- Aman Luthra, James Cavanaugh, Hugo Renzzo Olcese, Michael Raymond, Reina Eustache, Rina M. Hirsch, Xiang Fu 0001. Mitigating Ponzi schemes by zero-knowledge auditing. Information Systems Security, 34(2):167-190, March 2025.
- Ennaji Elmahfoud, Salah El Hajla, Yassine Maleh, Soufyane Mounir, Karim Ouazzane. Label flipping attacks in hierarchical federated learning for intrusion detection in IoT. Information Systems Security, 34(4):310-326, July 2025.
- Martin Wilson, Sharon McDonald. One size does not fit all: exploring the cybersecurity perspectives and engagement preferences of UK-Based small businesses. Information Systems Security, 34(1):15-49, January 2025.
- Vikas Samarthrao Kadam, Subhash Pingale, Sangappa R. Biradar, Vandana Milind Rohokale, Kalyan Devappa Bamane. Designing a novel framework of email spam detection using an improved heuristic algorithm and dual-scale feature fusion-based adaptive convolution neural network. Information Systems Security, 34(4):286-309, July 2025.
- Daniel Ramalho, André Diegues Fernandes, Miguel Mira da Silva, Rúben Pereira 0001. Digital risk: a systematic multivocal literature review. Information Systems Security, 34(3):214-234, May 2025.
- Yuki Nakamura, Tsukasa Fukuda, Xuanzhou Yang, Yoshiyasu Takefuji. SSHAA: A Python Package Index for visualizing features of SSH attacks with text mining in classification. Information Systems Security, 34(1):50-62, January 2025.
- Kalybek Maulenov, Saule Kudubayeva, Nazym Kaziyeva, Bakhtiyar Zharlykassov, Rakhila Turebayeva. Biometric access system with automatic registration and loyalty check in the system of recognition and database entry. Information Systems Security, 34(2):156-166, March 2025.
- Heather Holden, Victor Munro, Lina Tsakiris, Alex Wilner. "The pull to do nothing would be strong": limitations & opportunities in reporting insider threats. Information Systems Security, 34(1):63-78, January 2025.
- Mohamed Haddadi, Abdelhamid Khiat, Hadil Bouaoud, Hadjer Djehiche. SPGDAD: Slow HTTP-Get denial of service attack detection using ontology. Information Systems Security, 34(1):79-87, January 2025.
- N. G. Nageswari Amma, T. Jayaraj, N. G. Bhuvaneswari Amma. Towards improving the security of wireless networks using secured session keys. Information Systems Security, 34(1):1-14, January 2025.