- Chunghyo Kim, Juhwan Noh, Esmaeil Ghahremani, Yongdae Kim. Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids. ACM Trans. Inf. Syst. Secur., 28(2), May 2025.
- Yuxin Yang 0003, Qiang Li 0008, Yuede Ji, Binghui Wang. A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning. ACM Trans. Inf. Syst. Secur., 28(2), May 2025.
- Danushka Senarathna, Spyros Tragoudas, Jason Wibbenmeyer, Nasser Khdeer. Time Series Analysis Neural Networks for Detecting False Data Injection Attacks of Different Rates on Power Grid State Estimation. ACM Trans. Inf. Syst. Secur., 28(3), August 2025.
- Liang Wang 0038, Zhuangkun Wei, Weisi Guo. Multi-agent Deep Reinforcement Learning-based Key Generation for Graph Layer Security. ACM Trans. Inf. Syst. Secur., 28(2), May 2025.
- Hieu Le 0003, Salma Elmalaki 0001, Athina Markopoulou, Zubair Shafiq. AutoFR: Automated Filter Rule Generation for Adblocking. ACM Trans. Inf. Syst. Secur., 28(1), February 2025.
- Davide Davoli 0001, Martin Avanzini, Tamara Rezk. Comprehensive Kernel Safety in the Spectre Era: Mitigations and Performance Evaluation. ACM Trans. Inf. Syst. Secur., 28(3), August 2025.
- Björn Bjurling, Shahid Raza. Cyber Threat Intelligence meets the Analytic Tradecraft. ACM Trans. Inf. Syst. Secur., 28(1), February 2025.
- Jinyin Chen, Zhiqi Cao, Xiaojuan Wang, Haibin Zheng, Zhaoyan Ming, YaYu Zheng. FairQuanti: Enhancing Fairness in Deep Neural Network Quantization via Neuron Role Contribution. ACM Trans. Inf. Syst. Secur., 28(3), August 2025.
- Sami Ullah, Awais Rashid. Security Implications of the Morello Platform: An Empirical Threat Model-Based Analysis. ACM Trans. Inf. Syst. Secur., 28(3), August 2025.
- Malek Al-Zewairi, Sufyan Almajali, Moussa Ayyash, Mohamed Rahouti, Fernando Martinez 0003, Nordine Quadar. Multi-Stage Enhanced Zero Trust Intrusion Detection System for Unknown Attack Detection in Internet of Things and Traditional Networks. ACM Trans. Inf. Syst. Secur., 28(3), August 2025.