| 6 | -- | 8 | David Alan Grier. Leisure Science |
| 11 | -- | 13 | Brian M. Gaff, Catherine J. Toppin. Ten Things to Know When Your Patent Application Is Allowed |
| 14 | -- | 16 | Neal Leavitt. IPv6: Any Closer to Adoption? |
| 21 | -- | 22 | Rolf Oppliger. Security and Privacy in an Online World |
| 23 | -- | 28 | Saeed Abu-Nimeh, Thomas M. Chen, Omar Alzubi. Malicious and Spam Posts in Online Social Networks |
| 29 | -- | 36 | Hossein Saiedian, Dan Broyle. Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives |
| 38 | -- | 43 | Florian Kerschbaum, Axel Schröpfer, Antonio Zilli, Richard Pibernik, Octavian Catrina, Sebastiaan de Hoogh, Berry Schoenmakers, Stelvio Cimato, Ernesto Damiani. Secure Collaborative Supply-Chain Management |
| 44 | -- | 50 | Francisco Rocha, Salvador Abreu, Miguel Correia. The Final Frontier: Confidentiality and Privacy in the Cloud |
| 51 | -- | 58 | Rodrigo Roman, Pablo Najera, Javier Lopez. Securing the Internet of Things |
| 60 | -- | 68 | Siani Pearson, Marco Casassa Mont. Sticky Policies: An Approach for Managing Privacy across Multiple Parties |
| 69 | -- | 72 | Frederick Ryckbosch, Stijn Polfliet, Lieven Eeckhout. Trends in Server Energy Proportionality |
| 73 | -- | 79 | Vivek Menon, Bharat Jayaraman, Venu Govindaraju. The Three Rs of Cyberphysical Spaces |
| 93 | -- | 96 | Henry Lieberman, Karthik Dinakar, Birago Jones. Let's Gang Up on Cyberbullying |
| 97 | -- | 101 | Suparna Bhattacharya, K. Gopinath, Karthick Rajamani, Manish Gupta. Software Bloat and Wasted Joules: Is Modularity a Hurdle to Green Software? |
| 102 | -- | 104 | Christopher L. Huntley. Onshore Mobile App Development: Successes and Challenges |
| 106 | -- | 108 | Karl Ricanek Jr., Benjamin Barbour. What Are Soft Biometrics and How Can They Be Used? |
| 112 | -- | 111 | Alessio Malizia, Kai A. Olsen. Has Everything Been Invented? On Software Development and the Future of Apps |