| 377 | -- | 390 | Ying Zeng, Fenlin Liu, Xiangyang Luo, Shiguo Lian. Abstract interpretation-based semantic framework for software birthmark |
| 391 | -- | 401 | Muhammed Naeem Ahmed Khan. Performance analysis of Bayesian networks and neural networks in classification of file system activities |
| 402 | -- | 417 | Zhijun Wu, Haitao Zhang, Minghua Wang, Bao-song Pei. MSABMS-based approach of detecting LDoS attack |
| 418 | -- | 436 | A. Nicholson, S. Webber, S. Dyer, T. Patel, H. Janicke. SCADA security in the light of Cyber-Warfare |
| 437 | -- | 446 | Ahmed I. Sallam, El-Sayed El-Rabaie, Osama S. Faragallah. Encryption-based multilevel model for DBMS |
| 447 | -- | 464 | Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo. Dynamic risk-based decision methods for access control systems |
| 465 | -- | 483 | San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov. Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures |
| 484 | -- | 496 | Hyoungshick Kim, Jun Ho Huh. PIN selection policies: Are they really effective? |
| 497 | -- | 523 | Youna Jung, James B. D. Joshi. CRiBAC: Community-centric role interaction based access control model |
| 524 | -- | 539 | Pablo Neira Ayuso, Rafael M. Gasca, Laurent Lefèvre. FT-FW: A cluster-based fault-tolerant architecture for stateful firewalls |
| 540 | -- | 556 | Antonios Gouglidis, Ioannis Mavridis. domRBAC: An access control model for modern collaborative systems |
| 557 | -- | 568 | Jorge Blasco Alís, Julio César Hernández Castro, Juan E. Tapiador, Arturo Ribagorda. Bypassing information leakage protection with trusted applications |
| 569 | -- | 596 | Bogdan Ksiezopolski. QoP-ML: Quality of protection modelling language for cryptographic protocols |
| 597 | -- | 611 | Shari Lawrence Pfleeger, Deanna D. Caputo. Leveraging behavioral science to mitigate cyber security risk |
| 612 | -- | 628 | Matthew Van Gundy, Hao Chen. Noncespaces: Using randomization to defeat cross-site scripting attacks |
| 629 | -- | 0 | Aleksandar Hudic, Edgar Weippl. Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure |
| 630 | -- | 632 | Nora Cuppens-Boulahia. Penetration Tester's Open Source Toolkit |
| 633 | -- | 0 | Katina Michael. Securing the Cloud: Cloud Computer Security Techniques and Tactics |
| 634 | -- | 635 | Katina Michael. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice |
| 636 | -- | 0 | Edgar Weippl, Manuel Leithner. Enterprise Security for the Executive |
| 637 | -- | 0 | William J. Caelli. Cyber Warfare - Techniques, Tactics and Tools for Security Practitioners |
| 638 | -- | 0 | Manuel Leithner, Edgar R. Weippl. Thor's Microsoft Security Bible |
| 639 | -- | 0 | Manuel Leithner, Edgar Weippl. XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts |