- Xueqi Zhu, Fangzhou Liu, Yan Jia, Jun Xu, Peng Wang 0009. Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method. Cybersecurity, 8(1):3, December 2025.
- Xiaogang Xing, Ming Xu 0001, Yujing Bai, Dongdong Yang. A graph backdoor detection method for data collection scenarios. Cybersecurity, 8(1):1, December 2025.
- Laura Quiroga-Sánchez, Germán Adolfo Montoya, Carlos Andres Lozano-Garzon. The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks. Cybersecurity, 8(1):2, December 2025.
- Chenxi Hu, Tao Wu 0011, Chunsheng Liu, Chao Chang. Joint contrastive learning and belief rule base for named entity recognition in cybersecurity. Cybersecurity, 7(1):19, December 2024.
- Xi Lin, Heyang Cao, Feng-Hao Liu, Zhedong Wang, Mingsheng Wang. Shorter ZK-SNARKs from square span programs over ideal lattices. Cybersecurity, 7(1):33, December 2024.
- Yanjun Li, Weiguo Zhang, Yiping Lin, Jian Zou, Jian Liu. A circuit area optimization of MK-3 S-box. Cybersecurity, 7(1):17, December 2024.
- Fengxia Liu, Zhiyong Zheng, Zixian Gong, Kun Tian, Yi Zhang, Zhe Hu, Jia Li, Qun Xu. A survey on lattice-based digital signature. Cybersecurity, 7(1):7, December 2024.
- Zhongxu Yin, Yiran Song, Guoxiao Zong. Discovering API usage specifications for security detection using two-stage code mining. Cybersecurity, 7(1):30, December 2024.
- Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon. Optimum noise mechanism for differentially private queries in discrete finite sets. Cybersecurity, 7(1):54, December 2024.
- Ruida Wang, Ziyi Li, Xianhui Lu, Zhenfei Zhang, Kunpeng Wang. Key derivable signature and its application in blockchain stealth address. Cybersecurity, 7(1):43, December 2024.