| 8 | -- | 9 | Mohamed Ibrahim, Krishnendu Chakrabarty. Digital-Microfluidic Biochips |
| 11 | -- | 14 | Elisa Bertino. Security Threats: Protecting the New Cyberfrontier |
| 15 | -- | 21 | Daniel Vecchiato, Marco Vieira, Eliane Martins. The Perils of Android Security Configuration |
| 22 | -- | 30 | David Kotz, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner. Privacy and Security in Mobile Health: A Research Agenda |
| 31 | -- | 37 | Ronald Prescott Loui, Terrence D. Loui. How to Survive a Cyber Pearl Harbor |
| 38 | -- | 46 | V. S. Subrahmanian, Amos Azaria, Skylar Durst, Vadim Kagan, Aram Galstyan, Kristina Lerman, Linhong Zhu, Emilio Ferrara, Alessandro Flammini, Filippo Menczer. The DARPA Twitter Bot Challenge |
| 48 | -- | 55 | Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey Voas, Zhi Quan Zhou. Metamorphic Testing for Cybersecurity |
| 56 | -- | 64 | Qingpeng Zhang, Daniel Dajun Zeng, Fei-Yue Wang, Ronald L. Breiger, James A. Hendler. Brokers or Bridges? Exploring Structural Holes in a Crowdsourcing System |
| 66 | -- | 74 | Qiuming Luo, Feng Xiao, Zhong Ming, Hao Li, Jianyong Chen, Jianhua Zhang. Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System |
| 77 | -- | 79 | Sorel Reisman, Eli Shmueli. Opening the Instructional Doors to Computer Science and IT-Finally |
| 80 | -- | 83 | Jeffrey Voas. Demystifying the Internet of Things |
| 84 | -- | 87 | Erik P. DeBenedictis. Rebooting Computers as Learning Machines |
| 88 | -- | 92 | Daniel Ullrich, Andreas Butz. Social Robots for the 21st Century |
| 95 | -- | 97 | Brian David Johnson. Science Fiction and the Coming Age of Sentient Tools |
| 98 | -- | 102 | Kateryna Netkachova, Robin E. Bloomfield. Security-Informed Safety |
| 120 | -- | 0 | David Alan Grier. Scientific Conversations |