- Tobias Reittinger, Johannes Grill, Günther Pernul. Share and benefit: incentives for cyber threat intelligence sharing. Int. J. Inf. Sec., 25(1):37, February 2026.
- Salheddine Kabou, Laid Gasmi, Abdelbaset Kabou. BuKc: A novel bottom-up approach for enhanced data anonymization in apache spark. Int. J. Inf. Sec., 25(1):22, February 2026.
- Ahmad B. Usman, Zeeshan Afzal 0001, Mikael Asplund. Bridging remote attestation and secure software updates in embedded systems. Int. J. Inf. Sec., 25(2):75, April 2026.
- Clara Bertolissi, Alba Martinez Anton, Nicola Zannone. Fine-grained access control for multi-user data in cooperative systems: managing compound objects and temporal constraints. Int. J. Inf. Sec., 25(2):55, April 2026.
- Martin Leo, Freedy Tan Wei You, Tianqi Miao, Guru Anand. From threat to trust: assessing security risks of agentic AI systems. Int. J. Inf. Sec., 25(1):23, February 2026.
- Chen Li, Fangguo Zhang. Designated-verifier zk-SNARKs made easy. Int. J. Inf. Sec., 25(1):20, February 2026.
- Simone Bozzolan, Stefano Calzavara, Davide Porcu. Cookie Baker: gray-box login automation for web application security testing. Int. J. Inf. Sec., 25(1):6, February 2026.
- Arslan Tariq Syed, Mohamed Chahine Ghanem, Elhadj Benkhalifa, Fauzia Idrees Abro. SPECTRE: a hybrid and adaptive cyber threats detection and response in volatile memory. Int. J. Inf. Sec., 25(2):52, February 2026.
- Artsiom Yautsiukhin, Natallia Kavalionak. A bonus and penalty mechanism as an incentive for cybersecurity investments. Int. J. Inf. Sec., 25(2):47, February 2026.
- Jinrong Kong, Guojun Wang, Mingfei Chen, Wanyi Gu, Yuheng Zhang, Zhuoyi Wu. IFDroid: Enhancing Android Malware Detection Resilience Against Concept Drift Through API Sequence Intrinsic Features. Int. J. Inf. Sec., 25(1):3, February 2026.