| 2009 | A Comparison Between Rule Based and Association Rule Mining Algorithms. Mohammed Md. Mazid, A. B. M. Shawkat Ali, Kevin S. Tickle |
| 2009 | A Context-Aware Access Control Model for Pervasive Environments. Sumayah Al-Rwais, Jalal Al-Muhtadi |
| 2009 | A Cryptographically t-Private Auction System. Markus Hinkelmann, Andreas Jakoby, Nina Moebius, Tiark Rompf, Peer Stechert |
| 2009 | A Data Mining Approach for Detection of Self-Propagating Worms. Mohd Fadzli Marhusin, Chris Lokan, Henry Larkin, David Cornforth |
| 2009 | A Hierarchical Model for Cross-Domain Communication of Health Care Units. Dimitris Geneiatakis, Costas Lambrinoudakis, Stefanos Gritzalis |
| 2009 | A Messaging-Based System for Remote Server Administration. Marco Ramilli, Marco Prandini |
| 2009 | A Modified PSO Algorithm for Constrained Multi-objective Optimization. Lily D. Li, Xinghuo Yu, Xiaodong Li, William W. Guo |
| 2009 | A Multi-agent Security Architecture. Rossilawati Sulaiman, Dharmendra Sharma, Wanli Ma, Dat Tran |
| 2009 | A New Particle Swarm Optimization Algorithm for Neural Network Optimization. Sai-Ho Ling, Hung T. Nguyen, Kit Yan Chan |
| 2009 | A New Similarity Measure for the Anomaly Intrusion Detection. Ahmed Belkhirat, Abdelghani Bouras, Abdelkader Belkhir |
| 2009 | A Novel Fuzzy Identity-Based Signature with Dynamic Threshold. Wei Chen, Li Zhu, Xiaomei Cao, Yang Geng |
| 2009 | A Novel Grid Trust Model Based on Fuzzy Theory. Shaomin Zhang, Yue Zou, Baoyi Wang |
| 2009 | A Novel Quad-band Internal Antenna with Ni/Ag/Ni Structure for Wireless Mobile Handset. Book-Sung Park, Dan Qi, Yanli Liu, Bolormaa Khurelbaatar, Chul-Ju Kim |
| 2009 | A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks. Yining Liu, Keqiu Li, Yong Zhang, Wenyu Qu |
| 2009 | A Pseudonym-Based Signature Scheme for Dynamic Clusters in Ad Hoc Networks. Yang Zhang |
| 2009 | A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network Protocols. Qin Li, Qingkai Zeng |
| 2009 | A Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus. Huiqiang Wang, Hongwu Lv, Guangsheng Feng |
| 2009 | A System for Distributed SELinux Policy Management. Pedro Chávez Lugo, Juan Manuel Garcia Garcia, Juan J. Flores |
| 2009 | ACSIS: Agents for Cooperative Secured Information Systems. Leslie Huin, Danielle Boulanger, Eric Disson |
| 2009 | An Approach to Leak Detection in Pipe Networks Using Analysis of Monitored Pressure Values by Support Vector Machine. John Mashford, Dhammika De Silva, Donavan Marney, Stewart Burn |
| 2009 | An Efficient Certificateless Encryption Scheme in the Standard Model. Hua Guo, Xiyong Zhang, Yi Mu, Zhoujun Li |
| 2009 | An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography. Tohari Ahmad, Jiankun Hu, Song Han |
| 2009 | An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP. Andre L. Alexander, Alexander L. Wijesinha, Ramesh K. Karne |
| 2009 | An Extension of Differential Fault Analysis on AES. Wei Li, Dawu Gu, Yong Wang, Juanru Li, Zhiqiang Liu |
| 2009 | An Information Filtering Approach. Nasim Vatani, Amir Masoud Rahmani, Mohammad Ebrahim Shiri |
| 2009 | Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi |
| 2009 | Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN. Rong-Jian Chen, Yu-Cheng Peng, Jui-Lin Lai, Shi-Jinn Horng |
| 2009 | Authentication in Peer-to-Peer Network: Survey and Research Directions. Zhongwen Li, Xiaochen Xu, Liang Shi, Jian Liu, Chen Liang |
| 2009 | Automatic Network Protocol Automaton Extraction. Ming-Ming Xiao, Shun-Zheng Yu, Yu Wang |
| 2009 | Building a SCADA Security Testbed. Carlos Queiroz, Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Xinghuo Yu |
