| 325 | -- | 326 | Dimitris Gritzalis, Javier Lopez. Editorial |
| 327 | -- | 340 | Siddharth Bhatt, Radu Sion, Bogdan Carbunar. A personal mobile DRM manager for smartphones |
| 341 | -- | 358 | Azzam Mourad, Andrei Soeanu, Marc-André Laverdière, Mourad Debbabi. New aspect-oriented constructs for security hardening concerns |
| 359 | -- | 380 | Djamel Fawzi Hadj Sadok, Eduardo Souto, Eduardo Feitosa, Judith Kelner, Lars Westberg. RIP - A robust IP access architecture |
| 381 | -- | 394 | Michael Edward Edge, Pedro R. Falcone Sampaio. A survey of signature based methods for financial fraud detection |
| 395 | -- | 409 | Ibrahim Kamel, Qutaiba Albluwi. A robust software watermarking for copyright protection |
| 410 | -- | 420 | Mohammad Mannan, Paul C. van Oorschot. Reducing threats from flawed security APIs: The banking PIN case |
| 421 | -- | 432 | Joon Son, Jim Alves-Foss. A formal framework for real-time information flow analysis |
| 433 | -- | 449 | Francesco Palmieri, Ugo Fiore. Providing true end-to-end security in converged voice over IP infrastructures |
| 450 | -- | 465 | Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou. Probabilistic model checking for the quantification of DoS security threats |
| 466 | -- | 475 | Yang Li, Jun-Li Wang, Zhihong Tian, Tianbo Lu, Chen Young. Building lightweight intrusion detection system using wrapper-based feature selection mechanisms |
| 476 | -- | 490 | Eirik Albrechtsen, Jan Hovden. The information security digital divide between information security managers and users |