- Joakim Kävrestad, Steven Furnell, Marcus Nohlberg. User perception of Context-Based Micro-Training - a method for cybersecurity training. Information Systems Security, 33(2):121-137, March 2024.
- Farid Javani, Alan T. Sherman. BVOT: self-tallying boardroom voting with oblivious transfer. Information Systems Security, 33(1):42-53, January 2024.
- Thierry Mefenza, Damien Vergnaud. Lattice attacks on pairing-based signatures. Information Systems Security, 33(2):138-157, March 2024.
- Payal Sharma, B. R. Purushothama. A lightweight group key management scheme with constant rekeying cost and public bulletin size. Information Systems Security, 33(2):97-120, March 2024.
- Divya V. L., Job P. A., K. Preetha Mathew. Secure query processing and optimization in cloud environment: a review. Information Systems Security, 33(2):172-191, March 2024.
- Salifu Yusif, Abdul Hafeez-Baig, Charles Anachanser. Internet governance and cyber-security: a systematic literature review. Information Systems Security, 33(2):158-171, March 2024.
- Nelson Russo, Leonilde Reis, Maria Clara Silveira, Henrique S. Mamede. Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review. Information Systems Security, 33(1):54-72, January 2024.
- Savitha M. M, Basarkod P. I. Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and light-chain based prediction detection and mitigation mechanisms. Information Systems Security, 33(1):73-95, January 2024.
- Rajesh Bingu, S. Jothilakshmi 0001, N. Srinivasu. Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment. Information Systems Security, 33(1):1-15, January 2024.
- Mohammed Safy Elwan, Amira Salem, Hossam Fawky, Ahmed Mahmoud ramadan. Intelligent security sanitizing gate. Information Systems Security, 32(6):481-493, November 2023.