- Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin. Comparing Online Surveys for Cybersecurity: SONA and MTurk. ICST Trans. Security Safety, 8(30):2, 2022.
- Adeel A. Malik, Deepak K. Tosh. Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems. ICST Trans. Security Safety, 8(30):1, 2022.
- Zhen Huang 0002, Gang Tan, Xiaowei Yu. Mitigating Vulnerabilities in Closed Source Software. ICST Trans. Security Safety, 8(30):4, 2022.
- Muhammad Shoaib Akhtar, Tao Feng 0007. A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers. ICST Trans. Security Safety, 8(30):5, 2022.
- Yang Lu, Shujun Li, Alex Freitas, Athina Ioannou. How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis. ICST Trans. Security Safety, 8(30):3, 2022.
- Tomasz Kosinski, Riccardo Scandariato, Morten Fjeld. SyntIoT: Privacy and security experimentation in consumer-oriented IoT ecosystems. ICST Trans. Security Safety, 8(27), 2021.
- Hong Liu, Eugene Y. Vasserman. Side-channel Programming for Software Integrity Checking. ICST Trans. Security Safety, 8(28), 2021.
- Wanping Liu, Zhoulan Zhang, Cheng Huang, Yong Fang 0002. CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers. ICST Trans. Security Safety, 7(24), 2021.
- Mohammad Ashiqur Rahman, Amarjit Datta, Ehab Al-Shaer. Automated Configuration Synthesis for Resilient Smart Metering Infrastructure. ICST Trans. Security Safety, 8(28), 2021.
- Kamrul Hasan, Sachin Shetty, Sharif Ullah, Amin Hassanzadeh, Tariqul Islam. Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems. ICST Trans. Security Safety, 8(28), 2021.