- Edison Prabhu. K, Godlin Debby K. J. Prediction of ddos attack by hierarchical attention- based bigru classifier. Information Systems Security, 35(2):308-329, March 2026.
- Mohammed Waseem Ahmed, G. Kavitha. Implementing an intelligent learning-based algorithm for efficient task scheduling in cloud computing environments. Information Systems Security, 35(1):112-123, January 2026.
- Swathi Darla, C. Naveena, B. N. Ajay, Muzameel Ahmed. An optimized Bi-LSTM with deep learning-based intrusion detection system in healthcare using Blockchain. Information Systems Security, 35(1):140-153, January 2026.
- S. Yogesh Kumaran, B. Sivaneasan, S. Siva Shankar, Prasun Chakrabarti, Tulika Chakrabarti, Martin Margala. DeepWebnet analytics enhancing dark web surveillance for effective cyber threat detection and mitigation. Information Systems Security, 35(1):218-236, January 2026.
- Abdulkadir Mohamud, Tiktik Khawa Abdul Rahman, Ali Dahir. Impact of Information security policy compliance on protecting patient privacy: mediating role of SETA program. Information Systems Security, 35(2):290-307, March 2026.
- Viswanathan Ramasamy, Janjhyam Venkata Naga Ramesh, Jonnadula Narasimharao, Gururama Senthilvel P, Chittineni Aruna, G. Srinivas. Energy-efficient and secure routing in IoT-WSNs using adaptive clustering and trust-based mechanisms. Information Systems Security, 35(1):124-139, January 2026.
- Abdessamed Echikr, Ali Yachir, Chaker Abdelaziz Kerrache, Zakaria Sahraoui. ECDSA-secured blockchain architecture for interoperable healthcare in the Internet of Robotic Things (IoRT). Information Systems Security, 35(1):53-64, January 2026.
- Kalamani Chinnappa Gounder, Mythrayee D, Kodieswari A, Saravanakumar C. Enhancing information security and fault coverage in BIST with non-linear register updation. Information Systems Security, 35(1):237-250, January 2026.
- Nagababu Garigipati, S. Srithar, V. Krishna Reddy. An efficient poly-quantum integrity key generation based multi-user access control encryption and decryption framework for homogeneous and heterogeneous cloud EHR databases. Information Systems Security, 35(1):168-188, January 2026.
- Hosakota Vamshi Krishna, Badugu Samatha. Intruder detection system employing modified Adaboost for Industrial Internet of Things (IIoT). Information Systems Security, 35(1):189-202, January 2026.