| 2009 | Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network. Piyi Yang, Zhenfu Cao, Xiaolei Dong |
| 2009 | Changing Network Behavior. Robert Koch |
| 2009 | Characterising the Evolution in Scanning Activity of Suspicious Hosts. Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou |
| 2009 | Contextual Analysis Methods Capturing Knowledge Representation Related to the Reputation. Miho Itoh |
| 2009 | DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks. Thaier Hayajneh, Prashant Krishnamurthy, David Tipper |
| 2009 | Design of a Secure Router System for Next-Generation Networks. Tilman Wolf, Russell Tessier |
| 2009 | Determining Supply Chain Flexibility Using Statistics and Nueral Networks: A Comparative Study. Ananda Jeeva, William W. Guo |
| 2009 | Discovery of Exceptions: A Step towards Perfection. Saroj Ratnoo, Kamal Kant Bharadwaj |
| 2009 | Discriminating DDoS Flows from Flash Crowds Using Information Distance. Shui Yu, Theerasak Thapngam, Jianwen Liu, Su Wei, Wanlei Zhou |
| 2009 | Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics. Ke Li, Wanlei Zhou, Ping Li, Jing Hai, Jianwen Liu |
| 2009 | Distributed Agent Architecture for Intrusion Detection Based on New Metrics. Farah Barika Ktata, Nabil El-Kadhi, Khaled Ghédira |
| 2009 | Distributed Detection of Attacks in Mobile Ad Hoc Networks Using Learning Vector Quantization. James Cannady |
| 2009 | Early Breast Cancer Identification: Which Way to Go? Microarray or Image Based Computer Aided Diagnosis!. Jesmin Nahar, Kevin S. Tickle, A. B. M. Shawkat Ali, Yi-Ping Phoebe Chen |
| 2009 | Effective Attacks in the Tor Authentication Protocol. Yang Zhang |
| 2009 | Enhancing RFID Tag Resistance against Cloning Attack. Jemal H. Abawajy |
| 2009 | Enhancing Trust on e-Government: A Decision Fusion Module. Bruno Lage Srur, Vallipuram Muthukkumarasamy |
| 2009 | Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'. Muhammad Khurram Khan |
| 2009 | Error Correction of Noisy Block Cipher Using Cipher and Plaintext Characteristics. Nabil M. K. Mirza, Ziad Osman, Rached N. Zantout, Mohamed El-Sayed |
| 2009 | Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography. Ahmed Al-Nazer, Adnan Abdul-Aziz Gutub |
| 2009 | Extended K-Anonymity Models Against Attribute Disclosure. Xiaoxun Sun, Hua Wang, Lili Sun |
| 2009 | F-TAD: Traffic Anomaly Detection for Sub-networks Using Fisher Linear Discriminant. Hyunhee Park, Meejoung Kim, Chul-Hee Kang |
| 2009 | FSS2-Id/A Fast Safe Identity-Based Multi Signature Scheme. Sami Harari |
| 2009 | Flexible Wireless Trust Through Ontology-Based Mapping and Its Attendant Semantic Limitations. Robert Steele, Kyongho Min |
| 2009 | Framework for Identification of Power System Operating Security Regions. Mohamed A. El-Kady, Essam A. Al-Ammar |
| 2009 | Functional Characteristics and Proposed Deployment Infrastructure of an Industrial Decision Support System within a Sugar Mill Crystallisation Stage. Roland Dodd, Andrew Chiou, Xinghuo Yu, Ross Broadfoot |
| 2009 | Generating Hierarchical Association Rules with the Use of Bayesian Network. Khalid Iqbal, Sohail Asghar |
| 2009 | Grid of Security: A New Approach of the Network Security. Olivier Flauzac, Florent Nolot, Cyril Rabat, Luiz Angelo Steffenel |
| 2009 | Guided Navigation Using Query Log Mining through Query Expansion. Burcu Yurekli, Gökhan Çapan, Baris Yilmazel, Özgür Yilmazel |
| 2009 | Hardware Trojan Horse Device Based on Unintended USB Channels. John Clark, Sylvain P. Leblanc, Scott Knight |
| 2009 | Harnessing the Power of P2P Systems for Fast Attack Signature Validation. Spyros Antonatos, Quang Hieu Vu |
| 2009 | HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing. W. Y. Chin, Evangelos P. Markatos, Spyros Antonatos, Sotiris Ioannidis |
