| 1 | -- | 2 | Eugene H. Spafford. Editorial |
| 3 | -- | 0 | Manuel Leithner, Edgar Weippl. Android forensics |
| 4 | -- | 25 | Antonio Maña, Hristo Koshutanski, Ernesto J. Pérez. A trust negotiation based security framework for service provisioning in load-balancing clusters |
| 26 | -- | 32 | M. Oguzhan Külekci. On scrambling the Burrows-Wheeler transform to provide privacy in lossless compression |
| 33 | -- | 39 | Gaobo Yang, Ning Chen, Qin Jiang. A robust hashing algorithm based on SURF for video copy detection |
| 40 | -- | 58 | Gaurav Bhatnagar, Q. M. Jonathan Wu, Balasubramanian Raman. A new robust adjustable logo watermarking scheme |
| 59 | -- | 69 | Xingwen Zhao, Fangguo Zhang. Tracing and revoking scheme for dynamic privileges against pirate rebroadcast |
| 70 | -- | 82 | Sheng Mou, Zhiwen Zhao, Sisi Jiang, Zushun Wu, Jiaojiao Zhu. Feature extraction and classification algorithm for detecting complex covert timing channel |
| 83 | -- | 95 | Princely Ifinedo. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory |
| 96 | -- | 108 | Luis Rodero Merino, Luis Miguel Vaquero, Eddy Caron, Adrian Muresan, Frédéric Desprez. Building safe PaaS clouds: A survey on security in multitenant software platforms |
| 109 | -- | 121 | Deian Stefan, Xiaokui Shu, Danfeng (Daphne) Yao. Robustness of keystroke-dynamics based biometrics against synthetic forgeries |
| 122 | -- | 136 | Timothy H. Lacey, Robert F. Mills, Barry E. Mullins, Richard A. Raines, Mark E. Oxley, Steven K. Rogers. RIPsec - Using reputation-based multilayer security to protect MANETs |
| 137 | -- | 147 | Thomas E. Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer Jr., Michael R. Grimaila, Steven K. Rogers. Malware target recognition via static heuristics |