- Mahesh Patil, Shailaja C. Patil. A blended approach of static binary mining and exploratory data analysis to obtain the security posture of embedded systems firmware. IJICS, 26(1/2):1-21, 2025.
- Hussaini Aliyu Idris, Kazunori Ueda, Bassem Mokhtar, Samir A. Elsagheer Mohamed. NAIBI: a neighbour-vehicle approach for anomaly detection of basic safety message falsification in internet of vehicles using machine learning. IJICS, 27(1):68-92, 2025.
- Prajit Paul, Bappadittya Roy, Anup Kumar Bhattacharjee. SR-GBN-ARQ protocol using error correction code in fading network. IJICS, 27(1):93-126, 2025.
- Sudhir Kumar Pandey, Ditipriya Sinha. A novel hybrid approach for intrusion detection system using deep learning technique. IJICS, 27(3):405-422, 2025.
- Keshuo Sun, Haiying Gao, Chao Ma 0016, Bin Hu 0011, Xiufeng Zhao. HP-CP-ABE scheme against collusion attacks under an attribute-key security model. IJICS, 26(4):372-393, 2025.
- Muhammad Kashif Azhar, Bin Yao 0002, Muhammad Imran, Waqas Ali. GESKI: a gas efficient structure for processing spatial keyword queries with hybrid storage architecture. IJICS, 28(2):181-204, 2025.
- Pooja Gupta, Vijay Kumar Jain, Shrish Singh, Srabanti Maji, Shipra Agarwal. Leveraging AI for enhanced deepfake detection! Developing framework for designing safe ecosystem to safeguard digital authenticity. IJICS, 28(2):145-180, 2025.
- Xian Guo, Jianhua Ding. Self-sovereign identity scheme for decentralised vehicular named data networking. IJICS, 28(2):205-226, 2025.
- Vanlalhruaia Chhakchhuak, Ajoy Kumar Khan, Amit Kumar Roy. Common key multi-hop packet authentication protocol for wireless mesh networks. IJICS, 26(3):236-254, 2025.
- Sangita Baruah, Vaskar Deka. Performance comparison of feature selection algorithms in context of P2P botnet detection. IJICS, 27(3):379-404, 2025.