- Yan Xu, Deqiang Li, Qianmu Li. SMAttack: Subgraph mimicry for black-box adversarial Android malware generation. Computers & Security, 160:104708, 2026.
- Chuan Lu, Senlin Luo, Limin Pan. Dynamic soft isolation and restricted eviction for cache side channel attack defense. Computers & Security, 161:104753, 2026.
- Kamal Benzekki, Mohamed-Lamine Messai. Empowering cybersecurity analysis: Unifying CVE, CWE, and CPE through knowledge graphs. Computers & Security, 160:104726, 2026.
- Aditya Subash, Insu Song, Ickjai Lee, Kyungmi Lee. Adaptability of current keystroke and mouse behavioral biometric systems: A survey. Computers & Security, 160:104731, 2026.
- Yooshin Kim, Namhyeok Kwon, Donghoon Shin. KDPrint: Passive authentication using keystroke dynamics-to-image encoding via standardization. Computers & Security, 160:104725, 2026.
- Amber Sarfraz, Adnan Ahmad, Frukh Zeshan, Muhammad Hamid, Fahima Hajjej, Tagrid Abdullah N. Alshalali. Hybrid harmony: The role of socio-technical system for cross-cultural behavioral variations to profile adversarial resistance. Computers & Security, 160:104727, 2026.
- Yevhenii Martseniuk, Andrii Partyka, Ivan R. Opirskyy, Oleh Harasymchuk. Cost observability as a security control in multi-cloud environments based on SOC 2 security standard. Computers & Security, 161:104771, 2026.
- Chen Wang, Hongbo Tang, Yu Zhao, Wei You, Jie Yang 0085, Hang Qiu 0003. Losing control: Exposing security weaknesses of Kubernetes control plane interfaces. Computers & Security, 160:104704, 2026.
- Yaqi Liu, Yue Zhang, Pinzhen He, Shuzhen Fang. FedGNNLDP: Federated graph neural network with locally differential privacy. Computers & Security, 161:104757, 2026.
- Anne Hennig, Maxime Veit, Leoni Schmidt-Enke, Fabian Neusser, Dominik Herrmann, Peter Mayer 0001. "I believe it's incredibly difficult to fight against this flood of spam": Towards enhancing strategies for creating effective vulnerability notifications. Computers & Security, 160:104682, 2026.