- Roland Robert Schreiber. Organizational Influence on Security Development in Open-Source Software Projects. Int. J. Syst. Softw. Secur. Prot., 15(1):1-20, 2024.
- Bello Alhaji Buhari, Afolayan Ayodele Obiniyi, Sahalu B. Junaidu, Armand Florentin Donfack Kana. A Light Weight Temper Resistance Client File in an External Memory for Remote User Authentication and Access Control. Int. J. Syst. Softw. Secur. Prot., 14(1):1-21, 2023.
- Chaima Boulifi, Mouna Jouini. Towards a New Quantitative Availability Model for Computer Systems Based on Classifications of Security Requirements. Int. J. Syst. Softw. Secur. Prot., 13(1):1-20, 2022.
- Madhuri Gedam, Bandu Baburao Meshram. Proposed Secure 3-Use Case Diagram. Int. J. Syst. Softw. Secur. Prot., 13(1):1-18, 2022.
- Mihir Mehta, Kajal Patel. A Survey on IoT Authentication Security Service: Open Issues, Security Threats, and Future Solution Direction. Int. J. Syst. Softw. Secur. Prot., 13(1):1-13, 2022.
- Festus Elleh. Cyber Security and COVID-19: Understanding Cyber Predators and Vulnerabilities for Teenagers. Int. J. Syst. Softw. Secur. Prot., 13(1):1-14, 2022.
- Christophe Feltus. Learning Algorithm Recommendation Framework for IS and CPS Security: Analysis of the RNN, LSTM, and GRU Contributions. Int. J. Syst. Softw. Secur. Prot., 13(1):1-23, 2022.
- Enka Blanchard. Client-Side Hashing for Efficient Typo-Tolerant Password Checkers. Int. J. Syst. Softw. Secur. Prot., 13(1):1-24, 2022.
- Jianping Peng, Guoying Zhang, Chun-Hung Chiu. An Empirical Investigation on Vulnerability for Software Companies. Int. J. Syst. Softw. Secur. Prot., 13(1):1-15, 2022.
- Tsutomu Koshiyama, Sei Takahashi. Six-Assurance Case Patterns by Strengthening/Weakening Argument. Int. J. Syst. Softw. Secur. Prot., 12(1):21-45, 2021.