| 267 | -- | 268 | E. Eugene Schultz. Struggles in the academic side of infosec |
| 276 | -- | 289 | Eirik Albrechtsen. A qualitative study of users view on information security |
| 290 | -- | 299 | Sushil K. Sharma, Joshua Sefchek. Teaching information systems security courses: A hands-onapproach |
| 300 | -- | 310 | Hyoungjoo Lee, Sungzoon Cho. Retraining a keystroke dynamics-based authenticator with impostor patterns |
| 311 | -- | 318 | Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura. Masquerade detection by boosting decision stumps using UNIX commands |
| 319 | -- | 330 | Ming-Chiang Hu, Der-Chyuan Lou, Ming-Chang Chang. Dual-wrapped digital watermarking scheme for image copyright protection |
| 331 | -- | 337 | Yuh-Min Tseng. A resource-constrained group key agreement protocol for imbalanced wireless networks |
| 338 | -- | 347 | Jun Li, Paul Knickerbocker. Functional similarities between computer worms and biological pathogens |