


default search action
International Journal of Information Security, Volume 25
Volume 25, Number 1, February 2026
- Pawel Rajba, Jörg Keller, Wojciech Mazurczyk:

Randomization of message contents with and without encryption for covert communication scenarios. 1 - Norah Alqahtani, Mohammed Almukaynizi:

VulnScore: A deployed system for patch prioritization combining human input and temporal threat intelligence. 2 - Jinrong Kong, Guojun Wang, Mingfei Chen, Wanyi Gu, Yuheng Zhang, Zhuoyi Wu:

IFDroid: Enhancing Android Malware Detection Resilience Against Concept Drift Through API Sequence Intrinsic Features. 3 - Mustafa Abdallah, Daniel Woods

, Timothy N. Cason:
Selfish or Malicious: Price of malice in human-centric security decision-making for attack graph-based interdependent systems. 4 - Jonathan Gregory, Jacob Auerbach, Qi Liao:

IoT VisPerNet: Adversarial Perturbation Visualization for IoT Networks. 5 - Simone Bozzolan, Stefano Calzavara, Davide Porcu:

Cookie Baker: gray-box login automation for web application security testing. 6 - Mostafa Arjmand, Behzad Akbari, Hamid Reza Ghaeini:

From voltage to vulnerability: A comprehensive survey of dynamic security risk assessment techniques in smart grids. 7 - M. Palumickas, Muhammad Mudassar Yamin, Basel Katt, Chhagan Lal:

Evaluating ASCERT: generative AI for cyber-range scenario generation. 8 - Luciano Ignaczak, Márcio Garcia Martins, Cristiano André da Costa, Rafael Kunst:

A value-based approach for information classification. 9 - Attiq Ur Rehman

, Songfeng Lu
, Md Belal Bin Heyat
, Faijan Akhtar
, Mohd Ammar Bin Hayat, Muhammad Usman
, Abdullah Yahya Mohammed Muaad:
BSDS-ShareCrypt: a blockchain-enabled framework for secure, anonymous, and accountable data sharing in cloud-IoT environments using aggregate key searchable encryption. 10 - Takaya Kondo, Takeshi Nakai, Koutarou Suzuki:

Fair Exchange based on Smart Contract: A Generalization of FairSwap and OptiSwap. 11 - Gauthama Raman M. R, Sanat Khandekar, Rohit Murarishetti, Chew Zhan Yi Caven, Ng Guo Feng Eric, Jianying Zhou:

Network-Based Real-Time Detection of Data Manipulation Attacks in Industrial Control Systems. 12 - Amani K. Samha, Hanan Abdullah Mengash, Mohammed A. AlAqil, Hamed Alqahtani, Somia A. Asklany, Rana Alabdan:

Bi-GRU framework with entropy-augmented Mac for IoT security in SDN. 13 - Adel Alqudhaibi, Majed Albarrak, Abdulmohsan Aloseel, Amr Munshi, Thamer Alsharif, Sandeep Jagtap

, Konstantinos Salonitis
:
Proactive cybersecurity in industry 4.0: a survey of cybersecurity threat prediction approaches in manufacturing systems. 14 - Azath Mubarakali

, S. Sharavanan, Hashim Elshafie, Suresh Babu Changalasetty:
A secure and scalable home security system using IoT, 6G networks, AI-based hybrid deep learning models, blockchain, and smart contracts. 15 - Argiro Anagnostopoulou

, Nikolaos Tsinganos
, Jason Chatzopoulos, Ioannis Mavridis
, Dimitris Gritzalis
:
INFFLOW-RT: A real-rime, adaptive methodology for risk-based information flow control in IIoT. 16 - Kaya Emre Arikan

, Sait Melih Dogan
, Ercan Nurcan Yilmaz, Serkan Gönen:
From code to security: machine learning approaches in android vulnerability detection. 17 - Tainyi Luor, Jen Fu Wang:

Bridging the gap between cybersecurity awareness and implementation: a three-stage healthcare metaphor for cross-sector governance. 18 - Tianhao Liu, Omar Dib:

Advanced intrusion detection for IoT devices using federated deep learning. 19 - Chen Li, Fangguo Zhang:

Designated-verifier zk-SNARKs made easy. 20 - Shiwen Zhang, Yibin Yang, Jiayi He, Wei Liang, Kuanching Li

, Rubén González Crespo
:
FKSS: A fast keyword search scheme with access control for cloud-assisted edge computing. 21 - Salheddine Kabou, Laid Gasmi, Abdelbaset Kabou:

BuKc: A novel bottom-up approach for enhanced data anonymization in apache spark. 22 - Martin Leo, Freedy Tan Wei You, Tianqi Miao, Guru Anand:

From threat to trust: assessing security risks of agentic AI systems. 23 - Ciprian Oprisa, Dominic Octavian Grigorut, Haralambos Mouratidis, Eftychia Lakka, Ourania Manta, Angelos Mavrias, Marinos Tsantekidis, Nikolas Filippatos

