Follow

Submissions from 2016

PDF

Controlled access to cloud resources for mitigating economic denial of sustainability (EDoS) attacks, Zubair A. Baig, Sadiq M. Sait, and Farid Binbeshr

Link

Game level layout generation using evolved cellular automata, Andrew Pech; Martin Masek,; Chiou-Peng Lam; and Philip Hingston

Submissions from 2015

Link

The Current Use of Authentication Technologies: An Investigative Review, Abdulwahid Al Abdulwahid, Nathan Clarke, Ingo Stengel, Steven Furnell, and Christoph Reich

Link

Multiple opponent optimization of prisoner's dilemma playing agents, Daniel Ashlock, Joseph Alexander Brown, and Philip Hingston

Link

Detection of compromised smart meters in the Advanced Metering Infrastructure, Zubair A. Baig, Abdurraoof Al Amoudy, and Khaled Salah

Link

The Physical Security Professional: Formulating a Novel Body of Knowledge, Michael Coole, David J. Brooks, and David Treagust

Link

Forensic analysis of a Sony PlayStation 4: A first look, Matthew Davies, Huw Read, Konstantinos Xynos, and Iain Sutherland

Link

Work exposure and vigilance decrements in closed circuit television surveillance, Fiona Donald, Craig Donald, and Andrew Thatcher

Hacking, nationalism, democracy and cyberwarfare in the people's republic of China: A centre/margin perspective, K. Hearn

Link

An Evaluation Of Authorship Attribution Using Random Forests, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

Link

Hot Spot Analysis Using NDVI Data for Impact Assessment of Watershed Development, Sreedhar Acharya Nallan, Leisa J. Armstrong, Amiya Kumar Tripathy, and Pardhasaradhi Teluguntla

Link

Joint movement similarities for robust 3D action recognition using skeletal data, H. Pazhoumand-Dar, C.-P. Lam, and M. Masek

Link

Evolving cellular automata for maze generation, Andrew Pech, Philip Hingston, Martin Masek, and Chiou P. Lam

Link

Evolving statistical rulesets for network intrusion detection, Samaneh Rastegari, Philip F. Hingston, and Chiou Peng Lam

Link

A Statistical Rule Learning Approach to Network Intrusion Detection. Paper presented at the IT Convergence and Security (ICITCS), Samaneh Rastegari, Chiou-Peng P. Lam, and Philip F. Hingston

Link

Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems, H. Read, I. Sunderland, K. Xynos, and F. Roarson

Link

Continuous user authentication using multi-modal biometrics, Hataichanok Saevanee, Nathan Clarke, Steven Furnell, and Valerio Biscione

Link

A combination of meteorological and satellite-based drought indices in a better drought assessment and forecasting in Northeast Thailand, Watinee Thavorntam, Netnapid Tantemsapya, and Leisa Armstrong

Link

Mobile Based Healthcare Management Using Artificial Intelligence, Amiya Kumar Tripathy, Rebeck Carvalho, Keshav Pawaskar, Suraj Yadav, and Vijay Yadav

Link

Mediassistedge - Simplifying Diagnosis Procedure & Improving Patient Doctor Connectivity, Amiya Kumar Tripathy, Rebeck Carvalho, Ajit Puthenputhussery, Nikita Chhabhaiya, and Bijoy Anthony

Link

Travolution - An Embedded System in Passenger Car for Road Safety, Amiya Kumar Tripathy, Sejal Chopra, Samantha Bosco, Srinidhi Shetty, and Firdos Sayyed

Link

Voice For The Mute, Amiya Kumar Tripathy, Dipti Jadhav, Steffi A. Barreto, Daphne Rasquinha, and Sonia S. Mathew

Link

Opinion Mining from User Reviews, Amiya Kumar Tripathy, Revathy Sundararajan, Chinmay Deshpande, Pankaj Mishra, and Neha Natarajan

Link

Cybersecurity Vulnerabilities in Medical Devices: A Complex Environment and Multifaceted Problem, Patricia A.H. Williams and Andrew J. Woodward

Submissions from 2014

Link

The E-book Power User in Academic and Research Libraries: Deep Log Analysis and User Customisation, Pervaiz Ahmad, Mark Brogan, and Michael N. Johnstone

Link

Determining what characteristics constitute a darknet, Symon Aked, Christopher Bolan, and Murray Brand

Link

A novel mobility-aware data transfer service (MADTS) based on DDS standards, Basem Al-Madani, Ayaz ul Hussan Khan, and Zubair A. Baig

