| 95 | -- | 96 | Rasool Jalili. Editorial |
| 97 | -- | 106 | Farshid Farhat, Abolfazl Diyanat, Shahrokh Ghaemmaghami, Mohammad Reza Aref. Eigenvalues-based LSB steganalysis |
| 107 | -- | 114 | Vahid Amin Ghafari, Ali Vardasbi, Javad Mohajeri. Cryptanalysis of GSM encryption algorithm A5/1 |
| 115 | -- | 124 | Motahareh Taheri, Saeed Mozaffari. Improving security of double random phase encoding with chaos theory using fractal images |
| 125 | -- | 136 | Zeinab Zali, Massoud Reza Hashemi, Hossein Saidi 0001. Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach |
| 137 | -- | 150 | Enos K. Mabuto, Hein S. Venter. Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications |
| 151 | -- | 165 | Hassan Shakeri, Abbas Ghaemi Bafghi. A confidence-aware interval-based trust model |