Restricted accessResearch articleFirst published 2026-03-01pp. 139-190High embedding capacity text steganography using optimal color combinations from 24-bit space Stéphane Willy Mossebo TcheunteuORCID, Hervé Talé Kalachi, Stéphane Gael Raymond EkodeckORCID , [...]View all
Restricted accessReview articleFirst published 2026-03-01pp. 85-110A comprehensive review and comparative analysis of zero trust architecture: Evolution,implementation strategies,and key challenges Ashutosh SoniORCID, Surendra Kumar NandaORCID, Rojalina PriyadarshiniORCID , [...]View all
Restricted accessResearch articleFirst published 2026-03-01pp. 111-138The world is not enough: Another look on the constructions of comparison-based distinguishers Keting WeiORCID, Hailong ZhangORCID
Restricted accessResearch articleFirst published 2026-01-01pp. 29-45Feature fusion-based squeeze and excitation (FFSE)–bidirectional temporal convolutional network (BiTCN): A hybrid malware detection model Jinxiong Zhao, Ji’en Niu, Yong Yang , [...]View all