| 641 | -- | 642 | Eugene H. Spafford. Editorial |
| 643 | -- | 652 | Atif Ahmad, Justin Hadgkiss, Anthonie B. Ruighaver. Incident response teams - Challenges in supporting the organisational security function |
| 653 | -- | 672 | Sergio Martínez, David Sánchez 0001, Aïda Valls. Semantic adaptive microaggregation of categorical microdata |
| 673 | -- | 680 | Keshnee Padayachee. Taxonomy of compliant information security behavior |
| 681 | -- | 703 | Anton V. Uzunov, Eduardo B. Fernández, Katrina Falkner. Securing distributed systems using patterns: A survey |
| 704 | -- | 716 | Diqun Yan, Rangding Wang, Xianmin Yu, Jie Zhu. Steganography for MP3 audio by exploiting the rule of window switching |
| 717 | -- | 726 | Yasin Uzun, Kemal Bicakci. A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset |
| 727 | -- | 735 | Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe. WAVE-CUSUM: Improving CUSUM performance in network anomaly detection by means of wavelet analysis |
| 736 | -- | 737 | Jennifer L. Bayuk. A programmer's perspective |
| 738 | -- | 0 | Manuel Leithner, Edgar R. Weippl. Low Tech Hacking |