- Xueqi Zhu, Fangzhou Liu, Yan Jia, Jun Xu, Peng Wang 0009. Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method. Cybersecurity, 8(1):3, December 2025.
- Ruiqi Huang, Hua Wu 0004, Xiaohui Wang, Guang Cheng 0001, Xiaoyan Hu. The secret behind instant messaging: video identification attack against complex protocols. Cybersecurity, 8(1):13, December 2025.
- Yaqi Yang, Jun'e Li, Tao Zhang, Lu Chen, Guirong Huang, Zhuo Lv. IRMAOC: an interpretable role mining algorithm based on overlapping clustering. Cybersecurity, 8(1):54, December 2025.
- Yucheng Ma, Peisong Shen, Xue Tian, Kewei Lv, Chi Chen 0001. Reusable and robust fuzzy extractor for CRS-dependent sources. Cybersecurity, 8(1):4, December 2025.
- Malte Kerl, Ulf Bodin, Olov Schelén. Privacy-preserving attribute-based access control using homomorphic encryption. Cybersecurity, 8(1):5, December 2025.
- Han Zhang, Yong Shi, Ming Liu, Libo Chen 0001, Songyang Wu, Zhi Xue. A combined feature selection approach for malicious email detection based on a comprehensive email dataset. Cybersecurity, 8(1):14, December 2025.
- Lin Wu, Yulai Xie, Jin Li, Dan Feng 0001, Jinyuan Liang, Yafeng Wu. Angus: efficient active learning strategies for provenance based intrusion detection. Cybersecurity, 8(1):6, December 2025.
- Hongfang Zhou, Heng Pan, Kangyun Zheng, Zongling Wu, Qingyu Xiang. A novel oversampling method based on Wasserstein CGAN for imbalanced classification. Cybersecurity, 8(1):7, December 2025.
- Jian Zheng, Shumiao Ren, Jingyue Zhang, Yu Kui, Jingyi Li, Qin Jiang, Shiyan Wang. Detection to false data for smart grid. Cybersecurity, 8(1):8, December 2025.
- Guangli Wu, Xingyue Wang. A privacy-enhanced framework with deep learning for botnet detection. Cybersecurity, 8(1):9, December 2025.