| 347 | -- | 348 | E. Eugene Schultz. Non-infosec professionals in infosec? |
| 349 | -- | 358 | E. Eugene Schultz. Security views |
| 359 | -- | 361 | Richard LeVine. Technology evolution drives need for greater information technology security |
| 362 | -- | 363 | C. Andrew. The five Ps of patch management: Is there a simple way for businesses to develop and deploy an advanced security patch management strategy? |
| 364 | -- | 370 | Alex Biryukov, Joseph Lano, Bart Preneel. Recent attacks on alleged SecurID and their practical implications |
| 371 | -- | 380 | G. Magklaras, Steven Furnell. A preliminary model of end user sophistication for insider threat prediction in IT systems |
| 381 | -- | 386 | Chou Chen Yang, Ren-Chiun Wang, Wei-Ting Liu. Secure authentication scheme for session initiation protocol |
| 387 | -- | 398 | D. DasGupta, F. Gonzalez, K. Yallapu, J. Gomez, R. Yarramsettii. CIDS: An agent-based intrusion detection system |
| 399 | -- | 408 | Heba Kamal Aslan. Two-level controllers hierarchy for a scalable and distributed multicast security protocol |
| 409 | -- | 424 | Anat Hovav, John D Arcy. Capital market reaction to defective IT products: The case of computer viruses |