- Othmane Nait Hamoud, Tayeb Kenaza, Yacine Challal, Lina Ben-Abdelatif, Maroua Ouaked. Implementing a secure remote patient monitoring system. Information Systems Security, 32(1):21-38, January 2023.
- A. Hadj Brahim, Adda Ali-Pacha, Naima Hadj-Said. A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes. Information Systems Security, 32(2):59-75, March 2023.
- Elmarie Kritzinger, Adéle da Veiga, Wynand van Staden. Measuring organizational information security awareness in South Africa. Information Systems Security, 32(2):120-133, March 2023.
- Deepali Bankatsingh Gothawal, S. V. Nagaraj. An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata model. Information Systems Security, 32(1):1-20, January 2023.
- Dhruti Sharma. Searchable encryption : A survey. Information Systems Security, 32(2):76-119, March 2023.
- Lampis Alevizos, Eliana Stavrou. Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS). Information Systems Security, 32(2):134-161, March 2023.
- Faozi A. Almaqtari, Najib H. S. Farhan, Ali T. Yahya, Borhan Omar Ahmad Al-Dalaien, Mohd Shamim. The mediating effect of IT governance between corporate governance mechanisms, business continuity, and transparency & disclosure: An empirical study of Covid-19 Pandemic in Jordan. Information Systems Security, 32(1):39-57, January 2023.
- Yee Jian Chew, Nicholas Lee, Shih Yin Ooi, Kok Seng Wong, Ying-Han Pang. Benchmarking full version of GureKDDCup, UNSW-NB15, and CIDDS-001 NIDS datasets using rolling-origin resampling. Information Systems Security, 31(5):544-565, 2022.
- Umar Hussain Mir, Deep Singh, Parveiz Nazir Lone. Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain. Information Systems Security, 31(1):49-63, 2022.
- Mohammad Pishdar, Younes Seifi, Mohammad Nasiri, Mozafar Bag Mohammadi. PCC-RPL: An efficient trust-based security extension for RPL. Information Systems Security, 31(2):168-178, 2022.