| 2000 | A new paradigm hidden in steganography. Ira S. Moskowitz, Garth E. Longdon, Liwu Chang |
| 2000 | A requires/provides model for computer attacks. Steven J. Templeton, Karl E. Levitt |
| 2000 | Adversary work factor as a metric for information assurance. Gregg Schudel, Bradley Wood |
| 2000 | Attack net penetration testing. James P. McDermott |
| 2000 | Characterizing the behavior of a program using multiple-length N-grams. Carla Marceau |
| 2000 | Conduit cascades and secure synchronization. Simon N. Foley |
| 2000 | Disarming offense to facilitate defense. Danilo Bruschi, Emilia Rosti |
| 2000 | Dynamic analysis of security protocols. Alec Yasinsac |
| 2000 | Incentives to help stop floods. Clifford E. Kahn |
| 2000 | Multilateral security a concept and examples for balanced security. Kai Rannenberg |
| 2000 | Natural language processing for information assurance and security: an overview and implementations. Mikhail J. Atallah, Craig J. McDonough, Victor Raskin, Sergei Nirenburg |
| 2000 | Network traffic tracking systems: folly in the large? Thomas E. Daniels, Eugene H. Spafford |
| 2000 | New paradigms in incident management. Tom Perrine, Abe Singer |
| 2000 | Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000 Mary Ellen Zurko, Steven J. Greenwald |
| 2000 | Quality of security service. Cynthia E. Irvine, Timothy E. Levin |
| 2000 | Reflections on ratings. Kenneth G. Olthoff |