| 149 | -- | 150 | Eugene H. Spafford. Editorial |
| 151 | -- | 163 | Hisham Al-Assam, Sabah Jassim. Security evaluation of biometric keys |
| 164 | -- | 175 | Hannes Holm. Performance of automated network vulnerability scanning at remediating security issues |
| 176 | -- | 191 | Jinpeng Wei, Calton Pu. Toward a general defense against kernel queue hooking attacks |
| 192 | -- | 205 | Da Xiao, Yan Yang, Wenbin Yao, Chunhua Wu, Jianyi Liu, Yixian Yang. Multiple-File Remote Data Checking for cloud storage |
| 206 | -- | 220 | Divakaran Liginlal, Inkook Sim, Lara Khansa, Paul Fearn. HIPAA Privacy Rule compliance: An interpretive study using Norman's action theory |
| 221 | -- | 232 | Hyeun-Suk Rhee, Young U. Ryu, Cheong-Tag Kim. Unrealistic optimism on information security management |
| 233 | -- | 248 | Yu-Chi Chung, Ming-Chuan Wu, Yih-Chang Chen, Wen-Kui Chang. A Hot Query Bank approach to improve detection performance against SQL injection attacks |
| 249 | -- | 250 | Katina Michael. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up |
| 251 | -- | 0 | Jennifer L. Bayuk. Cyber Attacks |
| 252 | -- | 0 | Manuel Leithner, Edgar Weippl. Coding for Penetration Testers |
| 253 | -- | 270 | Richard Macfarlane, William J. Buchanan, Elias Ekonomou, Omair Uthmani, Lu Fan, Owen Lo. Formal security policy implementations in network firewalls |