- Leonhard Ziegler, Michael Grabatin, Daniela Pöhn, Wolfgang Hommel. Designing a security incident response process for self-sovereign identities. EURASIP J. Information Security, 2025(1):12, December 2025.
- Jiangang Wang, Xiaoyan Wang. An optimization model of computer network security based on GABP neural network algorithm. EURASIP J. Information Security, 2025(1):14, December 2025.
- Osvaldo Arreche, Mustafa Abdallah. A comparative analysis of DNN-based white-box explainable AI methods in network security. EURASIP J. Information Security, 2025(1):16, December 2025.
- Da Teng, Yanqing Yao, Chao Huang 0012. Optimizing signature space performance in privacy-enhanced blockchains: novel ring signature solutions. EURASIP J. Information Security, 2025(1):6, December 2025.
- Yehia Ibrahim Alzoubi, Alok Mishra 0001. Differential privacy and artificial intelligence: potentials, challenges, and future avenues. EURASIP J. Information Security, 2025(1):18, December 2025.
- Sara Lazzaro, Vincenzo De Angelis, Francesco Buccafurri. Hiding identities of MQTT devices against a global network adversary. EURASIP J. Information Security, 2025(1):8, December 2025.
- Osman Abul, Melike Burakgazi Bilgen. Jointly Achieving Smart Homes Security and Privacy through Bidirectional Trust. EURASIP J. Information Security, 2025(1):17, December 2025.
- Zahra Ebadi Ansaroudi, Giada Sciarretta, Andrea De Maria, Silvio Ranise. Navigating secure storage requirements for EUDI Wallets: a review paper. EURASIP J. Information Security, 2025(1):2, December 2025.
- Akashdeep Bhardwaj, Salil Bharany, Ateeq Ur Rehman 0002, Ghanshyam G. Tejani, Seada Hussen. Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation. EURASIP J. Information Security, 2025(1):1, December 2025.
- Qiushi Li, Shenghai Luo, Shunquan Tan, Zhenjun Li. SEAP: squeeze-and-excitation attention guided pruning for lightweight steganalysis networks. EURASIP J. Information Security, 2025(1):24, December 2025.