- Mahesh Patil, Shailaja C. Patil. A blended approach of static binary mining and exploratory data analysis to obtain the security posture of embedded systems firmware. IJICS, 26(1/2):1-21, 2025.
- Vanlalhruaia Chhakchhuak, Ajoy Kumar Khan, Amit Kumar Roy. Common key multi-hop packet authentication protocol for wireless mesh networks. IJICS, 26(3):236-254, 2025.
- Sandeep Kumar, Ritu Garg. A collision proof energy efficient lightweight hybrid cryptosystem for fog. IJICS, 26(3):179-203, 2025.
- R. Geetha, G. Belshia Jebamalar, B. G. Darshan Vignesh, E. Kamalanaban, Srinath Doss. An efficient cyberbullying detection framework on social media platforms using a hybrid deep learning model. IJICS, 26(3):255-271, 2025.
- Umesh Kumar, V. Ch. Venkaiah. An efficient block cipher based on multiple optimal quasigroups. IJICS, 26(3):204-235, 2025.
- Xian Guo, Kai Zheng, Yongbo Jiang, Jing Wang, Junli Fang 0001. Security-enhanced machine learning framework based on PATE. IJICS, 26(1/2):109-146, 2025.
- Junjing Zhu, HongGang Lin. Method for botnet detection with small labelled samples based on graph neural network. IJICS, 26(1/2):91-108, 2025.
- Orkhan Valikhanli. Detection of malware in ground control stations of unmanned aerial vehicles based on image processing. IJICS, 26(1/2):147-158, 2025.
- Miao He, Nurmamat Helil. A lattice-based CP-ABE scheme with immediate attribute revocation. IJICS, 26(1/2):41-67, 2025.
- Moumita Sahoo, Sabyasachi Samanta, Soumen Ghosh. An ensemble classification model for improved performance of phishing detection system. IJICS, 26(1/2):68-90, 2025.