- Ernest Akpaku, Jinfu Chen 0001, Mukhtar Ahmed, Rexford Nii Ayitey Sosu, Francis Kwadzo Agbenyegah, Dominic Kofi Louis. eBiTCN: Efficient bidirectional temporal convolution network for encrypted malicious network traffic detection. Journal of Computer Security, 33(3):180-211, 2025.
- Kexiong Fei, Jiang Zhou, Lin Su, Weiping Wang 0005, Yong Chen 0001. Log2Graph: A graph convolution neural network based method for insider threat detection. Journal of Computer Security, 33(1):37-56, 2025.
- Yaguan Qian, Boyuan Ji, Zejie Lian, Renhui Tao, Yaxin Kong, Bin Wang 0062, Wei Wang 0012. Enhancing robustness of backdoor attacks on real-world object detection systems. Journal of Computer Security, 33(4):262-280, 2025.
- Haitian Liu, Rong Jiang 0001, Bin Zhou 0004. An ensemble approach for unsupervised anomaly and cyber attack detection. Journal of Computer Security, 33(4):215-238, 2025.
- He Kong, Liqun Yang, Jingguo Ge, Tong Li 0012, Hui Li. ANT-ET: An end-to-end multimodal framework for fine-grained encrypted traffic fingerprinting. Journal of Computer Security, 33(3):163-179, 2025.
- Héber Hwang Arcolezi, Karima Makhlouf, Catuscia Palamidessi. Group fairness under obfuscated sensitive information. Journal of Computer Security, 33(4):239-260, 2025.
- Ramadan Abdunabi, Md. Al-Amin, Rejina Basnet. An authorization framework for body area network: A policy verification and smart contract-based integrity assurance approach. Journal of Computer Security, 33(3):119-162, 2025.
- Sachin Kumar, Swati Suyal, Ashok Kumar. Securing Images using Bifid Cipher associated with Arnold Map. Journal of Computer Security, 33(1):57-76, 2025.
- Haotian Yan, Haibo Hu 0001, Qingqing Ye 0001, Jianliang Xu. Multi-hop sanitizable signature for collaborative edge computing. Journal of Computer Security, 33(2):79-99, 2025.
- You Chen, Ning Ding 0001, Dawu Gu, Yang Bian. Practical multi-party private set intersection cardinality and intersection-sum protocols under arbitrary collusion. Journal of Computer Security, 33(1):3-36, 2025.