| 349 | -- | 360 | Hamid Reza Shahriari, Rasool Jalili. Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities |
| 361 | -- | 372 | Guido Schryen. The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis |
| 373 | -- | 380 | Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris. Authentication in a layered security approach for mobile ad hoc networks |
| 381 | -- | 390 | Chih-Chien Wang, Sheng-Yi Chen. Using header session messages to anti-spamming |
| 391 | -- | 400 | Xosé A. Vila Sobrino, A. Schuster, Adolfo Riera. Security for a Multi-Agent System based on JADE |
| 401 | -- | 409 | Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan. Comparative studies on authentication and key exchange methods for 802.11 wireless LAN |
| 410 | -- | 417 | Steven Furnell, P. Bryant, Andrew D. Phippen. Assessing the security perceptions of personal Internet users |