| 237 | -- | 0 | E. Eugene Schultz. Representing information security fairly and accurately |
| 247 | -- | 256 | Reinhardt A. Botha, Tshepo G. Gaadingwe. Reflecting on 20 SEC conferences |
| 257 | -- | 264 | Richard Ford, Mark Bush, Alexander Bulatov. Predation and the cost of replication: New approaches to malware prevention? |
| 265 | -- | 273 | Wee Hock Desmond Ng, Haitham S. Cruickshank, Zhili Sun. Scalable balanced batch rekeying for secure group communication |
| 274 | -- | 288 | Hassan Artail, Haïdar Safa, Malek Sraj, Iyad Kuwatly, Zaid Al Masri. A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks |
| 289 | -- | 296 | H. A. Kruger, W. D. Kearney. A prototype for assessing information security awareness |
| 297 | -- | 306 | Ashraf Elgohary, Tarek S. Sobh, Mohammed Zaki. Design of an enhancement for SSL/TLS protocols |
| 307 | -- | 314 | Chin-Chen Chang, Jung-San Lee. An anonymous voting mechanism based on the key exchange protocol |