Extraction and Accumulation of Identity Attributes from the Internet of Things 

      Fritsch, Lothar; Gruschka, Nils (Lecture Notes in Informatics (LNI) - Proceedings;Open Identity Summit 2021; Volume P-312, Conference object, 2021)
      Internet of Things (IoT) devices with wireless communication provide person-relateable information usable as attributes in digital identities. By scanning and profiling these signals against location and time, identity ...
    • Improving Phishing Detection with the Grey Wolf Optimizer 

      Naser Jaber, Aws; Fritsch, Lothar; Haugerud, Hårek (International Conference on Electronics, Information, and Communication (ICEIC);2022 International Conference on Electronics, Information, and Communication (ICEIC), Conference object, 2022-04-11)
      With the recent epidemic of COVID-19-themed scam and phishing, the efficient automated detection of such attacks is crucial. Although many anti-phishing solutions, such as lists and similarity and heuristic-based approaches ...
    • Modelling privacy harms of compromised personal medical data - beyond data breach 

      Wairimu, Samuel; Fritsch, Lothar (Conference object, 2022-08-23)
      What harms and consequences do patients experience after a medical data breach? This article aims at the improvement of privacy impact analysis for data breaches that involve personal medical data. The article has two major ...
    • An overview of artificial intelligence used in malware 

      Fritsch, Lothar; Alzarqawee, Aws Naser Jaber; Yazidi, Anis (Chapter; Conference object, 2023)
      Artificial intelligence (AI) and machine learning (ML) methods are increasingly adopted in cyberattacks. AI supports the establishment of covert channels, as well as the obfuscation of malware. Additionally, AI results in ...
    • A Robust and Secure Edge-Based AI System Against Adversarial Attacks 

      Sørensen, Stian André (Master thesis, 2023)
      Ensuring the safe deployment and use of artificial intelligence (AI) in safety-critical systems is crucial in the reality of effective adversarial attacks (AAs). AAs involve manipulating the data inputs to AI models to ...
    • Supply chain risks from Cloud Security Posture Management 

      Gebregergis, Robel Michael; Fritsch, Lothar (Master thesis, 2023)
      Cloud security posture management services (CSPMSs) support security efforts in the industry by providing more convenient ways of detecting misconfigurations, threats, and vulnerabilities in the cloud. The capabilities of ...
    • Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators 

      Alzarqawee, Aws Naser Jaber; Fritsch, Lothar (Lecture Notes in Networks and Systems;Volume 571, Conference object, 2023-10-18)
      Cybersecurity currently focuses primarily on defenses that detect and prevent cyber-attacks. However, it is more important to regularly verify an organization’s security posture to reinforce its cybersecurity defenses as ...
    • Towards robustness of keyboard-entered authentication factors with thermal wiping against thermographic attacks 

      Fritsch, Lothar; Mecaliff, Marie; Opdal, Kathinka W.; Rundgreen, Mathias; Sachse, Toril S. (Lecture Notes in Informatics (LNI) - Proceedings;Volume P-325, Conference object, 2022)
      Many authentication methods use keyboard entry for one of their authentication factors. Keyboards factors have been compromised exploiting physical fingerprints, substances from fingers visible on keys, with acoustic ...