- Jianhua Yang, Lixin Wang, Suhev Shakya. Modelling Network Traffic and Exploiting Encrypted Packets to Detect Stepping-stone Intrusions. J. Internet Serv. Inf. Secur., 12(1):2-25, 2022.
- Anthony Cheuk Tung Lai, Ping Fan Ke, Kelvin Chan, Siu-Ming Yiu, Dongsun Kim, Wai-Kin Wong, Shuai Wang, Joseph Muppala, Alan Ho. RansomSOC: A More Effective Security Operations Center to Detect and Respond to Ransomware Attacks. J. Internet Serv. Inf. Secur., 12(3):63-75, 2022.
- Ilsun You. 2022 Letter from the Editor-in-Chief. J. Internet Serv. Inf. Secur., 12(1):1, 2022.
- Jongmo Kim, Kunyoung Kim, Gi-Yoon Jeon, Mye M. Sohn. Temporal Patterns Discovery of Evolving Graphs for Graph Neural Network (GNN)-based Anomaly Detection in Heterogeneous Networks. J. Internet Serv. Inf. Secur., 12(1):72-82, 2022.
- Md. Amiruzzaman, Mahnaz Rafia Islam, Md. Rajibul Islam, Rizal Mohd Nor. Analysis of COVID-19: An infectious disease spread. J. Internet Serv. Inf. Secur., 12(3):1-15, 2022.
- Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi. Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM. J. Internet Serv. Inf. Secur., 12(1):26-43, 2022.
- Jose-Luis Cabra, Carlos Parra 0001, Luis Trujillo. Earprint touchscreen sensoring comparison between hand-crafted features and transfer learning for smartphone authentication. J. Internet Serv. Inf. Secur., 12(3):16-29, 2022.
- Jaewon Choi, XiuPing Zhang. Classifications of restricted web streaming contents based on convolutional neural network and long short-term memory (CNN-LSTM). J. Internet Serv. Inf. Secur., 12(3):49-62, 2022.
- Yousik Lee, Samuel Woo. Practical Data Acquisition and Analysis Method for Automobile Event Data Recorders Forensics. J. Internet Serv. Inf. Secur., 12(3):76-86, 2022.
- Ye Neung Kim, Seok Min Ko, Taeguen Kim. Hidden Markov Model based Anomaly Detection Method for In-vehicle Network. J. Internet Serv. Inf. Secur., 12(2):115-125, 2022.