| 2 | -- | 4 | James A. Hendler. A Letter from the Editor: Avoiding Rejection |
| 6 | -- | 9 | Danna Voth. In the News |
| 10 | -- | 11 | Sara Reese Hedberg. Robert Milne (1956-2005) |
| 12 | -- | 16 | Hsinchun Chen, Fei-Yue Wang. Guest Editors Introduction: Artificial Intelligence for Homeland Security |
| 17 | -- | 25 | Joseph Kopena, Evan Sultanik, Gaurav Naik, Iris Howley, Maxim Peysakhov, Vincent A. Cicirello, Moshe Kam, William C. Regli. Service-Based Computing on Manets: Enabling Dynamic Interoperability of First Responders |
| 26 | -- | 35 | Monica Crubézy, Martin J. O Connor, David L. Buckeridge, Zachary Pincus, Mark A. Musen. Ontology-Centered Syndromic Surveillance for Bioterrorism |
| 36 | -- | 43 | Thomas O. Meservy, Matthew L. Jensen, John Kruse, Douglas P. Twitchell, Judee K. Burgoon, Dimitris N. Metaxas, Jay F. Nunamaker Jr.. Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior |
| 44 | -- | 51 | Yilu Zhou, Edna Reid, Jialun Qin, Hsinchun Chen, Guanpi Lai. US Domestic Extremist Groups on the Web: Link and Content Analysis |
| 52 | -- | 57 | Yiyu Yao, Fei-Yue Wang, Jue Wang, Daniel Dajun Zeng. Rule + Exception Strategies for Security Information Analysis |
| 58 | -- | 66 | Mohan M. Trivedi, Tarak Gandhi, Kohsia S. Huang. Distributed Interactive Video Arrays for Event Capture and Enhanced Situational Awareness |
| 67 | -- | 75 | Ahmed Abbasi, Hsinchun Chen. Applying Authorship Analysis to Extremist-Group Web Forum Messages |
| 76 | -- | 86 | John Yen, Robert Popp, George Cybenko, Latanya Sweeney, Paul Rosenzweig. Homeland Security |
| 87 | -- | 91 | Adam Souzis. Building a Semantic Wiki |
| 92 | -- | 96 | Fei-Yue Wang. Agent-Based Control for Networked Traffic Management Systems |