| 10 | -- | 0 | David A. Bader. Evolving MPI+X Toward Exascale |
| 12 | -- | 16 | Domenic Forte, Ron Perez, Yongdae Kim, Swarup Bhunia. Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction] |
| 18 | -- | 26 | Parrish Ralston, David Fry, Scott Suko, Bryce Winters, Matthew King, Robert Kober. Defeating counterfeiters with microscopic dielets embedded in electronic components |
| 28 | -- | 34 | Joseph P. Skudlarek, Tom Katsioulas, Michael Chen. A Platform Solution for Secure Supply-Chain and Chip Life-Cycle Management |
| 36 | -- | 43 | Sk Subidh Ali, Mohamed Ibrahim, Jeyavijayan Rajendran, Ozgur Sinanoglu, Krishnendu Chakrabarty. Supply-Chain Security of Digital Microfluidic Biochips |
| 44 | -- | 52 | Wei Hu, Baolei Mao, Jason Oberg, Ryan Kastner. Detecting Hardware Trojans with Gate-Level Information-Flow Tracking |
| 54 | -- | 61 | Kan Xiao, Adib Nahiyan, Mark Tehranipoor. Security Rule Checking in IC Design |
| 62 | -- | 69 | Olav Lysne, Kjell Jørgen Hole, Christian Otterstad, Øyvind Ytrehus, Raymond Aarseth, Jorgen Tellnes. Vendor Malware: Detection Limits and Mitigation |
| 70 | -- | 79 | Kim Schaffer, Jeffrey Voas. What Happened to Formal Methods for Security? |
| 80 | -- | 83 | Doug Terry. Toward a New Approach to IoT Fault Tolerance |
| 84 | -- | 87 | Claude Y. Laporte, Rory V. O'Connor. Systems and Software Engineering Standards for Very Small Entities: Accomplishments and Overview |
| 88 | -- | 91 | Erik P. DeBenedictis. The Search for Computing's Secretariat |
| 92 | -- | 97 | Celia Paulsen. Cybersecuring Small Businesses |
| 98 | -- | 102 | Hal Berghel. The Pollyanna Delusion |
| 104 | -- | 108 | Xiangshi Ren. Rethinking the Relationship between Humans and Computers |
| 109 | -- | 111 | Evan Atherton. Science Fiction Prototyping at Work |
| 112 | -- | 116 | Amir Vahid Dastjerdi, Rajkumar Buyya. Fog Computing: Helping the Internet of Things Realize Its Potential |
| 156 | -- | 0 | David Alan Grier. Changing Trust |