- Stéphane Willy Mossebo Tcheunteu, Hervé Talé Kalachi, Stephane Gael Raymond Ekodeck, Leonel Moyou Metcheka, Jean Marsien Ayemidie Moto, René Ndoundam. High embedding capacity text steganography using optimal color combinations from 24-bit space. Journal of Computer Security, 34(2):139-190, 2026.
- Laouen Fernet, Sebastian Mödersheim, Luca Viganò 0001. A decision procedure and typing result for alpha-beta privacy. Journal of Computer Security, 34(1):46-81, 2026.
- Jinxiong Zhao, Ji'en Niu, Yong Yang, Zhiru Li, Dongqing Liu, Lei Zhang. Feature fusion-based squeeze and excitation (FFSE)-bidirectional temporal convolutional network (BiTCN): A hybrid malware detection model. Journal of Computer Security, 34(1):29-45, 2026.
- Ashutosh Soni, Surendra Kumar Nanda, Rojalina Priyadarshini, Ganapati Panda. A comprehensive review and comparative analysis of zero trust architecture: Evolution, implementation strategies, and key challenges. Journal of Computer Security, 34(2):85-110, 2026.
- Keting Wei, Hailong Zhang 0001. The world is not enough: Another look on the constructions of comparison-based distinguishers. Journal of Computer Security, 34(2):111-138, 2026.
- Jin Wei, Ping Chen 0003, Kangjie Lu, Jun Dai, Xiaoyan Sun 0003. SQLaser: Detecting database management system (DBMS) logic bugs with clause-guided fuzzing. Journal of Computer Security, 34(1):3-28, 2026.
- Ernest Akpaku, Jinfu Chen 0001, Mukhtar Ahmed, Rexford Nii Ayitey Sosu, Francis Kwadzo Agbenyegah, Dominic Kofi Louis. eBiTCN: Efficient bidirectional temporal convolution network for encrypted malicious network traffic detection. Journal of Computer Security, 33(3):180-211, 2025.
- Kexiong Fei, Jiang Zhou, Lin Su, Weiping Wang 0005, Yong Chen 0001. Log2Graph: A graph convolution neural network based method for insider threat detection. Journal of Computer Security, 33(1):37-56, 2025.
- Yaguan Qian, Boyuan Ji, Zejie Lian, Renhui Tao, Yaxin Kong, Bin Wang 0062, Wei Wang 0012. Enhancing robustness of backdoor attacks on real-world object detection systems. Journal of Computer Security, 33(4):262-280, 2025.
- Haitian Liu, Rong Jiang 0001, Bin Zhou 0004. An ensemble approach for unsupervised anomaly and cyber attack detection. Journal of Computer Security, 33(4):215-238, 2025.