- Kashif Junaid, Muhammad Umar Janjua. Analyzing shared keys in X.509 certificates with domain ownership. Int. J. Inf. Sec., 24(3):106, June 2025.
- Faris A. Almalki, A. Rajaram. Optimizing gas efficiency and enhancing security in Ethereum smart contracts through integrated clustering and anomaly detection. Int. J. Inf. Sec., 24(3):145, June 2025.
- Yaman Roumani. Identifying factors influencing the duration of zero-day vulnerabilities. Int. J. Inf. Sec., 24(3):133, June 2025.
- Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti. USB-GATE: USB-based GAN-augmented transformer reinforced defense framework for adversarial keystroke injection attacks. Int. J. Inf. Sec., 24(2):79, April 2025.
- Nguyen Ngoc Phien, Phat T. Tran Truong, Ha Xuan Son, Vo H. Khanh, Triet M. Nguyen, Luong H. Huong, Bang K. Le, Ngan Nguyen T. K.. CI2P-MedHFDroid: a context-aware individual privacy preferences model for medical, health & fitness android apps. Int. J. Inf. Sec., 24(4):176, August 2025.
- Ricardo Reyes-Acosta, Carlos Alberto Domínguez-Báez, Ricardo Mendoza González, Miguel Vargas Martin. Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review. Int. J. Inf. Sec., 24(1):31, February 2025.
- Vicenç Torra. Differentially private Choquet integral: extending mean, median, and order statistics. Int. J. Inf. Sec., 24(1):68, February 2025.
- K. Kamatchi, E. Uma. Insights into user behavioral-based insider threat detection: systematic review. Int. J. Inf. Sec., 24(2):88, April 2025.
- Roberto Gesteira-Miñarro, Gregorio López, Rafael Palacios. Clonable key fobs: Analyzing and breaking RKE protocols. Int. J. Inf. Sec., 24(3):150, June 2025.
- Renan C. A. Alves, Bruno C. Albertini, Marcos A. Simplício Jr.. Benchmarking the security protocol and data model (SPDM) for component authentication. Int. J. Inf. Sec., 24(3):126, June 2025.