| 491 | -- | 492 | Dimitris Gritzalis, Steven Furnell. Editorial |
| 493 | -- | 508 | Kenneth J. Knapp, R. Franklin Morris Jr., Thomas E. Marshall, Terry Anthony Byrd. Information security policy: An organizational-level process model |
| 509 | -- | 520 | Sara Kraemer, Pascale Carayon, John Clem. Human and organizational factors in computer and information security: Pathways to vulnerabilities |
| 521 | -- | 535 | Howard Chivers, John A. Clark, Pau-Chen Cheng. Risk profiles and distributed risk assessment |
| 536 | -- | 544 | Keshnee Padayachee, Jan H. P. Eloff. Adapting usage control as a deterrent to address the inadequacies of access controls |
| 545 | -- | 556 | Félix Gómez Mármol, Gregorio Martínez Pérez. Security threats scenarios in trust and reputation models for distributed systems |
| 557 | -- | 565 | Hongwei Lu, Bailing Liu. DFANS: A highly efficient strategy for automated trust negotiation |
| 566 | -- | 577 | Nicola Dragoni, Fabio Massacci, Thomas Walter, Christian Schaefer. What the heck is this application doing? - A security-by-contract architecture for pervasive services |
| 578 | -- | 591 | Dimitris Geneiatakis, Nikos Vrakas, Costas Lambrinoudakis. Utilizing bloom filters for detecting flooding attacks against SIP based services |
| 592 | -- | 604 | Engin Kirda, Nenad Jovanovic, Christopher Kruegel, Giovanni Vigna. Client-side cross-site scripting protection |
| 605 | -- | 614 | Zonghua Zhang, Pin-Han Ho, Liwen He. Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach |
| 615 | -- | 627 | Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis. Confidence in smart token proximity: Relay attacks revisited |
| 628 | -- | 636 | Fangwei Wang, Yunkai Zhang, Jianfeng Ma. Defending passive worms in unstructured P2P networks based on healthy file dissemination |
| 637 | -- | 647 | Scott E. Coull, Boleslaw K. Szymanski. On the development of an internetwork-centric defense for scanning worms |
| 648 | -- | 659 | Suleyman Kondakci. A concise cost analysis of Internet malware |
| 660 | -- | 669 | Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno. Providing secure execution environments with a last line of defense against Trojan circuit attacks |
| 670 | -- | 682 | Özdemir Çetin, Ahmet Turan Özcerit. A new steganography algorithm based on color histograms for data embedding into raw video streams |
| 683 | -- | 697 | S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj. Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system |
| 698 | -- | 709 | Ibrahim Kamel. A schema for protecting the integrity of databases |
| 710 | -- | 722 | Refik Samet. Design and implementation of highly reliable dual-computer systems |