- Norah Alqahtani, Mohammed Almukaynizi. VulnScore: A deployed system for patch prioritization combining human input and temporal threat intelligence. Int. J. Inf. Sec., 25(1):2, February 2026.
- Pawel Rajba, Jörg Keller 0001, Wojciech Mazurczyk. Randomization of message contents with and without encryption for covert communication scenarios. Int. J. Inf. Sec., 25(1):1, February 2026.
- Kashif Junaid, Muhammad Umar Janjua. Analyzing shared keys in X.509 certificates with domain ownership. Int. J. Inf. Sec., 24(3):106, June 2025.
- Faris A. Almalki, A. Rajaram. Optimizing gas efficiency and enhancing security in Ethereum smart contracts through integrated clustering and anomaly detection. Int. J. Inf. Sec., 24(3):145, June 2025.
- Rohitkumar R. Upadhyay, Sahadeo Padhye. A Non-Interactive and Secure Dynamic Multi-Party FHE Scheme. Int. J. Inf. Sec., 24(5):201, October 2025.
- Yaman Roumani. Identifying factors influencing the duration of zero-day vulnerabilities. Int. J. Inf. Sec., 24(3):133, June 2025.
- Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti. USB-GATE: USB-based GAN-augmented transformer reinforced defense framework for adversarial keystroke injection attacks. Int. J. Inf. Sec., 24(2):79, April 2025.
- Nguyen Ngoc Phien, Phat T. Tran Truong, Ha Xuan Son, Vo H. Khanh, Triet M. Nguyen, Luong H. Huong, Bang K. Le, Ngan Nguyen T. K.. CI2P-MedHFDroid: a context-aware individual privacy preferences model for medical, health & fitness android apps. Int. J. Inf. Sec., 24(4):176, August 2025.
- Ricardo Reyes-Acosta, Carlos Alberto Domínguez-Báez, Ricardo Mendoza González, Miguel Vargas Martin. Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review. Int. J. Inf. Sec., 24(1):31, February 2025.
- Vicenç Torra. Differentially private Choquet integral: extending mean, median, and order statistics. Int. J. Inf. Sec., 24(1):68, February 2025.