- Upendra Verma, Mayank Sohani. An efficient lightweight authentication scheme for dew-assisted IoT networks. Secur. Priv., 7(2), March/April 2024.
- Vijay Karnatak, Amit Kumar Mishra, Neha Tripathi, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das. A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications. Secur. Priv., 7(2), March/April 2024.
- Mohammed Riyadh Abdmeziem, Hiba Akli, Rima Zourane. Nodes selection review for federated learning in the blockchain-based internet of things. Secur. Priv., 7(2), March/April 2024.
- Hela Makina, Asma Ben Letaifa, Abderrezak Rachedi. Survey on security and privacy in Internet of Things-based eHealth applications: Challenges, architectures, and future directions. Secur. Priv., 7(2), March/April 2024.
- Abhishek Bisht, Ashok Kumar Das, Debasis Giri. Personal health record storage and sharing using searchable encryption and blockchain: A comprehensive survey. Secur. Priv., 7(2), March/April 2024.
- Zeinab Zoghi, Gürsel Serpen. UNSW-NB15 computer security dataset: Analysis through visualization. Secur. Priv., 7(1), January/February 2024.
- N. Joychandra Singh, Nazrul Hoque, Kh Robindro Singh, Dhruba K. Bhattacharyya. Botnet-based IoT network traffic analysis using deep learning. Secur. Priv., 7(2), March/April 2024.
- Anusha Vangala, Ashok Kumar Das, Neeraj Kumar 0001, Pandi Vijayakumar, Marimuthu Karuppiah, Youngho Park 0005. Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service. Secur. Priv., 7(2), March/April 2024.
- Martijn Dekker, Lampis Alevizos. A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision-making. Secur. Priv., 7(1), January/February 2024.
- Mohammed Rauf Ali Khan. Understanding impacts of a ransomware on medical and health facilities by utilizing LockBit as a case study. Secur. Priv., 7(1), January/February 2024.