| 481 | -- | 490 | E. Eugene Schultz. Security Views |
| 491 | -- | 496 | Stephen Hinde. The Blue Screen of Death and other deadly bugs |
| 497 | -- | 502 | Andy Nikishin. I-Worm.Lentin (aka Yaha) |
| 503 | -- | 505 | Chris Pounder. The US s National Strategy for Homeland Security |
| 506 | -- | 513 | Jon David. Policy enforcement in the workplace |
| 514 | -- | 519 | August Bequai. White collar crime: a handmaiden of international tech terrorism |
| 520 | -- | 521 | Sarah Hilley. Palladium, fraud, and surviving terrorism- Compsec 2002 - Preview of Compsec 2002, 30 Oct-1 Nov, Queen Elizabeth II Conference Centre, Westminster, London, UK |
| 526 | -- | 531 | E. Eugene Schultz. A framework for understanding and predicting insider attacks |
| 557 | -- | 564 | Virginia E. Rezmierski, Marshall R. Seese Jr., Nathaniel St. Clair II. University systems security logging: who is doing it and how far can they go? |
| 565 | -- | 570 | Tzer-Shyong Chen, Yu-Fang Chung. Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm |