- Abdulhakim Sabur, Ahmad Showail. Nudging Data Privacy of Mobile Health Applications in Saudi Arabia. IJISP, 18:1-19, 2024.
- Lijun Gu, Zhongye Wang. A Multi-Scale Feature Extraction Method Based on Improved Transformer for Intrusion Detection. IJISP, 18:1-20, 2024.
- Zhiqiang Wu, Shuhui Wan. An Image Steganalysis Algorithm Based on Multi-Resolution Feature Fusion. IJISP, 18:1-19, 2024.
- Alimire Maimaiti Tuxun, Qingrui Guo. A Network Security Transmission Model Based on Improved Sparrow Search Algorithm. IJISP, 18:1-17, 2024.
- Yancho Basil Wiryen, Auguste Vigny Noumsi, Joseph Mvogo Ngono, Louis Aimé Fono. Leveraging TenSEAL: A Comparative Study of BFV and CKKS Schemes for Training ML Models on Encrypted IoT Data. IJISP, 18:1-17, 2024.
- Yaping Zhang. A Multi-Scale Temporal Feature Extraction Approach for Network Traffic Anomaly Detection. IJISP, 18:1-20, 2024.
- Rafael Martínez-Peláez, Pablo Velarde-Alvarado, Vanessa G. Felix, Alberto M. Ochoa-Brust, Rodolfo Ostos, Luis J. Mena. Assessing Employee Susceptibility to Cybersecurity Risks. IJISP, 18:1-25, 2024.
- Zhiwei Cao, Zhijie Fan, Boan Chen, Zidong Cheng, Shijun Xu, Xin Li. Improved Message Mechanism-Based Cross-Domain Security Control Model in Mobile Terminals. IJISP, 18:1-27, 2024.
- Fares Alharbi, Gautam Siddharth Kashyap, Budoor Ahmad Allehyani. Automated Ruleset Generation for "HTTPS Everywhere": Challenges, Implementation, and Insights. IJISP, 18:1-14, 2024.
- Yuan Tian, Wendong Wang, Jingyuan He. An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training. IJISP, 18:1-28, 2024.