| 9 | -- | 11 | Antonio Mastropaolo. Secrets in the Synapses: When Steganography Meets Large Language Models |
| 12 | -- | 14 | Erich J. Neuhold. 50 & 25 YEARS AGO |
| 15 | -- | 0 | Ergun Akleman. Computing Through Time: Learning: Humans vs Machines |
| 16 | -- | 19 | Nir Kshetri, Jeffrey M. Voas. Thoughts on Technology and the State |
| 18 | -- | 0 | Jeffrey M. Voas. IN THIS ISSUE |
| 20 | -- | 30 | Manfred Broy, Harald Ruess. Principled Cyber-Physical System Design: From Foundations and Models to Practical Engineering |
| 31 | -- | 38 | Rolf Ernst, Robin Hapka. Machine Learning in Safety-Critical Applications: Beyond Traditional Worst-Case Design |
| 39 | -- | 50 | Daojing He, Yuxing Zhang, Shanshan Zhu, Sammy Chan. Fuzzing Microsoft Remote Procedure Call Services |
| 51 | -- | 59 | Stefano Galantino, Jacopo Marino, Fulvio Risso, Stefano Braghin, Liubov Nedoshivina, Antonio Fernandez Gómez-Skarmeta, Domenico Siracusa. Edge-to-Cloud Continuum Made Real |
| 60 | -- | 69 | Victor R. Kebande. The End of Pretraining for Large Language Models: The Future of Agentic and AI Reasoning Beyond Peak Data |
| 70 | -- | 83 | Christian Macedonia. The Computational Kosmoplex: A Principia for Engineers in the Age of AI |
| 84 | -- | 91 | Zhaoqing Teng, Magy Seif El-Nasr. Unlocking Player Strategy: A Visual Journey Into Players' Problem-Solving Behaviors |
| 92 | -- | 99 | Tairan Fu, David Nazareno Campo, Javier Coronado-Blázquez, Javier Conde, Pedro Reviriego, Fabrizio Lombardi. Stochastic Streets: A Walk Through Random LLM Address Generation in Four European Cities |
| 100 | -- | 104 | Nir Kshetri, Jeffrey M. Voas. Is Vibe Coding the Future of Software? |
| 105 | -- | 112 | Nir Kshetri, Jeffrey M. Voas. The Deepfake Governance Gap: Navigating Global Regulation in an Age of Synthetic Realitiess |
| 113 | -- | 118 | Hal Berghel. From Trolls to Edgelords: The Use of Social Media to Support Extreme Ideology |
| 119 | -- | 125 | Norita B. Ahmad, Anoud Abusalim, Jeffrey M. Voas, Keith W. Miller 0001. Be Visible or Vanish: Academic Publishing in the Platform Age |
| 126 | -- | 130 | Thomas M. Coughlin. Space Data Centers Come of Age |
| 131 | -- | 138 | James Bret Michael. Firmware, Dependability, and Trust |
| 139 | -- | 141 | Dimitrios Serpanos. False Data Injection: Blind Trust and Stealthy Attacks |
| 142 | -- | 146 | Mark Kennedy, Joanna F. DeFranco, Phillip A. Laplante. Discovering Proxy Systems to Test Critical AI Systems: A Metadata-Driven Software Similarity Approach |