- Xueqi Zhu, Fangzhou Liu, Yan Jia, Jun Xu, Peng Wang 0009. Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method. Cybersecurity, 8(1):3, December 2025.
- Jiachen Zhang, Daoqi Han, Zhaoxuan Lv, Yueming Lu, Junke Duan, Yang Liu, Xinyu Zhang. Bag2image: a multi-instance network traffic representation for network security event prediction. Cybersecurity, 8(1):31, December 2025.
- Yuan Zhang, Jiaru Song, Yongxiong Sun, Zhanheng Gao, Zhe Hu, Minghui Sun. Federated two-stage transformer-based network for intrusion detection in non-IID data of controller area networks. Cybersecurity, 8(1):29, December 2025.
- Ruiqi Huang, Hua Wu 0004, Xiaohui Wang, Guang Cheng 0001, Xiaoyan Hu. The secret behind instant messaging: video identification attack against complex protocols. Cybersecurity, 8(1):13, December 2025.
- Yaqi Yang, Jun'e Li, Tao Zhang, Lu Chen, Guirong Huang, Zhuo Lv. IRMAOC: an interpretable role mining algorithm based on overlapping clustering. Cybersecurity, 8(1):54, December 2025.
- Ying Gao 0006, Lin Qi. Upper bounds of differential branch number of n-bit permutations. Cybersecurity, 8(1):58, December 2025.
- Mengmeng Ge, Ruitao Feng, Likun Liu, Xiangzhan Yu, Vinay Sachidananda, Xie Xiaofei, Yang Liu 0003. Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic. Cybersecurity, 8(1):26, December 2025.
- Yucheng Ma, Peisong Shen, Xue Tian, Kewei Lv, Chi Chen 0001. Reusable and robust fuzzy extractor for CRS-dependent sources. Cybersecurity, 8(1):4, December 2025.
- Weixuan Tang, Yuan Rao, Zuopeng Yang, Fei Peng 0001, Xutong Cui, Junhao Huang, Peijun Zhu. Reversible generative steganography with distribution-preserving. Cybersecurity, 8(1):18, December 2025.
- Malte Kerl, Ulf Bodin, Olov Schelén. Privacy-preserving attribute-based access control using homomorphic encryption. Cybersecurity, 8(1):5, December 2025.