PDF

Tego - A framework for adversarial planning, Daniel Ashlock and Philip Hingston

Link

Authentication and authorisation in entrusted unions, Dhouha F. Ayed, Jan Camenisch, Tanya Ignatenko, Michael N. Johnstone, Paul Koster, Brigitta Lange, Milan Petković, Dieter Sommer, and John Zic

Link

A Genetic Algorithm-Based Feature Selection, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen

PDF

Application of Cellular Neural Networks and Naive Bayes Classifier in Agriculture, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen

PDF

On The Application Of Genetic Probabilistic Neural Networksand Cellular Neural Networks In Precision Agriculture, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen

Link

Zernike moments and genetic algorithm : tutorial and application, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen

Link

Securing the Internet of Things Infrastructure - Standards and Techniques, Zubair A. Baig

Link

Countering crime in hostile environments: securing vulnerable humanitarian aid workers in Paua New Guinea, William J. Bailey

PDF

Hybrid intelligent model for software maintenance prediction, Abdulrahman Ahmed Bobakr Baqais, Mohammad Alshayeb, and Zubair A. Baig

Digitally augmenting physical spaces for personalised learning, Julie Boston, Martin Masek, Mark P. Brogan, and Chiou Peng Lam

Intrusion Detection Systems in the Protection of Assets, David J. Brooks

Corporate security and the stratum of security management, David J. Brooks and Jeffrey D. Corkill

Engineering Principles in the Protection of Assets, David J. Brooks and Clifton L. Smith

Link

Volatile memory acquisition tools - A comparison across taint and correctness, William Campbell

Link

A Survey Of IPv6 Address Usage In The Public Domain Name System, Clinton R. Carpene and Andrew J. Woodward

A review of the use of ICT to support Agricultural development in India, Pallavie Chatuphale and Leisa Armstrong

Link

Development of location-based services for recommending departure stations to park and ride users, Zhirong Chen, Jianhong Cecilia Xia, Buntoro Irawan, and Craig Caulfied

Link

A survey of a personalised location-based service architecture for property hunting, Z Chen, J Xia, and C Caulfield

Link

Locational wireless and social media-based surveillance, Maxim Chernyshev

Link

The zombies strike back: Towards client-side beef detection, Maxim Chernyshev and Peter Hannay

Identity multipliers and the mistaken twittering of birds of a feather, David M. Cook

Link

Twitter Deception And Influence: Issues Of Identity, Slacktivism, And Puppetry, David M. Cook, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, and Shaquille Abdul Rahman

Link

Do Security Systems Fail Because Of Entropy?, Michael P. Coole and David J. Brooks

Link

Numerical Study Of The Influence Of Foundation Compressibility And Reinforcement Stiffness On The Behavior Of Reinforced Soil Walls, I.P Damians, Richard Bathurst, A Josa, and A Lloret

Link

Forensic memory dump analysis and recovery of the artefacts of using tor bundle browser-the need, Divya Dayalamurthy

Link

Task disengagement and implications for vigilance performance in CCTV surveillance, F M. Donald and Craig H. M. Donald

Link

Persistent issues in encryption software: A heuristic and cognitive walkthrough, Jad El-Abed and Patryk S. Szewczyk

Link

The price of patching, Steven Furnell, Johan van Niekerk, and Nathan Clarke

PDF

ICTs for Agricultural Extension: A study in Ratnagiri district of Maharashtra, India, Niketa Gandhi and Leisa Armstrong

Link

Applications of Expert System in Agriculture, Niketa Gandhi, Shubhangi S. Wankhede, and Leisa Armstrong

PDF

Giving students an informed choice when selecting teams for group work, Yuwanuch Gulatee and Martin Masek

Link

Procedures and tools for acquisition and analysis of volatile memory on android smartphones, Andri P. Heriyanto

Link

Big data in healthcare: and what is it used for?, Rebecca J. Hermon and Patricia A. Williams

Link

The impace of custom ROM backups on android external storage erasure, Haydon P. Hope and Peter Hannay

PDF

Text extraction in natural scenes using region-based method, Zhihu Huang and Jinsong Leng

Link

Are Librarians Equipped to Teach International Students? A Survey of Current Practices and Recommendations for Training, Yusuke Ishimura and Joan C. Bartlett

Link

Investigating the viability of multifactor graphical passwords for user authentication, M Z. Jali, Steven M. Furnell, and P S. Dowland

PDF

Modelling and Analysis on Noisy Financial Time Series, Jinsong Leng

PDF

A network that really works – the application of artificial neural networks to improve yield predictions and nitrogen management in Western Australia, Jinsong Leng, Andreas Neuhaus, and Leisa Armstrong

PDF

Developing And Validating A Healthcare Information Security Governance Framework, Rachel J. Mahncke and Patricia A. Williams

