- Jin Wei, Ping Chen. DSLR-: A low-overhead data structure layout randomization for defending data-oriented programming. Journal of Computer Security, 32(3):221-246, 2024.
- Yupeng Hu, Wenxin Kuang, Zhe Jin, Wenjia Li, Keqin Li 0001, Jiliang Zhang 0002, Qiao Hu. SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android. Journal of Computer Security, 32(3):291-317, 2024.
- Danilo Bruschi, Andrea Di Pasquale, Andrea Lanzi, Elena Pagani. Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks. Journal of Computer Security, 32(5):447-475, 2024.
- Susu Cui, Xueying Han, Cong Dong, Yun Li, Song Liu, Zhigang Lu 0002, Yuling Liu. MVDet: Encrypted malware traffic detection via multi-view analysis. Journal of Computer Security, 32(6):533-555, 2024.
- Shaila Sharmin, Hafizah Mansor, Andi Fitriah Abdul Kadir, Normaziah Abdul Aziz. Benchmarking frameworks and comparative studies of Controller Area Network (CAN) intrusion detection systems: A review. Journal of Computer Security, 32(5):477-507, 2024.
- Yan Gao, Ruizhong Du, Xiaofei Wang, Ruilin Li, Mingyue Li, Ziyuan Wang. DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing. Journal of Computer Security, 32(4):405-423, 2024.
- Haopeng Fan, Wenhao Wang, Yongjuan Wang, Xiangbin Wang, Yang Gao. Cache attacks on subkey calculation of Blowfish. Journal of Computer Security, 32(2):165-191, 2024.
- Isaac Amankona Obiri, Abigail Akosua Addobea, Eric Affum, Jacob Ankamah, Albert Kofi Kwansah Ansah. A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud. Journal of Computer Security, 32(2):77-115, 2024.
- Malte Breuer, Pascal Hein, Leonardo Pompe, Urike Meyer, Susanne Wetzel. Prioritization and exchange chains in privacy-preserving kidney exchange. Journal of Computer Security, 32(4):349-404, 2024.
- Jianfeng Zhang, Wensheng Zhang, Jingdong Xu. StegEraser: Defending cybersecurity against malicious covert communications. Journal of Computer Security, 32(2):117-139, 2024.