- Nan Zhang, Baodong Qin, Dong Zheng 0001. Cryptanalysis of Keyword Confidentiality in a Searchable Public-Key Encryption Scheme Against Malicious Server. IET Information Security, 2025(1), 2025.
- Naol Bakala Defersha, Kula Kekeba Tune, Solomon Teferra Abate. Topic Words-Based Multilingual Hateful Linguistic Resources Construction for Developing Multilingual Hateful Content Detection Model Using Deep Learning Technique. IET Information Security, 2025(1), 2025.
- Fujun Qiu, Ashwini Kumar, Jiang Hu, Poorva Sharma, Yu Bing Tang, Yang Xu Xiang, Jie Hong. A Review on Integrating IoT, IIoT, and Industry 4.0: A Pathway to Smart Manufacturing and Digital Transformation. IET Information Security, 2025(1), 2025.
- Sungjin Lim, Junhyoung Oh. Navigating Privacy: A Global Comparative Analysis of Data Protection Laws. IET Information Security, 2025(1), 2025.
- Yang Bai, Yutang Rao, Hongyan Wu, Juan Wang, Wentao Yang, Gaojie Xing, Jiawei Yang, Xiaoshu Yuan. Using Homomorphic Proxy Re-Encryption to Enhance Security and Privacy of Federated Learning-Based Intelligent Connected Vehicles. IET Information Security, 2025(1), 2025.
- Qiuyu Lu, Jun'e Li, Zhao Peng, Ming Ni. Cyber-Physical-Social Security of High-DER-Penetrated Smart Grids: Threats, Countermeasures, and Challenges. IET Information Security, 2025(1), 2025.
- Suman Bhunia, Matthew Blackert, Henry Deal, Andrew Depero, Amar Nath Patra. Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability. IET Information Security, 2025(1), 2025.
- Wen-Bin Hsieh. BF-ACS - Intelligent and Immutable Face Recognition Access Control System. IET Information Security, 2025(1), 2025.
- Yanhong Fan 0001, Chaoran Wang, Lixuan Wu, Meiqin Wang. A Fast Search Method for 3-Share Second-Order Masking Schemes for Lightweight S-Boxes. IET Information Security, 2025(1), 2025.
- Jian Shu, Jiazhong Lu. Two-Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things. IET Information Security, 2025(1), 2025.