, George Daniil, Ionel-Alexandru Gal, Dragos Gavrilut, Christos Kargatzis, Sotiris Ioannidis:
A large scale analysis of code security in public repositories. 24 - Azath Mubarakali

:
Enhanced phishing detection using binary encoding XGBoost and LSTM feature extraction and capsule network classification. 25 - Fatimah Faraji, Haralambos Mouratidis, Abdullah Al-Zakwani:

Risk impact pathway analysis (RIPA): A dynamic risk assessment framework for interdependent critical infrastructures. 26 - Pilar Manzanares-Lopez, Abel Lopez-Garcia, María-Dolores Cano-Baños, Juan Pedro Muñoz-Gea

, Josemaria Malgosa-Sanahuja:
Enhancing the hypatia simulator for LEO satellite networks with integrated DoS and DDoS attack capabilities. 27 - Joaquín García-Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas:

Selected papers from the 29th European Symposium on Research in Computer Security (by invite-only). 28 - Karwan Mahdi Hama Rawf:

Improved CoAtNet for robust acoustic side-channel attack classification on keyboards. 29 - Kousik Barik

, Sanjay Misra, Luis Fernández-Sanz, Sabarathinam Chockalingam
:
Context-based and investment decision-making cyber resilient systems: an empirical approach. 30 - Zuohui Xing:

The role of blockchain in securing IoT networks: future prospects and challenges. 31 - Affan Yasin, Rubia Fatima, Ira Puspitasari, Abdul Basit Dogar, Liu Yang, Kashif Ishaq:

From Prey to Protect: Exploring Social Engineering Through Games and Simulation. Trust, Awareness, and Phishing Defense. 32 - Sunanda Bose, Dusica Marijan:

A survey on privacy of health data lifecycle: a taxonomy, review, and future directions. 33 - Simon Unger

, Ektor Arzoglou
, Markus Heinrich
, Dirk Scheuermann
, Stefan Katzenbeisser:
Cybersecurity risk assessment in OT systems using attack graphs. 34 - Viktor Taneski, Paul Schwarz, Leon Bosnjak, Marina Tropmann-Frick, Bostjan Brumen:

Readability and vagueness of privacy policies in mHealth applications: a multi-country analysis. 35 - Spyridon Papastergiou, Nihala Basheer, Kostas Lampropoulos, Panayiotis Verrios, Shareeful Islam:

Explainable AI based dynamic cybersecurity risk management for cyber insurability. 36 - Tobias Reittinger, Johannes Grill, Günther Pernul:

Share and benefit: incentives for cyber threat intelligence sharing. 37 - Christos Smiliotopoulos, Georgios Kambourakis:

Machine Learning for Lateral Movement Detection using Sysmon Logs: An Empirical Comparison of Imbalanced and Resampled Data. 38 - Suruchi Jain, Anshul Arora, Dhirendra Kumar:

PICCdroid: A novel permissions and intent correlation coefficient based android malware detection method. 39 - Aikaterina C. Latsiou

, Costas Lambrinoudakis
:
Cyber Supply Chain Risk Management: From Threats to Treatment. 40
Volume 25, Number 2, April 2026
- Maria Belkhir, Haroun Benkaouha, Elhadj Benkhelifa:

A hybrid quantum authentication model (HQAM) with QRNG enhanced protection. 41 - Zhao Tian, Shuhui Zhang, Jiawei Ma, Kong Cheng, Wei Liu, Wei She:

The covert communication model based on multi-channel and vector space coding. 42 - Sajeev Thevaratnam, Zeinab Rezaeifar:

Quantifying cyber threat using Bayesian statistical analysis. 43 - Fadwa Belali, Abdellah Essetty, Slimane Bah, Ilyas El Wafi, Amina Daghouri:

Design of a resilient multi-layered security framework for satellite communications. 44 - Vaios Bolgouras

, Vasilis Magkoutis, Apostolis Zarras
, Aristeidis Farao
, Christos Xenakis
:
In the webs of ethereum: analyzing smart contracts vulnerabilities. 45 - Julia Sánchez

, Alan Briones
, Sara Ricci
, Jakub Cegan
, Argyro Chatzopoulou
, Yianna Danidou
, Andreas Menegatos
, Guiomar Corral
:
A framework for designing and certifying ECSF-aligned cybersecurity training through cyber ranges and virtual learning environments. 46 - Artsiom Yautsiukhin, Natallia Kavalionak:

A bonus and penalty mechanism as an incentive for cybersecurity investments. 47 - Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos

, Andreu-Pere Isern-Deyà, Gerardo-Francisco Chévez-Alvarado:
A three-step Bc-optimistic blockchain-based contract signing protocol. 48 - Ruchika Malhotra, Anjali Bansal, Marouane Kessentini:

Assessing security vulnerabilities in a docker-enabled federated learning framework with hyperparameter tuning for software bug prediction. 49 - Nasit S. Sony, Xianzhong Ding:

Prioritized-MVBA: A New Approach to Design an Optimal Asynchronous Byzantine Agreement Protocol. 50 - Shareeful Islam, Bilal Sardar, Eleni-Maria Kalogeraki, Kostas Lampropoulos, Spyridon Papastergiou:

