| Please feel free forward to your colleagues and share the news of our journal | Dear Colleague, Welcome to our journal newsletter for Journal of Computer Security (JCS). We are delighted to share the first and second issues of Volume 31 with you. Scroll down to find a selection of articles from both issues. If you are interested in being a Guest Editor of a Special Issue yourself and would like to pitch a subject to us, then please do not hesitate to get in touch. With kind regards, Editors-in-Chief Stéphanie Delaune Univ Rennes, CNRS, IRISA, France Peng Liu Pennsylvania State University, USA | RESEARCH ARTICLES Secure protocols for cumulative reward maximization in stochastic multi-armed bandits Ciucanu, Radu | Lafourcade, Pascal | Lombard-Platet, Marius | Soare, Marta A scalable algorithm for network reachability analysis with cyclic attack graphs Zenitani, Kengo Certifying machine learning models against evasion attacks by program analysis Calzavara, Stefano | Ferrara, Pietro | Lucchese, Claudio Domain generated algorithms detection applying a combination of a deep feature selection and traditional machine learning models Hassaoui, Mohamed | Hanini, Mohamed | El Kafhali, Said | RESEARCH ARTICLES Strong watermark numbers encoded as reducible permutation graphs against edge modification attacks Mpanti, Anna | Nikolopoulos, Stavros D. | Palios, Leonidas OTKI-F: An efficient memory-secure multi-keyword fuzzy search protocol Han, Ziyang | Ye, Qingqing | Hu, Haibo Towards verifiable web-based code review systems Afzali, Hammad | Torres-Arias, Santiago | Curtmola, Reza | Cappos, Justin | Top 5 Articles of Q1 2023 Listed articles were published in 2021–2023 so you can read the most popular recent content. Special issue: Security and Cryptography for Networks – SCN 2020 (Editorial in Vol.30, Iss.1, 2022) – Openly Available Galdi, Clemente | Kolesnikov, Vladimir Double-authentication-preventing signatures in the standard model (Research Article in Vol.30, Iss.1, 2022) Catalano, Dario | Fuchsbauer, Georg | Soleimanian, Azam Advances in spam detection for email spam, web spam, social network spam, and review spam: ML-based and nature-inspired-based techniques (Research Article in Vol.29, Iss.5, 2021) Akinyelu, Andronicus A. Directed adversarial sampling attacks on phishing detection (Editorial in Vol.29, Iss.1, 2021) Shirazi, Hossein | Bezawada, Bruhadeshwar | Ray, Indrakshi | Anderson, Chuck A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement (Research Article in Vol.29, Iss.4, 2021) Alam, Md Morshed | Wang, Weichao | Call for Papers As a member of our research community, we would like to invite you to contribute your own work for publication in the journal. Journal of Computer Security offers contributing authors many benefits, including: · First class Editorial Board · Rigorous peer review and speedy manuscript processing View the detailed Instructions to Authors. | Volume 30, Issue 4 | Volume 30, Issue 5 | Volume 30, Issue 6 | | | Please share the newsletter with your colleagues! If you know any colleagues and fellow researchers who are not signed up to receive the JCS newsletter, we invite you to share this mailing with them. To sign up for the newsletter, please click here. | You are receiving this mailing as you are signed up to receive news from JCS. You can unsubscribe or alter your preferences at any time by clicking the links below. | | |