- Oscar Danilo Gavilánez Alvarez, Glen Dario Rodriguez Rafael. VoIP security auditing model based on COBIT 4.1. IJSN, 17(2):63-76, 2022.
- Meriem Kherbache, Kamal Amroun, David Espes. A new wrapper feature selection model for anomaly-based intrusion detection systems. IJSN, 17(2):107-123, 2022.
- Syed Rameez Rehman, Mudassar Waheed, Ammar Masood. Security-enhanced Android for an enterprise. IJSN, 17(2):92-106, 2022.
- Jun Yan, Yupan Tian, Hai Liu 0007, Zhenqiang Wu. Uncertain graph generating approach based on differential privacy for preserving link relationship of social networks. IJSN, 17(1):28-38, 2022.
- Mohammad H. Alshayeji, Sa'ed Abed. Enhanced video-on-demand security in cloud computing against insider and outsider threats. IJSN, 17(1):48-55, 2022.
- Saeed Salah, Mohammad A. AL-Shudeifat, Raid Zaghal. Desktop and mobile operating system fingerprinting based on IPv6 protocol using machine learning algorithms. IJSN, 17(1):1-12, 2022.
- Vinod Kumar Mahor, R. Padmavathy, Santanu Chatterjee. Chebyshev chaotic map-based efficient authentication scheme for secure access of VoIP services through SIP. IJSN, 17(1):39-47, 2022.
- Mingyue Qiu, Zhijie Bi. Police alarm address recognition and classification based on convolutional neural networks. IJSN, 17(1):56-62, 2022.
- Anmol Agnihotri, R. Padmavathi, Santanu Chatterjee, Vinod Kumar Mahor. Privacy in content-centric networking against side channel attacks. IJSN, 17(1):13-27, 2022.
- Wilson S. Melo Jr., Lucas S. dos Santos, Lucila M. S. Bento, Paulo R. M. Nascimento, Carlos A. R. Oliveira, Ramon R. Rezende. Using blockchains to protect critical infrastructures: a comparison between Ethereum and Hyperledger Fabric. IJSN, 17(2):77-91, 2022.