Hybrid AI-Based dynamic risk assessment framework with explainable AI practices for composite product cybersecurity certification. 51 - Arslan Tariq Syed, Mohamed Chahine Ghanem

, Elhadj Benkhalifa, Fauzia Idrees Abro:
SPECTRE: a hybrid and adaptive cyber threats detection and response in volatile memory. 52 - Chhagan Lal, Muhammad Mudassar Yamin, Georgios Spathoulas:

Navigating cyber range federations: an exploration of current landscape, obstacles, and prospects. 53 - Shahzad Ashraf

, Chang Choi
, Ahmad Bilal
:
CTDMF-SC: cybersecurity threat detection and mitigation framework for smart cities. 54 - Clara Bertolissi, Alba Martinez Anton, Nicola Zannone

:
Fine-grained access control for multi-user data in cooperative systems: managing compound objects and temporal constraints. 55 - Diana Gheiby

, Soulmaz Gheisari
:
Adaptive strategy optimization for cyber-physical systems under denial-of-service attacks using continuous learning automata. 56 - Antoni Martínez-Ballesté, Edgar Batista, Elena Figueroa, Kaouther Nouni, Agusti Solanas, Fran Casino:

Security and privacy in complex, context-aware systems: a comprehensive framework. 57 - Burhan Ul Islam Khan, Aabid Ahmad Mir

, Abdul Raouf Khan, Khang Wen Goh, Suresh Sankaranarayanan, Md. Alamin Bhuyian:
C2B-DroneNet: cyber clone-driven blockchain process for secure and efficient drone network operations. 58 - Lavanya Elluri

, Rahul Dwivedi
, Sunme Lee
, Ran Li
:
Exploring IoT privacy compliance research: a topic modeling approach. 59 - Maryam Var Naseri, Ian Welch, Junaid Haseeb, Masood Mansoori:

Q-Cowrie: An adaptive honeypot to analyse attackers' behaviour. 60 - Azan Hamad Alkhorem, Daniel Conte de Leon, Ananth A. Jillepalli, Jia Song:

Graph-based formal modeling and implementation of access control policies with automated conflict and redundancy detection. 61 - Virginia Martinez-Fuentes

, Angel Arroyo
, Diego Granados-López
, Álvaro Herrero
:
Toward AI-driven IoT cybersecurity: A preprocessing framework for benchmark datasets. 62 - Victor Manuel Gonzalez-Gorrín

, Josep Prieto-Blázquez:
A hybrid machine learning intrusion detection method for metamorphic malware. 63 - Mohammed Alghazwi, Tariq Bontekoe, Leon Visscher, Fatih Turkmen

:
Collaborative CP-NIZKs: modular, composable proofs for distributed secrets. 64 - Anika Saba Ibte Sum, Zinniya Taffannum Pritee, Anik Kumar Saha, Mirza Asif Mahmud, Kamruddin Nur:

A systematic review on privacy preservation in federated learning. 65 - Bexultan Shyryn, Tariq Ahamed Ahanger, Ainur Zhumadillayeva:

Enhancing software-defined network security with deep learning: a comprehensive review. 66 - Ala Ekramifard, Haleh Amintoosi, Seyed Amin Hosseini Seno:

Protection of the CGAN against membership inference attack using Differential Privacy. 67 - Multaq B. Aldajani, Mubarak Albathan, Qaisar Abbas:

ATTUNE-SHARE: an agent-based secure time-series healthcare data sharing scheme for IoT-cloud systems. 68 - Ivan R. Opirskyy

, Stepan Lys
, Vladyslav Shakh:
Analysis and testing of systems countering phishing and social engineering attacks at the corporate level. 69 - Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Aditya P. Mathur, Muhammad Taha Jilani:

Attack pattern mining to discover hidden threats to industrial control systems. 70 - Nipuna Hiranya Weeratunge, Rune Hjelsvold, Basel Katt:

A systematic scoping review on game-based cybersecurity awareness education. 71 - Sevval Solpan, Hakan Gündüz, Kerem Küçük

, Fatih Özyurt:
A hybrid feature fusion approach for multiclass Wi-Fi intrusion detection using classical machine learning. 72 - Amalia Damianou, Mariana S. Mazi, George Rizos, Konstantinos Bezas, George Lazaridis, Antonis Voulgaridis, Konstantinos Votis, Dimitrios Tzovaras:

Measuring the unseen: a situational awareness scoring framework for cyber range training. 73 - Changhun Hyun, Hyeyoung Park:

Mixed Perturbation: Generating Directionally Diverse Perturbations for Adversarial Training. 74 - Ahmad B. Usman

, Zeeshan Afzal
, Mikael Asplund
:
Bridging remote attestation and secure software updates in embedded systems. 75 - Antonios Patergianakis

, Costas Lambrinoudakis
:
Through the looking glass: eye tracking biometrics and the loss of anonymity in extended reality. 76

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














