| 261 | -- | 262 | E. Eugene Schultz. Personal information compromises: It is time for the U.S. Government to wake up |
| 263 | -- | 270 | . Security views |
| 271 | -- | 273 | Basie von Solms, Rossouw von Solms. From information security to ... business security? |
| 274 | -- | 279 | Steven Furnell. Why users cannot use security |
| 280 | -- | 286 | David B. Chang, Carl S. Young. Infection dynamics on the Internet |
| 287 | -- | 294 | Wenbao Jiang, Hua Song, Yiqi Dai. Real-time intrusion detection for high-speed networks |
| 295 | -- | 307 | Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas. Feature deduction and ensemble design of intrusion detection systems |
| 308 | -- | 321 | Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini. Secure information systems development - a survey and comparison |
| 322 | -- | 333 | Giampaolo Bella, Stefano Bistarelli. Information Assurance for security protocols |
| 334 | -- | 346 | Sihan Qing, Weiping Wen. A survey and trends on Internet worms |