- Mathew Nicho, Brian Cusack, Christopher D. McDermott, Shini Girija. Assessing IoT intrusion detection computational costs when using a convolutional neural network. Information Systems Security, 34(5):471-491, September 2025.
- Aman Luthra, James Cavanaugh, Hugo Renzzo Olcese, Michael Raymond, Reina Eustache, Rina M. Hirsch, Xiang Fu 0001. Mitigating Ponzi schemes by zero-knowledge auditing. Information Systems Security, 34(2):167-190, March 2025.
- Meghana Solanki, Sangita Chaudhari. XDQEDCNN: Design of an efficient explainable model using Deep Q-Network and enhanced deep convolutional neural network for Distributed Denial-of-Service (DDoS) attack forensic analysis and investigation. Information Systems Security, 34(5):393-423, September 2025.
- Ennaji Elmahfoud, Salah El Hajla, Yassine Maleh, Soufyane Mounir, Karim Ouazzane. Label flipping attacks in hierarchical federated learning for intrusion detection in IoT. Information Systems Security, 34(4):310-326, July 2025.
- Martin Wilson, Sharon McDonald. One size does not fit all: exploring the cybersecurity perspectives and engagement preferences of UK-Based small businesses. Information Systems Security, 34(1):15-49, January 2025.
- Vikas Samarthrao Kadam, Subhash Pingale, Sangappa R. Biradar, Vandana Milind Rohokale, Kalyan Devappa Bamane. Designing a novel framework of email spam detection using an improved heuristic algorithm and dual-scale feature fusion-based adaptive convolution neural network. Information Systems Security, 34(4):286-309, July 2025.
- Daniel Ramalho, André Diegues Fernandes, Miguel Mira da Silva, Rúben Pereira 0001. Digital risk: a systematic multivocal literature review. Information Systems Security, 34(3):214-234, May 2025.
- K. Somasena Reddy, Pravin Mundhe. Review on cryptosystems-based authenticated key exchange techniques for IIoT. Information Systems Security, 34(5):492-516, September 2025.
- Yuki Nakamura, Tsukasa Fukuda, Xuanzhou Yang, Yoshiyasu Takefuji. SSHAA: A Python Package Index for visualizing features of SSH attacks with text mining in classification. Information Systems Security, 34(1):50-62, January 2025.
- Kalybek Maulenov, Saule Kudubayeva, Nazym Kaziyeva, Bakhtiyar Zharlykassov, Rakhila Turebayeva. Biometric access system with automatic registration and loyalty check in the system of recognition and database entry. Information Systems Security, 34(2):156-166, March 2025.