- G. Prabu Kanna, V. Vasudevan. An improved privacy aware secure multi-cloud model with proliferate ElGamal encryption for big data storage. IJICS, 17(1/2):1-20, 2022.
- Hongfeng Zhu, Xintong Wang, Yeh-Cheng Chen, Xueying Wang. Security analysis and improvements of a universal construction for a round-optimal password authenticated key exchange protocol. IJICS, 17(1/2):104-118, 2022.
- Toni Grzinic, Eduardo Blázquez González. Methods for automatic malware analysis and classification: a survey. IJICS, 17(1/2):179-203, 2022.
- Yavar Safaei Mehrabani, Roghayeh Ataie, Mohammad Hossein Shafiabadi, Abolghasem Ghasempour. Design and implementation of an ASIP for SHA-3 hash algorithm. IJICS, 17(3/4):285-309, 2022.
- Ahmad Azab. The effectiveness of cost sensitive machine learning algorithms in classifying Zeus flows. IJICS, 17(3/4):332-350, 2022.
- Youssef Taouil, El Bachir Ameur, Amine Benhfid, Rachid Harba, Hassan Douzi. Adaptive steganographic scheme using a variable matrix embedding. IJICS, 17(3/4):231-260, 2022.
- Gang Ke, Ruey-Shun Chen, Yeh-Cheng Chen, Yu-Xi Hu, Tsu-Yang Wu. Simple multi-scale human abnormal behaviour detection based on video. IJICS, 17(3/4):310-320, 2022.
- B. Yamini, R. Sabitha. Image steganalysis: real-time adaptive colour image segmentation for hidden message retrieval and Matthew's correlation coefficient calculation. IJICS, 17(1/2):83-103, 2022.
- Mohammed Riyadh Abdmeziem. Securing IoT-based collaborative applications using a new compressed and distributed MIKEY mode. IJICS, 17(1/2):36-56, 2022.
- Jiwoong Kang, Jaehyun Park 0003. SoC-based abnormal ethernet packet detector with automatic rule-set generator. IJICS, 17(3/4):219-230, 2022.