Follow

Submissions from 2005

Carbon and nitrogen stable isotope analysis of an Amphibolis griffithii seagrass bed, A J Smit, Ann Brearley, Glenn Hyndes, Paul Lavery, and Dianne Walker

Link

Preventing wetland soils and sediments from burning on the Swan Coastal Plain: Workshop outcomes and conclusions, Ralph D. Smith and Pierre Horwitz

Long-term effects of elevated atmospheric CO2 on species composition and productivity of a southern African C4 dominated grassland in the vicinity of a CO2 exhalation, William Stock, Fulco Ludwig, Carl Morrow, Guy Midgley, Stephanie Wand, Nicky Allsopp, and Tina Bell

Link

Temporal changes between ecological regimes in a range of primary and secondary salinised wetlands, Karen Strehlow, Jennifer Davis, Lien Sim, Jane Chambers, Stuart Halse, David Hamilton, Pierre Horwitz, Arthur McComb, and Raymond Froend

Link

Enterprise architechture - bridge the gap between business, IT and universities, Anuradha Sutharshan, Stanislaw Maj, and David Veal

Link

Individuals Perceptions of Wireless Security in the Home Environment, Patryk Szewczyk

Link

Securing PDAs in the healthcare environment, Emiko Terado and Patricia Williams

PDF

Honeypot Technologies and Their Applicability as an Internal Countermeasure, Craig Valli

PDF

Integrating Open Source Protections into SCADA Networks, Craig Valli

PDF

Issues relating to the Forensic Analysis of PDA and Telephony (PDAT) Enabled Devices, Craig Valli

PDF

A UK and Australian Study of Hard Disk Disposal, Craig Valli and Andrew Jones

PDF

An Investigation into the Efficiency of Forensic Erasure Tools for Hard Disk Mechanisms, Craig Valli and Paul Patak

PDF

An Investigation into Long Range Detection of Passive UHF RFID Tags, Craig Valli, Andrew Woodward, Ken Wild, and Reino Karvinen

Link

Beyond disciplinary boundaries: Leptospirosis as a model of incorporating transdisciplinary approaches to understand infectious disease emergence, Joe Vinetz, Bruce Wilcox, Alonso Aguirre, Lisa X. Gollin, Alan R. Katz, Roger S. Fujioka, Kepa Maly, Pierre Horwitz, and Healani Chang

Link

The Determination of the Best Separation Conditions for a Mixture of Preservatives of Varying Polarity Using HPLC: an ACELL Experiment, Magdalena Wajrak and Mary Boyce

PDF

A Bipartite Graph Approach to Generate Optimal Test Sequences for Protocol Conformance Testing using the Wp-method, Jun Wang, Jitian Xiao, Chiou Peng Lam, and Huaizhong Li

Link

The effect of wave exposure on the morphology of Ecklonia radiata, Thomas Wernberg and Mads Thomsen (ext)

PDF

Heuristics for Optimising the Calculation of Hypervolume for Multi-objective Optimisation Problems, Lyndon While, Lucas Bradstreet, Luigi Barone, and Philip Hingston

Link

Awareness invoking positive change: Reflections on lecturing practice in Computer and Information Science, Patricia Williams

Link

Information security awareness of medical practitioners, Patricia Williams

Link

Physician secure thyself, Patricia Williams

Link

The underestimation of threats to patients data in clinical practice, Patricia Williams

Link

Using online courseware for information literacy skills development in a multinational program, Patricia Williams and Julie Johnson

A new breed of risk: Electronic medical records security, Patricia Williams and Rachel Mahncke

Investigating student interaction: A forum analysis, Patricia Williams and Rachel Mahncke

Link

The blurring of on-campus and off-campus education: A position paper, Patricia Williams and Rachel Mahncke

Link

Elicitation and customisation of generic skills in a security major, Patricia Williams and Andrew Woodward

Under Pressure: Does Osmotic Potential of the Culture Medium Affect Growth of Seagrasses?, Julia Wilson and Ian Bennett

Link

The effect of salt stress and abscisic acid on proline production, chlorophyll content and growth of in vitro propagated shoots of Eucalyptus camaldulensis, Andrew Woodward and Ian Bennett

PDF

Similarity-aware Web Content Management and Document Pre-fetching, Jitian Xiao and Michael Collins

PDF

Using Adaptive Agents to Automatically Generate Test Scenarios from the UML Activity Diagrams, Dong Xu, Huaizhong Li, and Chiou Peng Lam

