| 187 | -- | 0 | E. Eugene Schultz. Mobile computing: The next Pandora s Box |
| 201 | -- | 212 | Iosif-Viorel Onut, Ali A. Ghorbani. SVision: A novel visual network-anomaly identification technique |
| 213 | -- | 218 | Tao Li, Zhihong Guan, Xianyong Wu. Modeling and analyzing the spread of active worms based on P2P systems |
| 219 | -- | 228 | Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray. Measuring, analyzing and predicting security vulnerabilities in software systems |
| 229 | -- | 237 | Gerald V. Post, Albert Kagan. Evaluating information security tradeoffs: Restricting access can interfere with user tasks |
| 238 | -- | 245 | Xiaoyan Chen, Bobby N. W. Ma, Cungang Yang. M-CLIQUES: Modified CLIQUES key agreement for secure multicast |
| 246 | -- | 255 | Bogdan Ksiezopolski, Zbigniew Kotulski. Adaptable security mechanism for dynamic environments |
| 256 | -- | 265 | Albin Zuccato. Holistic security management framework applied in electronic commerce |