
International Journal of Security and Networks
2025 Vol.20 No.2
| Pages | Title and author(s) |
| 59-66 | CryptoLocker demystified: a study in ransomware analysis techniquesRiya Rajendran Nair; Parth Lakhalani; Heena Sirajudddin Karbhari; Kiranbhai R. Dodiya DOI: 10.1504/IJSN.2025.146750 |
| 67-92 | A survey of intruder detection in smart grid systems: comparative analysis of rule-based, machine learning and deep learningKiran Shehzadi; Touqeer Abbas; Ayesha Zainab; Hui Li DOI: 10.1504/IJSN.2025.146763 |
| 93-109 | OptiPhish: URL-based phishing detection using an optimised feature frameworkKamaljeet Kaur; Ankit Kumar Jain DOI: 10.1504/IJSN.2025.146759 |
| 110-121 | A delay-fault feature based hardware Trojan detection methodYan Feng; Ye Guo; Guanfei Gong; Xiaolin Tang; Jingrui Hu; Zhiqiang Li DOI: 10.1504/IJSN.2025.146762 |
| 122-131 | Enable membership privacy-preserving group signature schemeZhihong Chen; Huiying Hou; Zhenyu Liu; Zhiyuan Ren; Yucong Ma DOI: 10.1504/IJSN.2025.146744 |