| 155 | -- | 0 | E. Eugene Schultz. Special systems: Overlooked sources of security risk? |
| 163 | -- | 164 | Danny Bradbury. Modeling network security |
| 165 | -- | 168 | Sebastiaan H. von Solms. Information Security - The Fourth Wave |
| 169 | -- | 183 | Soojin Lee, Byungchun Chung, Heeyoul Kim, Yunho Lee, Chanil Park, Hyunsoo Yoon. Real-time analysis of intrusion detection alerts via correlation |
| 184 | -- | 189 | Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak. A novel remote user authentication scheme using bilinear pairings |
| 190 | -- | 200 | Wenliang Du, Mingdong Shang, Haizhi Xu. A novel approach for computer security education using Minix instructional operating system |
| 201 | -- | 206 | Jun Shao, Zhenfu Cao. A traceable threshold signature scheme with multiple signing policies |
| 207 | -- | 212 | John Ayoade. Security implications in RFID and authentication processing framework |
| 213 | -- | 220 | Ming Li. Change trend of averaged Hurst parameter of traffic under DDOS flood attacks |
| 221 | -- | 228 | Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley. An empirical examination of the reverse engineering process for binary files |
| 229 | -- | 236 | Guillermo González-Talaván. A simple, configurable SMTP anti-spam filter: Greylists |