| 1 | -- | 0 | Eugene H. Spafford. Editorial |
| 2 | -- | 3 | Eugene H. Spafford. Security, technology, publishing, and ethics (part II) |
| 4 | -- | 12 | Zac Sadan, David G. Schwartz. WhiteScript: Using social network analysis parameters to balance between browser usability and malware exposure |
| 13 | -- | 27 | Qijun Gu, Christopher Ferguson, Rizwan Noorani. A study of self-propagating mal-packets in sensor networks: Attacks and defenses |
| 28 | -- | 34 | Hua Guo, Yi Mu, Zhoujun Li, Xiyong Zhang. An efficient and non-interactive hierarchical key agreement protocol |
| 35 | -- | 49 | Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan Mirza. Designing a cluster-based covert channel to evade disk investigation and forensics |
| 50 | -- | 62 | Sung-Whan Woo, HyunChul Joh, Omar H. Alhazmi, Yashwant K. Malaiya. Modeling vulnerability discovery process in Apache and IIS HTTP servers |
| 63 | -- | 80 | Christos Xenakis, Christoforos Panos, Ioannis Stavrakakis. A comparative evaluation of intrusion detection architectures for mobile ad hoc networks |