| 2004 | A Declarative Approach to Stateful Intrusion Detection and Network Monitoring. Mathieu Couture, Béchir Ktari, Mohamed Mejri, Frédéric Massicotte |
| 2004 | A Diagrammatical Framework for Information Systems Attacks. Terry Roebuck |
| 2004 | A novel visualization technique for network anomaly detection. Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani |
| 2004 | An Architecture for Identity Management (August 2004). Brian R. Richardson, Jim E. Greer |
| 2004 | Application of Belief-Desire-Intention Agents in Intrusion Detection & Response. Mehdi Shajari, Ali A. Ghorbani |
| 2004 | Building Online Trust through Socially Rich Web Interfaces. Milena M. Head, Khaled Hassanein |
| 2004 | Combating Spam with TEA. Jean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen |
| 2004 | Current Trends and Advances in Information Assurance Metrics. Nabil Seddigh, Peter Pieda, Ashraf Matrawy, Biswajit Nandy, Ioannis Lambadaris, Adam Hatfield |
| 2004 | Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting System. Anna Shubina, Sean W. Smith |
| 2004 | Detection of New Malicious Code Using N-grams Signatures. Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan |
| 2004 | Determining Internet Users' Values for Private Information. Scott Buffett, Nathan Scott, Bruce Spencer, Michael Richter, Michael W. Fleming |
| 2004 | Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. Deholo Nali, Ali Miri, Carlisle M. Adams |
| 2004 | Familiarity and Trust: Measuring Familiarity with a Web Site. Jie Zhang, Ali A. Ghorbani |
| 2004 | Formal Implementation of Network Security Policies. Alexandre Lacasse, Mohamed Mejri, Béchir Ktari |
| 2004 | Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges. Ali Grami, Bernadette Schell |
| 2004 | Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan. Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, Larry Korba |
| 2004 | Practical Remote Electronic Elections for the UK. Tim Storer, Ishbel Duncan |
| 2004 | Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick, Canada, Proceedings |
| 2004 | Secure Public Instant Messaging. Mohammad Mannan, Paul C. van Oorschot |
| 2004 | Structural Concepts for Trust, Contract and Security Management for a Virtual Chemical Engineering Organisation. Panayiotis Periorellis, Christopher J. W. Townson, Philip English |
| 2004 | Supporting Privacy in E-Learning with Semantic Streams. Lori Kettel, Christopher A. Brooks, Jim E. Greer |
| 2004 | Syntax-based Vulnerability Testing of Frame-based Network Protocols. Oded Tal, Scott Knight, Tom Dean |
| 2004 | The Sensitivities of User Profile Information in Music Recommender Systems. Evelien van de Garde-Perik, Boris E. R. de Ruyter, Panos Markopoulos, Berry Eggen |
| 2004 | Towards secure interaction in agent societies. Bastin Tony Roy Savarimuthu, Martin K. Purvis, Marcos de Oliveira, Maryam Purvis |
| 2004 | Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience. Stephan J. Engberg, Morten Borup Harning, Christian Damsgaard Jensen |
| 2004 | infoDNA (Version 2) Agent Enhanced Trustworthy Distributed Information. Stephen Marsh |