- Mahesh Patil, Shailaja C. Patil. A blended approach of static binary mining and exploratory data analysis to obtain the security posture of embedded systems firmware. IJICS, 26(1/2):1-21, 2025.
- Hussaini Aliyu Idris, Kazunori Ueda, Bassem Mokhtar, Samir A. Elsagheer Mohamed. NAIBI: a neighbour-vehicle approach for anomaly detection of basic safety message falsification in internet of vehicles using machine learning. IJICS, 27(1):68-92, 2025.
- Prajit Paul, Bappadittya Roy, Anup Kumar Bhattacharjee. SR-GBN-ARQ protocol using error correction code in fading network. IJICS, 27(1):93-126, 2025.
- Keshuo Sun, Haiying Gao, Chao Ma 0016, Bin Hu 0011, Xiufeng Zhao. HP-CP-ABE scheme against collusion attacks under an attribute-key security model. IJICS, 26(4):372-393, 2025.
- Vanlalhruaia Chhakchhuak, Ajoy Kumar Khan, Amit Kumar Roy. Common key multi-hop packet authentication protocol for wireless mesh networks. IJICS, 26(3):236-254, 2025.
- Sandeep Kumar, Ritu Garg. A collision proof energy efficient lightweight hybrid cryptosystem for fog. IJICS, 26(3):179-203, 2025.
- R. Anitha, Dinesh Rai. Blockchain-based dynamic social spider optimisation network optimisation for supply chain in IoT. IJICS, 27(1):36-67, 2025.
- R. Geetha, G. Belshia Jebamalar, B. G. Darshan Vignesh, E. Kamalanaban, Srinath Doss. An efficient cyberbullying detection framework on social media platforms using a hybrid deep learning model. IJICS, 26(3):255-271, 2025.
- Shankar M. Patil, Sonali N. Mhatre, Bhawana Dakhare, Gurunath T. Chavan. Prevention of cyber attacks and real-time social media spam detection and sentiment analysis using recurrent self-adaptive windowing approach. IJICS, 27(2):261-284, 2025.
- Vinay Kumar, Abhishek Vaish. Optimising the detection of metamorphic malwares using ensemble learning technique. IJICS, 26(4):316-331, 2025.