| 233 | -- | 234 | Stephen D. Wolthusen. Editorial |
| 235 | -- | 240 | Steven Furnell, Valleria Tsaganidi, Andrew D. Phippen. Security beliefs and barriers for novice Internet users |
| 241 | -- | 253 | Yacine Rezgui, Adam Marks. Information security awareness in higher education: An exploratory study |
| 254 | -- | 259 | H. A. Kruger, W. D. Kearney. Consensus ranking - An ICT security awareness case study |
| 260 | -- | 284 | Anthony J. Palmer. Criteria to evaluate Automated Personal Identification Mechanisms |
| 285 | -- | 297 | Dimitris Geneiatakis, Costas Lambrinoudakis, Georgios Kambourakis. An ontology-based policy for deploying secure SIP-based VoIP services |
| 298 | -- | 308 | Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos. Secure log management for privacy assurance in electronic communications |
| 309 | -- | 322 | Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez. An optimistic fair exchange protocol based on signature policies |
| 323 | -- | 334 | Arati Baliga, Liviu Iftode, Xiaoxin Chen. Automated containment of rootkits attacks |
| 335 | -- | 354 | Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro. Evaluation of a low-rate DoS attack against application servers |
| 355 | -- | 359 | Jose R. C. Piqueira, Adolfo A. de Vasconcelos, Carlos E. C. J. Gabriel, Vanessa O. Araujo. Dynamic models for computer viruses |