- Emiel Lanckriet, Frank Piessens, Dominique Devriese. SoK: Robust properties, robust abstractions and back-translations. Journal of Computer Security, 34(3):230-257, 2026.
- Stéphane Willy Mossebo Tcheunteu, Hervé Talé Kalachi, Stephane Gael Raymond Ekodeck, Leonel Moyou Metcheka, Jean Marsien Ayemidie Moto, René Ndoundam. High embedding capacity text steganography using optimal color combinations from 24-bit space. Journal of Computer Security, 34(2):139-190, 2026.
- Laouen Fernet, Sebastian Mödersheim, Luca Viganò 0001. A decision procedure and typing result for alpha-beta privacy. Journal of Computer Security, 34(1):46-81, 2026.
- Jinxiong Zhao, Ji'en Niu, Yong Yang, Zhiru Li, Dongqing Liu, Lei Zhang. Feature fusion-based squeeze and excitation (FFSE)-bidirectional temporal convolutional network (BiTCN): A hybrid malware detection model. Journal of Computer Security, 34(1):29-45, 2026.
- Ashutosh Soni, Surendra Kumar Nanda, Rojalina Priyadarshini, Ganapati Panda. A comprehensive review and comparative analysis of zero trust architecture: Evolution, implementation strategies, and key challenges. Journal of Computer Security, 34(2):85-110, 2026.
- Keshuo Sun, Haiying Gao, Bin Hu 0011, Xiufeng Zhao, Aoyang Zhou, Yang Song, Yifei Lu. Fully adaptive MA-ABE supporting multi-fan-in circuits. Journal of Computer Security, 34(3):211-229, 2026.
- Keting Wei, Hailong Zhang 0001. The world is not enough: Another look on the constructions of comparison-based distinguishers. Journal of Computer Security, 34(2):111-138, 2026.
- Jin Wei, Ping Chen 0003, Kangjie Lu, Jun Dai, Xiaoyan Sun 0003. SQLaser: Detecting database management system (DBMS) logic bugs with clause-guided fuzzing. Journal of Computer Security, 34(1):3-28, 2026.
- Xinjing Yuan, Peiran Yu, Song Liu, Zhe Sun, Yu Zhang, Jingdong Xu. An expert-in-the-loop framework for unknown attack detection via open-set recognition. Journal of Computer Security, 34(3):193-210, 2026.
- Ernest Akpaku, Jinfu Chen 0001, Mukhtar Ahmed, Rexford Nii Ayitey Sosu, Francis Kwadzo Agbenyegah, Dominic Kofi Louis. eBiTCN: Efficient bidirectional temporal convolution network for encrypted malicious network traffic detection. Journal of Computer Security, 33(3):180-211, 2025.