| 2 | -- | 0 | Xuemin Shen. Editor's note |
| 3 | -- | 4 | Saeed Abu-Nimeh, Ernest Foo, Igor Nai Fovino, Manimaran Govindarasu, Thomas Morris. Cyber security of networked critical infrastructures [Guest Editorial] |
| 5 | -- | 11 | Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah. Authentication and authorization mechanisms for substation automation in smart grid network |
| 12 | -- | 18 | Huayang Cao, Peidong Zhu, Xicheng Lu, Andrei Gurtov. A layered encryption mechanism for networked critical infrastructures |
| 19 | -- | 24 | Saurabh Amin, Galina A. Schwartz, Alefiya Hussain. In quest of benchmarking security risks to cyber-physical systems |
| 25 | -- | 31 | Emiliano Casalicchio, Marco Caselli, Alessio Coletta. Measuring the global domain name system |
| 32 | -- | 36 | Emiliano De Cristofaro, Claudio Soriente. Participatory privacy: Enabling privacy in participatory sensing |
| 37 | -- | 44 | Salekul Islam, Jean-Charles Grégoire. Converged access of IMS and web services: A virtual client model |
| 45 | -- | 51 | Nuno Filipe Coutinho, Susana Sargento. On the analysis of hierarchical autonomic control of multiparty services |
| 52 | -- | 58 | Chaitanya S. K. Vadrevu, Massimo Tornatore, Chin Guok, Inder Monga, Biswanath Mukherjee. Vertical and horizontal circuit/packet integration techniques for the future optical internet |
| 59 | -- | 64 | Aniket Mahanti, Niklas Carlsson, Anirban Mahanti, Martin F. Arlitt, Carey Williamson. A tale of the tails: Power-laws in internet measurements |