- Mónica P. Arenas, Georgios Fotiadis, Gabriele Lenzini, Mohammadamin Rakeei. Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols. Computers & Security, 148:104131, 2025.
- Hongmei Li, Tiantian Zhu, Jie Ying, Tieming Chen, Mingqi Lv, Jian-Ping Mei, Zhengqiu Weng, Lili Shi. MIRDETECTOR: Applying malicious intent representation for enhanced APT anomaly detection. Computers & Security, 157:104588, 2025.
- Kaidi Xu, Jia Yu, Wenjing Gao. Towards privacy-preserving compressed sensing reconstruction in cloud. Computers & Security, 151:104348, 2025.
- Yuwei Lin, Yonghong Chen, Hui Tian 0002, Xiaolong Zhuang. Covert timing channel detection based on isolated binary trees. Computers & Security, 150:104200, 2025.
- Nicola Bena, Marco Anisetti, Ernesto Damiani, Chan Yeob Yeun, Claudio A. Ardagna. Protecting machine learning from poisoning attacks: A risk-based approach. Computers & Security, 155:104468, 2025.
- Zhenwu Xu, Xingshu Chen, Liangguo Chen, Xiao Lan, Hao Ren 0001, ChangXiang Shen. An efficient and commercial proof of storage scheme supporting dynamic data updates. Computers & Security, 157:104609, 2025.
- Davide Bonaventura, Sergio Esposito, Giampaolo Bella. A case of smart devices that compromise home cybersecurity. Computers & Security, 151:104286, 2025.
- Ying-Dar Lin, Wei-Hsiang Chan, Yuan-Cheng Lai, Chia-Mu Yu, Yu-Sung Wu, Wei-Bin Lee. Enhancing can security with ML-based IDS: Strategies and efficacies against adversarial attacks. Computers & Security, 151:104322, 2025.
- M. Rajkumar, J. Karthika, S. S. Abinayaa. Multi-view consistent generative adversarial network for enhancing intrusion detection with prevention systems in mobile ad hoc networks against security attacks. Computers & Security, 150:104242, 2025.
- Tamminina Ammannamma, A. S. N. Chakravarthy. A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection. Computers & Security, 150:104221, 2025.