| 3 | -- | 7 | Jose M. Such, Natalia Criado, Laurent Vercouter, Martin Rehák. Intelligent Cybersecurity Agents [Guest editors' introduction] |
| 8 | -- | 15 | Ozgur Kafaly, Nirav Ajmeri, Munindar P. Singh. Revani: Revising and Verifying Normative Specifications for Privacy |
| 16 | -- | 22 | Jan Jusko, Martin Rehák, Jan Stiborek, Jan Kohout, Tomás Pevný. Using Behavioral Similarity for Botnet Command-and-Control Discovery |
| 24 | -- | 30 | Karel Durkota, Viliam Lisý, Christopher Kiekintveld, Branislav Bosanský, Michal Pechoucek. Case Studies of Network Defense with Attack Graph Games |
| 32 | -- | 39 | Lei Gao, Lin Qi, Ling Guan. Online Behavioral Analysis with Application to Emotion State Identification |
| 40 | -- | 48 | Junpeng Guo, Yanlin Zhu, Aiai Li, Qipeng Wang, Weiguo Han. A Social Influence Approach for Group User Modeling in Group Recommendation Systems |
| 50 | -- | 56 | Sungil Kim, Heeyoung Kim, Younghwan Namkoong. Ordinal Classification of Imbalanced Data with Application in Emergency and Disaster Information Services |
| 58 | -- | 64 | Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi. DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection |
| 66 | -- | 75 | Longbing Cao. Data Science: Nature and Pitfalls |
| 76 | -- | 82 | Neil McBride, Robert R. Hoffman. Bridging the Ethical Gap: From Human Principles to Robot Instructions |
| 83 | -- | 88 | Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano. Building the Web of Knowledge with Smart IoT Applications |
| 89 | -- | 92 | Evangelos Kalampokis, Efthimios Tambouris, Konstantinos A. Tarabanis. Linked Open Cube Analytics Systems: Potential and Challenges |
| 93 | -- | 96 | Douglas H. Fisher, Zimei Bian, Selina Chen. Incorporating Sustainability into Computing Education |