- Miloslava Plachkinova. Data Privacy Regulations in the Gaming Industry: A Comparative Analysis of Singapore, Macau, and Japan. IJISP, 19(1):1-12, 2025.
- Krishna Kishore Thota, R. Jeberson Retna Raj. Minimal DFA With Optimization of Pattern Matching (MDFAOPM) for Network Traffic Analysis and Attacks. IJISP, 19(1):1-24, 2025.
- Mahdi Ajdani. Deep Learning-Based Intrusion Detection Systems: A Novel Approach Using Generative Adversarial Networks (GANs). IJISP, 19(1):1-15, 2025.
- John Kennedy Otieno Odego, Kennedy Odhiambo Ogada, Dennis Mugambi Kaburu. An Ontology-Based Approach for Zero-Day Information Security Threat Management. IJISP, 19(1):1-21, 2025.
- Zihan Zhou. Distributed WSN Vulnerability Remediation System Based on Mobile-N Policy. IJISP, 19(1):1-25, 2025.
- Tieguang Xu. Ethical Boundary Between Network Security and Personal Privacy in the Era of Big Data. IJISP, 19(1):1-18, 2025.
- Kai Gao, Shanji Yao, Yongmei Wang, Sihan Lyu. Privacy Disclosure on Electronic Commerce: The Role of Algorithmic Transparency, Algorithmic Invasion, and Trust. IJISP, 19(1):1-29, 2025.
- Xiaokang Dai, Haoyong Wang, Wenyuan Wu, Yong Feng. Leveled Homomorphic Encryption Based on NTRU Without Re-Linearization. IJISP, 19(1):1-20, 2025.
- Yuchi Yan. Research on Optimization of Facial Expression Recognition Algorithm Based on Convolutional Neural Network and Support Vector Machine. IJISP, 19(1):1-17, 2025.
- Ahmed Mesellem, Mohammed Mana. A Low Overhead, Fault-Tolerant, and Congestion-Aware Routing Algorithm Based on Bird Flocking Behavior for 3D-NoC Mesh. IJISP, 19(1):1-23, 2025.