| 2009 | Honeypot Traces Forensics: The Observation Viewpoint Matters. Van-Hau Pham, Marc Dacier |
| 2009 | If Cross-Functional Teams are the Answer, What is the Question?. W. K. Daniel Pun, Ricardo Santa |
| 2009 | Implementation and Analysis of Sensor Security Protocols in a Home Health Care System. Kalvinder Singh, Vallipuram Muthukkumarasamy |
| 2009 | Incentive-Based Self-Organized Public Key Management for Mobile Ad Hoc Networks. Dakila Reyes II, Cedric Angelo M. Festin, Susan Pancho-Festin |
| 2009 | Industrial Process Model Integration Using a Blackboard Model within a Pan Stage Decision Support System. Roland Dodd, Andrew Chiou, Xinghuo Yu, Ross Broadfoot |
| 2009 | Integrating Palmprint and Fingerprint for Identity Verification. Yong Jian Chin, Thian Song Ong, Michael Kah Ong Goh, Bee Yan Hiew |
| 2009 | Intrusion Detection System Using Self-Organizing Maps. Mansour M. Alsulaiman, Aasem N. Alyahya, Raed A. Alkharboush, Nasser S. Alghafis |
| 2009 | MagicNET: Security System for Development, Validation and Adoption of Mobile Agents. Muhammad Awais Shibli, Sead Muftic, Alessandro Giambruno, Antonio Lioy |
| 2009 | Novel Approaches for Detecting Frauds in Energy Consumption. Fábio Fabris, Leticia Rosetti Margoto, Flávio Miguel Varejão |
| 2009 | On Role Mappings for RBAC-Based Secure Interoperation. Jinwei Hu, Ruixuan Li, Zhengding Lu |
| 2009 | Policy-Driven Patch Management for Distributed Environments. Jan Muhammad, Richard O. Sinnott |
| 2009 | Practical Implementations for Securing VoIP Enabled Mobile Devices. Chan Yeob Yeun, Salman Mohammed Al-Marzouqi |
| 2009 | Property Based Attestation and Trusted Computing: Analysis and Challenges. Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Eimear Gallery |
| 2009 | Putting Simple Hierarchy into Ant Foraging: Cluster-Based Soft-Bots. Wei Peng, Qingmai Wang, Bin Wang, Xinghuo Yu |
| 2009 | Real-Time Data Mining Methodology and a Supporting Framework. Xiong Deng, Moustafa Ghanem, Yike Guo |
| 2009 | Scalable RFID Pseudonym Protocol. Boyeon Song, Chris J. Mitchell |
| 2009 | Secure Authenticated Key Establishment Protocol for Ad Hoc Networks. A. John Prakash, V. Rhymend Uthariaraj |
| 2009 | Secure Mobile Agents with Designated Hosts. Qi Zhang, Yi Mu, Minjie Zhang, Robert Huijie Deng |
| 2009 | Securing Roaming and Vertical Handover in Fourth Generation Networks. Neila Krichene, Noureddine Boudriga |
| 2009 | Self-Protection Model Based on Intelligent Agent. Bing Sun, Ya-Ping Zhang, Ning Zhang |
| 2009 | Significance of Computional Intelligence Method in Computer Networks. Reginald Lal, Andrew Chiou |
| 2009 | Speaker Verification Based on Different Vector Quantization Techniques with Gaussian Mixture Models. Sheeraz Memon, Margaret Lech, Namunu Chinthaka Maddage |
| 2009 | Speech Recognition Enhancement Using Beamforming and a Genetic Algorithm. Kit Yan Chan, Siow Yong Low, Sven Nordholm, Ka Fai Cedric Yiu, Sai-Ho Ling |
| 2009 | State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. Matús Harvan, Alexander Pretschner |
| 2009 | Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009 Yang Xiang, Javier López, Haining Wang, Wanlei Zhou |
| 2009 | Trusted Network Access Control in the Eduroam Federation. Fernando Bernal-Hidalgo, Manuel Sánchez, Gabriel López, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte |
| 2009 | Visualizing Global Patterns in Huge Digraphs. Noel Henry Patson |
| 2009 | Weakness on Cryptographic Schemes Based on Chained Codes. Omessaad Hamdi, Ammar Bouallegue, Sami Harari |
| 2009 | xDUCON: Coordinating Usage Control Policies in Distributed Domains. Giovanni Russello, Naranker Dulay |