- Yan Xu, Deqiang Li, Qianmu Li. SMAttack: Subgraph mimicry for black-box adversarial Android malware generation. Computers & Security, 160:104708, 2026.
- Wei Wang, Weike Wang, Jiameng Liu, Lin Li 0060, Bingzheng Li, Zirui Liu, Xiang Wang 0006. Attacks, defenses and perspectives for the runtime security of RISC-V IoT devices: A review. Computers & Security, 163:104817, 2026.
- Xing Hu 0012, Yang Zhang 0026, Sheng Liu, Xiaowen Chen, Yaohua Wang, Shaoqing Li, Zhenyu Zhao, Keqin Li 0001. GLRA: Graph-based leakage risk assessment via minimal transmission cost path analysis. Computers & Security, 163:104816, 2026.
- Chuan Lu, Senlin Luo, Limin Pan. Dynamic soft isolation and restricted eviction for cache side channel attack defense. Computers & Security, 161:104753, 2026.
- Yunfei Wang, Shixuan Liu, Wenhao Wang, Changling Zhou, Chao Zhang 0008, Jiandong Jin, Cheng Zhu. A unified modeling framework for automated penetration testing. Computers & Security, 162:104787, 2026.
- Kamal Benzekki, Mohamed-Lamine Messai. Empowering cybersecurity analysis: Unifying CVE, CWE, and CPE through knowledge graphs. Computers & Security, 160:104726, 2026.
- Dwibik Patra, Narendran Rajagopalan. Integration of emerging technologies in cybersecurity for healthcare: A systematic review. Computers & Security, 161:104763, 2026.
- MD Mahady Hassan, Shanto Roy, Reza Rahaeimehr. Memory under siege: A comprehensive survey of side-Channel attacks on memory. Computers & Security, 163:104810, 2026.
- Daniel Lastanao Miró, Javier Carrillo Mondéjar, Ricarddo J. Rodríguez. Characterizing tactics, techniques, and procedures in the macOS threat landscape. Computers & Security, 162:104806, 2026.
- Aditya Subash, Insu Song, Ickjai Lee, Kyungmi Lee. Adaptability of current keystroke and mouse behavioral biometric systems: A survey. Computers & Security, 160:104731, 2026.