| 1 | -- | 2 | Dimitris Gritzalis, Jan H. P. Eloff. Editorial |
| 3 | -- | 15 | Fuwen Liu, Hartmut König. A survey of video encryption algorithms |
| 16 | -- | 34 | Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis. An intruder model with message inspection for model checking security protocols |
| 35 | -- | 44 | Georgios P. Spathoulas, Sokratis K. Katsikas. Reducing false positives in intrusion detection systems |
| 45 | -- | 58 | Alexander K. Seewald, Wilfried N. Gansterer. On the detection and identification of botnets |
| 59 | -- | 73 | Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri. Anonymization models for directional location based service environments |
| 74 | -- | 87 | Gabriele Costa, Fabio Martinelli, Paolo Mori, Christian Schaefer, Thomas Walter. Runtime monitoring for next generation Java ME platform |
| 88 | -- | 103 | Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman. The inference problem: Maintaining maximal availability in the presence of database updates |
| 104 | -- | 123 | Yoon Ho Choi, Lunquan Li, Peng Liu, George Kesidis. Worm virulence estimation for the containment of local worm outbreak |
| 124 | -- | 140 | Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera. A survey of coordinated attacks and collaborative intrusion detection |
| 141 | -- | 157 | Carlos Javier Hernandez-Castro, Arturo Ribagorda. Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study |