- Devender Kumar, Satish Chand, Bijendra Kumar. A secure three-factor authentication protocol for mobile networks. IJICS, 23(2):119-138, 2024.
- Jianhua Liu, Huijie Ma. The optimisation of enterprise internet of things security management system under digital economy. IJICS, 24(1/2):44-59, 2024.
- Yongling Zhang, Xuandong Zhang, Jinlong Song. Enterprise intelligent financial sharing mechanism in the security environment of the internet of things. IJICS, 24(1/2):80-97, 2024.
- Jing Zhang, Yufei Zhao, Jiawei Zhang, Lin Guo, Xiaoqin Zhang. Feature-driven intrusion detection method based on improved CNN and LSTM. IJICS, 25(1/2):1-17, 2024.
- Rubia Fatima, Affan Yasin, Lin Liu 0001, Jianmin Wang 0001. Re-evaluation of PhishI game and its utilisation in eliciting security requirements. IJICS, 23(3):294-321, 2024.
- Lenin Narengbam, Shouvik Dey. Anomaly-based intrusion detection system using Harris Hawks optimisation with a sigmoid neuron network. IJICS, 24(1/2):5-27, 2024.
- Joon Son, Essia Hamouda, Garo Pannosian, Vijay Bhuse. Data dissemination and policy enforcement in multi-level secure multi-domain environments. IJICS, 24(3/4):338-360, 2024.
- Sahil Gupta, Naresh Kumar Garg. Adaptive highly secure and imperceptible video steganography for medical images via deep convolutional neural network. IJICS, 25(1/2):78-95, 2024.
- Jaimandeep Singh, Naveen Kumar Chaudhary. Unified singular protocol flow for OAuth ecosystem. IJICS, 25(1/2):53-77, 2024.
- Zexi Li, Kefan Cheng, Yan Sun, Hongfeng Zhu. Efficient multi-party quantum key agreement protocol based on new bell state encoding mode. IJICS, 25(1/2):18-30, 2024.