- Christos Lyvas, Christoforos Ntantogian, Christos Xenakis. [m]allotROPism: a metamorphic engine for malicious software variation development. Int. J. Inf. Sec., 21(1):61-78, 2022.
- Metehan Yildirim, Emin Anarim. Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis. Int. J. Inf. Sec., 21(2):239-251, 2022.
- Zheng Zhang, Shaohao Xie, Fangguo Zhang. Topology-hiding garbled circuits without universal circuits. Int. J. Inf. Sec., 21(2):341-356, 2022.
- Hee-Yeon Kim, Ji-Hoon Kim, Ho Kyun Oh, Beom-Jin Lee, Si Woo Mun, Jeong-Hoon Shin, Kyounggon Kim. DAPP: automatic detection and analysis of prototype pollution vulnerability in Node.js modules. Int. J. Inf. Sec., 21(1):1-23, 2022.
- Zach Parish, Connor Cushing, Shourya Aggarwal, Amirali Salehi-Abari, Julie Thorpe. Password guessers under a microscope: an in-depth analysis to inform deployments. Int. J. Inf. Sec., 21(2):409-425, 2022.
- Tahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone. Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system. Int. J. Inf. Sec., 21(2):379-408, 2022.
- Ioannis Kazoleas, Panagiotis Karampelas. A novel malicious remote administration tool using stealth and self-defense techniques. Int. J. Inf. Sec., 21(2):357-378, 2022.
- Hector B. Hougaard, Atsuko Miyaji. Authenticated logarithmic-order supersingular isogeny group key exchange. Int. J. Inf. Sec., 21(2):207-221, 2022.
- George Stergiopoulos, Panagiotis Dedousis, Dimitris Gritzalis. Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0. Int. J. Inf. Sec., 21(1):37-59, 2022.
- Alexander Bajic, Georg T. Becker. Automated benchmark network diversification for realistic attack simulation with application to moving target defense. Int. J. Inf. Sec., 21(2):253-278, 2022.