| 553 | -- | 554 | Eugene H. Spafford. Editorial for 30/8 |
| 555 | -- | 570 | Da Zhang, Chai Kiat Yeo. Distributed Court System for intrusion detection in mobile ad hoc networks |
| 571 | -- | 579 | Trent Jaeger, Paul C. van Oorschot, Glenn Wurster. Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification |
| 580 | -- | 596 | Argyris Arnellos, Dimitrios Lekkas, Dimitrios Zissis, Thomas Spyrou, John Darzentas. Fair digital signing: The structural reliability of signed documents |
| 597 | -- | 612 | Nayantara Mallesh, Matthew Wright. An analysis of the statistical disclosure attack and receiver-bound cover |
| 613 | -- | 624 | Hugo Gascon, Agustín Orfila, Jorge Blasco Alís. Analysis of update delays in signature-based network intrusion detection systems |
| 625 | -- | 642 | Constantinos Kolias, Georgios Kambourakis, M. Maragoudakis. Swarm intelligence in intrusion detection: A survey |
| 643 | -- | 678 | Eleftheria Makri, Elisavet Konstantinou. Constant round group key agreement protocols: A comparative study |
| 679 | -- | 691 | Nikos Mavrogiannopoulos, Nessim Kisserli, Bart Preneel. A taxonomy of self-modifying code for obfuscation |
| 692 | -- | 704 | Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe. Combining sketches and wavelet analysis for multi time-scale network anomaly detection |
| 705 | -- | 718 | Giampaolo Bella, Rosario Giustolisi, Salvatore Riccobene. Enforcing privacy in e-commerce by balancing anonymity and trust |
| 719 | -- | 731 | Kim-Kwang Raymond Choo. The cyber threat landscape: Challenges and future research directions |
| 732 | -- | 747 | Lin Huang, Mark Stamp. Masquerade detection using profile hidden Markov models |
| 748 | -- | 769 | Ludwig Fuchs, Günther Pernul, Ravi S. Sandhu. Roles in information security - A survey and classification of the research area |
| 770 | -- | 779 | James S. Okolica, Gilbert L. Peterson. Windows driver memory analysis: A reverse engineering methodology |
| 780 | -- | 790 | GuangXu Zhou, Murat Demirer, Coskun Bayrak, Licheng Wang. Enable delegation for RBAC with Secure Authorization Certificate |
| 791 | -- | 802 | Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani. Estimating botnet virulence within mathematical models of botnet propagation dynamics |
| 803 | -- | 814 | Nigel J. Martin, John L. Rice. Cybercrime: Understanding and addressing the concerns of stakeholders |
| 815 | -- | 829 | Elias Abou Charanek, Hoseb Dermanilian, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab. 2: Energy efficient voice over IP privacy |
| 830 | -- | 839 | Jung-San Lee, Ming-Huang Hsieh. An interactive mobile SMS confirmation method using secret sharing technique |