8 | -- | 26 | Dimitris Gritzalis. Embedding privacy in IT applications development |
27 | -- | 44 | A. S. Sodiya, H. O. D. Longe, A. T. Akinwale. A new two-tiered strategy to intrusion detection |
45 | -- | 65 | Kostas Maris, Kostas S. Metaxiotis, G. Pantou, Konstantinos Nikolopoulos, Eleni Tavanidou, Vassilis Assimakopoulos. D-TIFIS: a decision support system for options trading |
66 | -- | 72 | S. Srinivasan. Role of trust in e-business success |
73 | -- | 90 | Jau-Yang Liu, Jyh-Horng Michael Tarn, H. Joseph Wen. Adopting e-commerce Web site operation modes: The current state of large US firms |
91 | -- | 101 | Vassilis Tsoumas, Theodore Tryfonas. From risk analysis to effective security management: towards an automated approach |
102 | -- | 116 | William T. Rupp, Alan D. Smith. Exploring the impacts of P2P networks on the entertainment industry |
117 | -- | 124 | Moncef Belhadjali, Gary L. Whaley. A data mining approach to neural network training |
125 | -- | 137 | Vasilios Zorkadis, P. Donos. On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements |