- M. Kokila, Srinivasa Reddy Konda. Authentication, access control and scalability models in Internet of Things Security-A review. Cyber Secur. Appl., 3:100057, 2025.
- Ankit Kumar Jain, Nishant Gupta, Brij B. Gupta. A survey on scalable consensus algorithms for blockchain technology. Cyber Secur. Appl., 3:100065, 2025.
- Chithanya K. V. K, V. Lokeswara Reddy. Automatic intrusion detection model with secure data storage on cloud using adaptive cyclic shift transposition with enhanced ANFIS classifier. Cyber Secur. Appl., 3:100073, 2025.
- Mahjabeen Tahir, Azizol Abdullah, Nur Izura Udzir, Khairul Azhar Kasmiran. A novel approach for handling missing data to enhance network intrusion detection system. Cyber Secur. Appl., 3:100063, 2025.
- Jibrilla Abubakar Tanimu, Wafia Abada. Addressing cybersecurity challenges in robotics: A comprehensive overview. Cyber Secur. Appl., 3:100074, 2025.
- Rasmita Panigrahi, Neelamadhab Padhy. An effective steganographic technique for hiding the image data using the LSB technique. Cyber Secur. Appl., 3:100069, 2025.
- Vijay Dahiphale, Hrishikesh Raut, Gaurav Bansod, Devendra Dahiphale. Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers. Cyber Secur. Appl., 3:100055, 2025.
- Tinashe Magara, Yousheng Zhou. EMAKAS: An efficient three-factor mutual authentication and key-agreement scheme for IoT environment. Cyber Secur. Appl., 3:100066, 2025.
- Muthukumar Manickam, Ganesh Gopal Devarajan. An improved three factor authentication protocol for wireless body area networks. Cyber Secur. Appl., 3:100062, 2025.
- Adel Alqudhaibi, Majed Albarrak, Sandeep Jagtap, Nikki Williams, Konstantinos Salonitis. Securing industry 4.0: Assessing cybersecurity challenges and proposing strategies for manufacturing management. Cyber Secur. Appl., 3:100067, 2025.