| 179 | -- | 180 | E. Eugene Schultz. Worms and viruses: are we losing control? |
| 181 | -- | 190 | E. Eugene Schultz. Security views |
| 191 | -- | 198 | Cheryl Vroom, Rossouw von Solms. Towards information security behavioural compliance |
| 199 | -- | 212 | Min-Hui Lin, Chin-Chen Chang, Yan-Ren Chen. A fair and secure mobile agent environment based on blind signature and proxy host |
| 213 | -- | 228 | Charles Iheagwara. The effect of intrusion detection management methods on the return on investment |
| 229 | -- | 240 | Liehuang Zhu, Yuanda Cao, Dong Wang. Digital signature of multicast streams secure against adaptive chosen message attack |
| 241 | -- | 252 | Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Peini Liu. Predicting the intrusion intentions by observing system call sequences |
| 253 | -- | 264 | Denis Besnard, Budi Arief. Computer security impaired by legitimate users |