- Asmita Manna, Anirban Sengupta, Chandan Mazumdar. A risk-based methodology for privacy requirements elicitation and control selection. Secur. Priv., 5(1), 2022.
- Lampis Alevizos, Vinh-Thong Ta, Max Hashem Eiza. Augmenting zero trust architecture to endpoints using blockchain: A state-of-the-art review. Secur. Priv., 5(1), 2022.
- Adarsh Kumar, Carlo Ottaviani, Sukhpal Singh Gill, Rajkumar Buyya. Securing the future internet of things with post-quantum cryptography. Secur. Priv., 5(2), 2022.
- Mahbuba Begum, Mohammad Shorif Uddin. Towards the development of an effective image watermarking system. Secur. Priv., 5(2), 2022.
- Richard Dosselmann, Howard J. Hamilton. Limiting sensitive values in an anonymized table while reducing information loss via p-proportion. Secur. Priv., 5(3), 2022.
- Azza Dandooh, Adel S. El-Fishawy, Fathi E. Abd El-Samie, Ezz El-Din Hemdan. Secure audio signal transmission based on color image watermarking. Secur. Priv., 5(2), 2022.
- Joseph Doyle, Muhammed Golec, Sukhpal Singh Gill. BlockchainBus: A lightweight framework for secure virtual machine migration in cloud federations using blockchain. Secur. Priv., 5(2), 2022.
- Victor R. Kebande, Kim-Kwang Raymond Choo. Finite state machine for cloud forensic readiness as a service (CFRaaS) events. Secur. Priv., 5(1), 2022.
- Yaser Ebazadeh, Reza Fotohi. A reliable and secure method for network-layer attack discovery and elimination in mobile ad-hoc networks based on a probabilistic threshold. Secur. Priv., 5(1), 2022.
- Ilija Basicevic, Nikola Blazic, Stanislav Ocovaj. On the use of principal component analysis in the entropy based detection of denial-of-service attacks. Secur. Priv., 5(2), 2022.