| 4 | -- | 5 | Ron Vetter. Security Issues for the Internet of Drones |
| 9 | -- | 11 | Erich J. Neuhold. 50 & 25 Years Ago |
| 10 | -- | 0 | Ergun Akleman. Computing Through Time |
| 12 | -- | 13 | Joanna F. DeFranco, Jeffrey M. Voas. Computing New Medicines |
| 14 | -- | 18 | Riccardo Mariani, Francesca Rossi, Rita Cucchiara, Marco Pavone 0001, Barnaby Simkin, Ansgar Koene, Jochen Papenbrock. Trustworthy AI - Part 1 |
| 20 | -- | 28 | Amika M. Singh, Munindar P. Singh. Wasabi: A Conceptual Model for Trustworthy Artificial Intelligence |
| 29 | -- | 39 | David Fernández Llorca, Emilia Gómez. Trustworthy Artificial Intelligence Requirements in the Autonomous Driving Domain |
| 40 | -- | 47 | Mohammad Reza Mousavi 0001, Ana Cavalcanti 0001, Michael Fisher 0001, Louise A. Dennis, Robert M. Hierons, Bilal Y. Kaddouh, Effie Lai-Chong Law, Robert C. Richardson, Jan Oliver Ringer, Ivan Tyukin, Jim Woodcock 0001. Trustworthy Autonomous Systems Through Verifiability |
| 48 | -- | 56 | Pin-Yu Chen, Payel Das. AI Maintenance: A Robustness Perspective |
| 57 | -- | 66 | Annachiara Ruospo, Ernesto Sánchez 0001, Lucas Matana Luza, Luigi Dilillo, Marcello Traiola, Alberto Bosio. A Survey on Deep Learning Resilience Assessment Methodologies |
| 67 | -- | 81 | Anabel Martínez-Vargas, Jesús A. Gómez-Avilés, MA Cosío León, Ángel G. Andrade. Explaining the Walking Through of a Team of Algorithms |
| 82 | -- | 92 | Skyler Speakman, Girmaw Abebe Tadesse, Celia Cintas, William Ogallo, Tanya Akumu, Adebayo Oshingbesan. Detecting Systematic Deviations in Data and Models |
| 93 | -- | 100 | Prahalad Kashyap Haresamudram, Stefan Larsson, Fredrik Heintz. Three Levels of AI Transparency |
| 101 | -- | 105 | Alexis Richter, Josh Yamamoto, Eitan Frachtenberg. Why Are There So Few Women in Computer Systems Research? |
| 106 | -- | 110 | Mikko Rajanen. Open Source Usability and User Experience |
| 111 | -- | 115 | Sorel Reisman. Metaverse-Based Instructional Settings: Matters That Matter |
| 116 | -- | 120 | Claudia Andruetto, Rafia Inam, Martin Törngren. Adding Cyberphysical Systems to the Engineering Education "Pi" |
| 121 | -- | 128 | Norita B. Ahmad, Areeba Hamid. Will Data Science Outrun the Data Scientist? |
| 129 | -- | 133 | Mark Campbell 0002. Tomorrow's Applications Require IT Operations That Are Autonomous, Ubiquitous, and Smarter - In a Word, Invisible |
| 134 | -- | 136 | Pete Ford. The Quantum Cybersecurity Threat May Arrive Sooner Than You Think |
| 137 | -- | 142 | Nir Kshetri. National Metaverse Strategies |
| 143 | -- | 148 | Riccardo Mariani, Jyotika Athavale, Andrea Matteucci, Darren Galpin, Rob Schaaf. Functional Safety Standards Committee: Results and Perspectives |