| 351 | -- | 352 | Eugene H. Spafford. Editorial |
| 353 | -- | 375 | Jonathan J. Davis, Andrew J. Clark. Data preprocessing for anomaly based network intrusion detection: A review |
| 376 | -- | 396 | Slim Rekhis, Noureddine Boudriga. Logic-based approach for digital forensic investigation in communication Networks |
| 397 | -- | 409 | Ignacio J. Martinez-Moyano, Stephen H. Conrad, David F. Andersen. Modeling behavioral considerations related to information security |
| 410 | -- | 426 | Klaus Julisch, Christophe Suter, Thomas Woitalla, Olaf Zimmermann. Compliance by design - Bridging the chasm between auditors and IT architects |
| 427 | -- | 445 | Romain Giot, Mohamad El-Abed, Baptiste Hemery, Christophe Rosenberger. Unconstrained keystroke dynamics authentication with shared secret |
| 446 | -- | 463 | Fernando Pereñiguez-Garcia, Rafael Marín López, Georgios Kambourakis, Stefanos Gritzalis, Antonio F. Gómez-Skarmeta. PrivaKERB: A user privacy framework for Kerberos |
| 464 | -- | 485 | Arne Tauber. A survey of certified mail systems provided on the Internet |
| 486 | -- | 497 | Clay Posey, Rebecca J. Bennett, Tom L. Roberts. Understanding the mindset of the abusive insider: An examination of insiders causal reasoning following internal security changes |
| 498 | -- | 513 | Amit Sachan, Sabu Emmanuel. Rights violation detection in multi-level digital rights management system |
| 514 | -- | 524 | Ding Yuxin, Yuan Xuebing, Zhou Di, Dong Li, An Zhanchao. Feature representation and selection in malicious code detection methods based on static system calls |
| 525 | -- | 537 | Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Youki Kadobayashi. Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks |
| 538 | -- | 546 | Jianhua Yang, David Woolbright. Correlating TCP/IP Packet contexts to detect stepping-stone intrusion |