Interpreting international governance standards for health IT use within general medical practice, Rachel J. Mahncke and Patricia A. Williams

PDF

Geospatial data pre-processing on watershed datasets: A GIS approach, Sreedhar Nallan, Leisa Armstrong, Barry Croke, and Amiya K. Tripathy

PDF

Integrating soil and plant tissue tests and using an artificial intelligence method for data modelling is likely to improve decisions for in-season nitrogen management, Andreas Neuhaus, Leisa Armstrong, Jinsong Leng, Dean Diepeveen, and Geoff Anderson

PDF

Web-based training in e-Agriculture for Agricultural College, Prachyanum Nilsook, Leisa Armstrong, Pornchai Taechatanasat, and Tirtha Ranjeet

Link

An analysis of security issues in building automation systems, Matthew D. Peacock and Michael N. Johnstone

PDF

An Artificial Neural Network for Predicting Crops Yield in Nepal, Tirtha Ranjeet and Leisa Armstrong

Link

An investigation into the efficiency of forensic data erasure tools for removable usb flash memory storage devices, Krishnun Sansurooah, Haydon Hope, Hani Almutairi, Fayadh Alnazawi, and Yunhan Jiang

Link

BYOD in ehealth: herding cats and stable doors, or a catastrophe waiting to happen?, Krishnun Sansurooah and Patricia A. Williams

GrIDSense: Information, Communication and Dissemination System for Water, Pest / Disease Management for Citrus Crop, Suryakant Sawant, Mrunalini Bhadnake, Jagarlapudi Adinarayana, Surya Durbha, B.V.N. Phanindra, and Amol Zape

PDF

A survey of image processing techniques for agriculture, Lalit Saxena and Leisa Armstrong

Link

Efficacy of property marking: police identification of stolen property, Craig J. Separovic and David J. Brooks

PDF

Mobile Applications for Indian Agriculture Sector: A case study, Pratik Shah, Niketa Gandhi, and Leisa Armstrong

Link

Usability and security support offered through ADSL router user manuals, Patryk Szewczyk

Link

Sellers continue to give away confidential information on second hand memory cards sold in Australia, Patryk Szewczyk, Nikki Robins, and Krishnun Sansurooah

PDF

Decision Support System Data for Farmer Decision Making, Pornchai Taechatanasat and Leisa Armstrong

Low Cost Weather Information System, Amiya K. Tripathy, Stephen Santhmayor, Chirag Jagasia Jagasia, and Tushar Sawant

PDF

Role of ICTs in improving drought scenario management in India, Shubhangi S. Wankhede, Niketa Gandhi, and Leisa Armstrong

Link

Avoiding epic fails: Software and standards directions to increase clinical safety, Patricia A. Williams and Vincent McCauley

Link

Australia's National Broadband Network-A cybersecure critical infrastructure?, Nigel Wilson

Link

Work-integrated learning: Linking research and teaching for a win-win situation, J Xia, Craig Caulfield, and S Ferns

Link

How civil aviation threatens national security, A Yates and Nara Srinivasan

Link

Design for integrated WiFi defence strategy in mordern enterprise context, Hongye Zhong and Jitian Xiao

Submissions from 2013

Link

Cloud forensics: a research perspective, Sameera Almulla, Youssef Iraqi, and Andrew Jones

Link

Breaking the theft-chain-cycle: Property marking as a defensive tool , William J. Bailey and David J. Brooks

Link

Intention-oriented programming support for runtime adaptive autonomic cloud-based applications, Thar Baker, Michael Mackay, Martin Randles, and Azzelarare Taleb-Bendiab

Link

Twitter influence and cumulative perceptions of extremist support: A case study of Geert Wilders, Gabrielle Blanquart and David M. Cook

PDF

E-learning with docugames: AE2 Commander, Mark P. Brogan and Martin Masek

Link

Developing a mobile audiometric sound booth application for Apple IOS devices, Luke J. Brook and Patricia A. Williams

PDF

Diversity And Equity...Community Building Strategies In Public Libraries For Multicultural Communities, Rajeswari Chelliah

Link

Artificial and computational intelligence for games on mobile platforms, Clare Bates Congdon, Philip F. Hingston, and Graham Kendall

The contemporary Australian intelligence domain, Jeffrey Corkill and Alan Davies

PDF

Security, control and deviance: Mapping the security domain and why it matters, Jeffrey D. Corkill and Michael P. Coole

Link

Search in real-time video games, Peter I. Cowling, Michael Buro, Michal Bida, Adi Botea, Bruno Bouzy, Martin V. Butz, Philip Hingston, Hector Munoz-Avila, Dana Nau, and Moshe Sipper