- Yan Xu, Deqiang Li, Qianmu Li. SMAttack: Subgraph mimicry for black-box adversarial Android malware generation. Computers & Security, 160:104708, 2026.
- Chuan Lu, Senlin Luo, Limin Pan. Dynamic soft isolation and restricted eviction for cache side channel attack defense. Computers & Security, 161:104753, 2026.
- Yunfei Wang, Shixuan Liu, Wenhao Wang, Changling Zhou, Chao Zhang 0008, Jiandong Jin, Cheng Zhu. A unified modeling framework for automated penetration testing. Computers & Security, 162:104787, 2026.
- Kamal Benzekki, Mohamed-Lamine Messai. Empowering cybersecurity analysis: Unifying CVE, CWE, and CPE through knowledge graphs. Computers & Security, 160:104726, 2026.
- Dwibik Patra, Narendran Rajagopalan. Integration of emerging technologies in cybersecurity for healthcare: A systematic review. Computers & Security, 161:104763, 2026.
- Aditya Subash, Insu Song, Ickjai Lee, Kyungmi Lee. Adaptability of current keystroke and mouse behavioral biometric systems: A survey. Computers & Security, 160:104731, 2026.
- Yooshin Kim, Namhyeok Kwon, Donghoon Shin. KDPrint: Passive authentication using keystroke dynamics-to-image encoding via standardization. Computers & Security, 160:104725, 2026.
- Amber Sarfraz, Adnan Ahmad, Frukh Zeshan, Muhammad Hamid, Fahima Hajjej, Tagrid Abdullah N. Alshalali. Hybrid harmony: The role of socio-technical system for cross-cultural behavioral variations to profile adversarial resistance. Computers & Security, 160:104727, 2026.
- Zhihua Yin, Zixuan Li, Youtong Zhang, Jianxi Li, Dong Liu, Hongqian Wei. Temporal-spatial feature fusion based intrusion detection system for in-vehicle networks. Computers & Security, 161:104781, 2026.
- Quentin Rouland, Kamel Adi, Omer Nguena-Timo, Luigi Logrippo. A formal approach for security pattern enforcement in software architecture. Computers & Security, 162:104749, 2026.