| 2009 | A UML profile for role-based access control. Çagdas Cirit, Feza Buzluca |
| 2009 | A model of mandatory access for current database management systems. Alexandr S. Basan, Lyudmila K. Babenko, Oleg B. Makarevich |
| 2009 | A scalable multi-core aware software architecture for high-performance network monitoring. Mahdi Dashtbozorgi, Mohammad Abdollahi Azgomi |
| 2009 | A secure architecture for P2PSIP-based communication systems. Xianghan Zheng, Vladimir A. Oleshchuk |
| 2009 | A semantic-based access control mechanism using semantic technologies. Moussa Amir Ehsan, Morteza Amini, Rasool Jalili |
| 2009 | A simple yet effective spam blocking method. Gökhan Dalkiliç, Devrim Sipahi, Mehmet Hilal Özcanhan |
| 2009 | AWGN based seed for random noise generator in ParseKey+. Atilla Elçi, Behnam Rahnama |
| 2009 | Adaptability infrastructure for bridging IT security evaluation and options theory. Haider Abbas, Louise Yngström, Ahmed Hemani |
| 2009 | An architectural approach for assessing system trust based on security policy specifications and security mechanisms. Serif Bahtiyar, Murat Cihan, Mehmet Ufuk Çaglayan |
| 2009 | An efficient and secure protocol for DTV broadcasts. Ashutosh Saxena |
| 2009 | An information security ontology incorporating human-behavioural implications. Simon Edward Parkin, Aad P. A. van Moorsel, Robert Coles |
| 2009 | An integrated approach to detect phishing mail attacks: a case study. R. Suriya, K. Saravanan, Arunkumar Thangavelu |
| 2009 | Application of artificial neural network in detection of DOS attacks. Iftikhar Ahmad, Azween B. Abdullah, Abdullah Sharaf Alghamdi |
| 2009 | Artificial immune system based intrusion detection system. Vadim D. Kotov, Vladimir I. Vasilyev |
| 2009 | Assured information sharing: concepts and issues. Elisa Bertino |
| 2009 | BEAN: a lightweight stream cipher. Naveen Kumar, Shrikant Ojha, Kritika Jain, Sangeeta Lal |
| 2009 | Buyer seller watermarking protocol for digital rights management. Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur |
| 2009 | DFA-based and SIMD NFA-based regular expression matching on cell BE for fast network traffic filtering. Feodor Kulishov |
| 2009 | Danger theory based SYN flood attack detection in autonomic network. Sanjay Rawat, Ashutosh Saxena |
| 2009 | Deployed sensor networks and their security challenges in practice. Erdal Cayirci |
| 2009 | Design of a zigbee-based RFID network for industry applications. Sumi M., Ebrahim A. Soujeri, Rahim Rajan, Harikrishnan A. I. |
| 2009 | Digital sound card identification based on recording path imperfections. Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich, Anatolij Chumachenko |
| 2009 | Effective pair-wise key establishment scheme for wireless sensor networks. Somanath Tripathy |
| 2009 | Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit. Kazim Yumbul, Erkay Savas |
| 2009 | Embedded systems for IT security applications: properties and design considerations. Sorin Alexander Huss |
| 2009 | Ensuring information security controls for the Russian banking organizations. Andrey P. Kurilo, Natalia G. Miloslavskaya, Svetlana Tolstaya |
| 2009 | Evolution and challenges in trust and security in information system infrastructures. Vijay Varadharajan |
| 2009 | Extended electronic signature policies. Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda |
| 2009 | Fortifying the dalì attack on digital signature. Francesco Buccafurri, Gianluca Caminiti, Gianluca Lax |
| 2009 | Hill cipher modification based on eigenvalues HCM-EE. Ahmed Y. Mahmoud, Alexander G. Chefranov |
| 2009 | Improving risk assessment methodology: a statistical design of experiments approach. Anand Singh, David J. Lilja |
| 2009 | Information security incident management process. Anna Kostina, Natalia G. Miloslavskaya, Alexander I. Tolstoy |
| 2009 | Modeling network security competence for certification. Tomi O. Kelo, Jukka A. Koskinen |
| 2009 | New approach to evaluate the effectiveness of the audio information protection for determining the identity of virtual speech images. Vladimir Kotenko, Alexey Evseev, Stas Kotenko, Konstantin E. Rumyantsev |
| 2009 | Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009 Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Alexander G. Chefranov, Josef Pieprzyk, Yuri Anatolievich Bryukhomitsky, Siddika Berna Örs |
| 2009 | Pure e-learning course in information security. Jukka A. Koskinen, Tomi O. Kelo |
| 2009 | Pushing the limits of one-time signatures. Kemal Bicakci |
| 2009 | Research and Education Activities of the Department of Security of Information Technologies of Taganrog Institute of Technology of the Southern Federal University in the Field of Information Security. Oleg B. Makarevich, Lyudmila K. Babenko |
| 2009 | Resiliency of open-source firewalls against remote discovery of last-matching rules. Khaled Salah, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam |
| 2009 | Secure many to many routing for wireless sensor and actuator networks. Erdal Cayirci, Son Thanh Nguyen, Chunming Rong |
| 2009 | Security against DOS attack in mobile IP communication. Sazia Parvin, Shohrab Ali, Song Han, Tharam S. Dillon |
| 2009 | Spam filter optimality based on signal detection theory. Kuldeep Singh, Audun Jøsang, Md Sadek Ferdous, Ravishankar Borgaonkar |
| 2009 | Static CFG analyzer for metamorphic Malware code. Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat |
| 2009 | The hush cryptosystem. Sari Haj Hussein |
| 2009 | The method of interval estimation in risk-analysis system. Vladimir Mikhailovich Shishkin, Sergey Vitalievich Savkov |
| 2009 | Trace and revoke systems with short ciphertexts. Lie Liu, Chun Yuan |
| 2009 | TrueIP: prevention of IP spoofing attacks using identity-based cryptography. Christian Schridde, Matthew Smith, Bernd Freisleben |
| 2009 | Trust based traffic monitoring approach for preventing denial of service attacks. Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. |
| 2009 | Turkish national electronic identity card. Mücahit Mutlugün, Oktay Adalier |
| 2009 | Weakening the Dolev-Yao model through probability. Riccardo Bresciani, Andrew Butterfield |
| 2009 | XML-based policy specification framework for spatiotemporal access control. Samrat Mondal, Shamik Sural |