| 123 | -- | 0 | Stephen D. Wolthusen. From the Editor-in-Chief |
| 124 | -- | 135 | Mariana Gerber, Rossouw von Solms. Information security requirements - Interpreting the legal aspects |
| 136 | -- | 153 | Dimitris Gritzalis, Yannis Mallios. A SIP-oriented SPIT Management Framework |
| 154 | -- | 167 | Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff. SMSSec: An end-to-end protocol for secure SMS |
| 168 | -- | 175 | Rachid Beghdad. Critical study of neural networks in detecting intrusions |
| 176 | -- | 187 | Wes Masri, Andy Podgurski. Application-based anomaly intrusion detection with dynamic information flow analysis |
| 188 | -- | 196 | Shaojun Zhang, Jianhua Li, Xiuzhen Chen, Lei Fan. Building network attack graph for alert causal correlation |
| 197 | -- | 215 | Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timothy E. Levin. Enforcing memory policy specifications in reconfigurable hardware |
| 216 | -- | 223 | Hung-Yu Chien. Practical anonymous user authentication scheme with security proof |
| 224 | -- | 231 | E. Kritzinger, E. Smith. Information security management: An information security retrieval and awareness model for industry |