PDF

Blackhat fingerprinting of the wired and wireless honeynet, Suen Yek

Honeypots, honeynets and honeywalls - finding the right honey for luring the attacker, Suen Yek

PDF

How to build a faraday on the cheap for wireless security testing, Suen Yek

Link

The ethics of teaching deception in information security, Suen Yek

Link

Wily attackers seek wireless networks in Perth, Western Australia for easy targets, Suen Yek

PDF

A Study of the Effects of Probait on Chuditch, Dasyurus geoffroii, Within the Julimar Conservation Park with Notes on the General Ecology., Melissa York

PDF

Nitrate reductase activity in macroalgae and its vertical distribution in macroalgal epiphytes of seagrasses, Erica Young, Paul Lavery, Beverley Van Elven, Mat Dring, and John A Berges

Submissions from 2004

Securing web services with XML digital signatures, Sabbir Ahmed and Leisa Armstrong

Link

A tale of two cities: Approaches to counter terrorism, Edwin Leigh Armistead and Jeff Malone

Link

An approach to generate the thin-threads from the UML diagrams, Xiaoqing Bai, Peng Lam, and Huaizhong Li

Testing for component-based software, Xiaoqing Bai, Peng Lam, and Huaizhong Li

PDF

The role of farm dams as refugia for aquatic invertebrates in a salinised landscape, south Western Australia , Jean-Michel Benier

PDF

Openness in the face of systemic constraints on science, public participation, and the Western Australian Regional Forest Agreement, Martin Brueckner

PDF

Investigation of the replacement of Margaret River hairy marron Cherax tenuimanus (Smith) by smooth marron C. cainii Austin, John J. Bunn

Link

Sociology in software engineering, Craig Caulfield, Gurpreet Kohli, and S. Paul Maj

PDF

Outcomes of a participatory approach to interpretive planning in the Shark Bay World Heritage area, Western Australia , Kelly J. Chapman

PDF

Environmental correlates and associations of tuart (Eucalyptus gomphocephala) decline, Todd A. Edwards

PDF

Beach-Cast Wrack as a Determinant of Macroinvertebrate Assemblages and Trophic Subsidy to Sandy Beach Ecosystems, Rebecca Ince

PDF

Influences on the uptake of covenant mechanisms for nature conservation on private lands in Australia, Thomas I. Kabii

Link

An automatic analysis system for firearm identification based on ballistics projectile, Jun Kong, Dongguang Li, and Chunnong Zhao

Link

Analytical Test on Effectiveness of MCDF Operations, Jun Kong, Baoxue Zhang, and Wanwu Guo

System approach to information operations, Tuija Kuusisto, Rauno Kuusisto, and Leigh Armistead

Link

Using action research to embed systmen thinking concepts in postgraduate IT teaching, Donald C. McDermid and Anita A. Bose

Smart card based messaging systems, D. T. Shaw and S. P. Maj

Inducing intentional errors in concatenated databases, D. T. Shaw, A. Shaw, and S. P. Maj

Link

Reefs as contributors to diversity of epiphytic macroalgae assemblages in seagrass meadows, B. Van Elven, P. S. Lavery, and G. A. Kendrick

A guide to tropical seagrasses of the Indo-West Pacific, Michelle Waycott, Kathryn Mcmahon, Jane Mellors, Ainsley Calladine, and Diana Kleine

Growth in the deployment and security of 802.11b wireless local area networks in Perth, WA, Sue Webb

PDF

In vitro propagation of some Western Australian seagrasses , Julia Wilson

PDF

The use of proline to determine salt tolerance in eucalyptus species and clones , Andrew J. Woodward

Submissions from 2003

A UML-Based Risk Analysis Approach for Software Testing, Xiaoqing Bai, Chiou Peng Lam, and Huaizhong Li

Link

A Multi-Lingual Web-Based Survey Form Machine Translation Mechanism, Richard Boddington, Judith Clayden, Michael Collins, and Samuel Pride

Case Study in Construction of a Vertical Portal: The Cape Range Ningaloo Project, Mark Brogan and Gurpreet Kohli

Link

Using ICT to Create a Dynamic Online Learning Environment, Barbara Combes and George Sekulla

PDF

Foraging Ecology And Habitat Selection Of The Western Yellow Robin (Eopsaltria Griseogularis) In A Wandoo Woodland, Western Australia : Conservation Ecology Of A Declining Species, Jarrad A. Cousin

TOACS: Evolution of an On-line Education Environment 1995-2001, James Maning Cross, Patrick James Garnett, and Anthony Craig Watson

