| 641 | -- | 642 | Eugene H. Spafford. Editorial |
| 643 | -- | 658 | Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis. A multi-layer Criticality Assessment methodology based on interdependencies |
| 659 | -- | 679 | Teodor Sommestad, Mathias Ekstedt, Pontus Johnson. A probabilistic relational model for security risk analysis |
| 680 | -- | 685 | Theodoros Kavallaris, Vasilios Katos. On the detection of pod slurping attacks |
| 686 | -- | 696 | Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li. Implementing a passive network covert timing channel |
| 697 | -- | 711 | M. Francisca Hinarejos, Jose L. Muñoz, Jordi Forné, Oscar Esparza. PREON: An efficient cascade revocation mechanism for delegation paths |
| 712 | -- | 723 | Gina C. Tjhai, Steven Furnell, Maria Papadaki, Nathan L. Clarke. A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm |