| 5 | -- | 0 | Leila De Floriani. Using 2D Maps for 3D Localization |
| 10 | -- | 13 | Ying-Dar Lin, Jeffrey M. Voas, Antonio Pescapè, Peter Mueller. Communications and Privacy under Surveillance |
| 14 | -- | 24 | Steven M. Bellovin, Matt Blaze, Susan Landau 0001. Insecure Surveillance: Technical Issues with Remote Computer Searches |
| 25 | -- | 33 | Steven J. Murdoch. Insecure by Design: Protocols for Encrypted Phone Calls |
| 34 | -- | 40 | Stephen Farrell. Requirements Analysis Required-Otherwise Targeted Monitoring Enables Pervasive Monitoring |
| 42 | -- | 49 | Robert Koch 0002, Mario Golling, Gabi Dreo Rodosek. How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation |
| 50 | -- | 55 | Hassan Metwalley, Stefano Traverso, Marco Mellia. Using Passive Measurements to Demystify Online Trackers |
| 56 | -- | 63 | Imran Yusof, Al-Sakib Khan Pathan. Mitigating Cross-Site Scripting Attacks with a Content Security Policy |
| 64 | -- | 72 | Amit P. Sheth, Pramod Anantharam, Cory A. Henson. Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape Human Experience |
| 73 | -- | 77 | Hal Berghel. Net Neutrality vs. Net Neutering |
| 78 | -- | 81 | Shams Zawoad, Ragib Hasan. Trustworthy Digital Forensics in the Cloud |
| 82 | -- | 87 | Robert N. Charette. The STEM Anxiety Business |
| 88 | -- | 91 | Charlene Chuck Walrad. The IEEE Computer Society and ACM's Collaboration on Computing Education |
| 92 | -- | 96 | Karen Bartleson. Practical Insights from the Peculiar World of Standards |
| 96 | -- | 99 | Gaurav Misra, Jose M. Such. How Socially Aware Are Social Media Privacy Controls? |
| 100 | -- | 103 | Greg Byrd. Immortal Bits: Managing Our Digital Legacies |
| 104 | -- | 107 | Angelos Stavrou, Daniel Fleck, Constantinos Kolias. On the Move: Evading Distributed Denial-of-Service Attacks |
| 128 | -- | 0 | David Alan Grier. Go, Stop, Go, Stop |