Link

What happens when you add salt: predicting impacts of secondary salinisation on shallow aquatic ecosystems using an alternative states model, Jennifer A. Davis, Megan McGuire, Stuart Halse, David Hamilton, Pierre Horwitz, Clive Barstow, Raymond H. Froend, Michael Lyons, and Lien Sim

Link

Vendor based network engineering education: An international comparison, Jambukeswaran Dharukeshwari and Stanislaw Maj

Link

A Neural System Prototype for Data Processing Using Modified Conjugate Directional Filtering (MCDF), Wanwu Guo and Anthony Craig Watson

Image Pattern Recognition Using Modified Conjugate Directional Filtering (MCDF), Wanwu Guo and Anthony Craig Watson

Link

Medical Image Processing Using Modified Conjugate Directional Filtering, Wanwu Guo and Anthony Craig Watson

PDF

Determining the effectiveness of deceptive honeynets, Nirbhay Gupta

Link

An Intervention Trial on Short Term Exposure to Inorganic Arsenic in Drinking Water, Andrea Hinwood, Nick de Klerk, Malcolm Sim, Judy Hankin, and Jim Gerostamoulos

Link

Fire and organic substrates: soil structure, water quality and biodiversity in far southwest Western Australia, Pierre Horwitz, Simon Judd, and Beate Sommer

Link

Socio-ecological relationships and their consequences in coping with environmental changes in south-western Australia., Pierre Horwitz, Ruth Rogan, Keith Bradby, and Margaret Robertson

PDF

Security management education online, Peter J. Hosie, Clifton L. Smith, and Joseph Luca

Link

Differences in the species- and size-composition of fish assemblages in three distinct seagrass habitats with differing plant and meadow structure, Glenn Hyndes, Alan Kendrick, Lachlan D MacArthur, and Emily Stewart

Link

A Firearm Identification System Based on Neural Network, Jun Kong, Dongguang Li, and Anthony Craig Watson

Intelligent Test Data Processing for State-Based Software Testing, Chiou Peng Lam and Huaizhong Li

Application of AI for Automation of Software Testing, Chiou Peng Lam, Michael C. Robey, and Huaizhong Li

Link

An Evolutionary Approach for Optimisation of State-Based Test Suites for Software Systems, Huaizhong Li and Chiou Peng Lam

Promoting Confidence in Software Components: A UML Approach, Huaizhong Li, Chiou Peng Lam, and Xiaoqing Bai

PDF

Algorithmic composition in contrasting music styles, Tristan Mcauley and Philip Hingston

Link

Setting a Framework for Trusted Component Trading, John Morris, Chiou Peng Lam, Gary A. Bundell, Gareth Lee, and Kris Parker

PDF

The mediated data integration (MeDInt) : an approach to the integration of database and legacy systems, Suvimol Mukviboonchai

PDF

Wedge Veg : Gradient Analysis of Impacts to Coastal Heath Vegetation at Wedge, Western Australia, Steven O'Dwyer

Link

Heuristics for Image Retrieval Using Spatial Configurations, William F. Smyth, Chiou Peng Lam, Xin Chen, and Valerie Maxville

Implementing user centred partnership design: Change in attitude made a difference, Anuradha Sutharshan, Stanislaw Maj, and Gurpreet Kohli

Link

The Impact of User Participation on Success in E-Commerce Developments: A Project Managers Perspective, Julian Terry and Craig Standing

Link

The value of User Participation in E-Commerce Systems Development, Julian Terry and Craig Standing

PDF

Honeyd - A OS Fingerprinting Artifice, Craig Valli

PDF

Industry Certification: Challenges for the conduct of University security based courses, Craig Valli

PDF

An Initial Investigation into the Performance of the Honeyd Virtual Honeypot System, Craig Valli and Nirbhay Gupta

TOACS and eCourse2: From Thailand and Australia to the World but Where to Next?, Anthony Craig Watson

Differences in recreationally targeted fishes between protected and fished areas of a coral reef marine park, Mark Westera, Paul Lavery, and Glenn Hyndes

PDF

Isolation And Characterisation Of A Pax Group III Gene From The Freshwater Crayfish Cherax Destructor : Implications For The Evolution Of Muscle Regeneration, Robert B. White

PDF

A Case Study in the Security of Network-Enabled Devices, Simeon Xenitellis and Craig Valli

A framework for the use of deception in Network Security, Suen Yek

Measuring the Effectiveness of deception in a wireless honeypot, Suen Yek