Follow

Submissions from 2014

Link

The E-book Power User in Academic and Research Libraries: Deep Log Analysis and User Customisation, Pervaiz Ahmad, Mark Brogan, and Michael N. Johnstone

Link

Determining what characteristics constitute a darknet, Symon Aked, Christopher Bolan, and Murray Brand

PDF

Tego - A framework for adversarial planning, Daniel Ashlock and Philip Hingston

Link

A Genetic Algorithm-Based Feature Selection, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen

PDF

On The Application Of Genetic Probabilistic Neural Networksand Cellular Neural Networks In Precision Agriculture, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen

Link

Volatile memory acquisition tools - A comparison across taint and correctness, William Campbell

Link

Development of location-based services for recommending departure stations to park and ride users, Zhirong Chen, Jianhong Cecilia Xia, Buntoro Irawan, and Craig Caulfied

Link

A survey of a personalised location-based service architecture for property hunting, Z Chen, J Xia, and C Caulfield

Link

Twitter Deception And Influence: Issues Of Identity, Slacktivism, And Puppetry, David M. Cook, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, and Shaquille Abdul Rahman

Link

Do Security Systems Fail Because Of Entropy?, Michael P. Coole and David J. Brooks

Link

Numerical Study Of The Influence Of Foundation Compressibility And Reinforcement Stiffness On The Behavior Of Reinforced Soil Walls, I.P Damians, Richard Bathurst, A Josa, and A Lloret

Link

Forensic memory dump analysis and recovery of the artefacts of using tor bundle browser-the need, Divya Dayalamurthy

Link

Task disengagement and implications for vigilance performance in CCTV surveillance, F M. Donald and Craig H. M. Donald

Link

Applications of Expert System in Agriculture, Niketa Gandhi, Shubhangi S. Wankhede, and Leisa Armstrong

Link

Procedures and tools for acquisition and analysis of volatile memory on android smartphones, Andri P. Heriyanto

PDF

Text extraction in natural scenes using region-based method, Zhihu Huang and Jinsong Leng

Link

Are Librarians Equipped to Teach International Students? A Survey of Current Practices and Recommendations for Training, Yusuke Ishimura and Joan C. Bartlett

Link

Investigating the viability of multifactor graphical passwords for user authentication, M Z. Jali, Steven M. Furnell, and P S. Dowland

PDF

Developing And Validating A Healthcare Information Security Governance Framework, Rachel J. Mahncke and Patricia A. Williams

Link

An investigation into the efficiency of forensic data erasure tools for removable usb flash memory storage devices, Krishnun Sansurooah, Haydon Hope, Hani Almutairi, Fayadh Alnazawi, and Yunhan Jiang

Link

Usability and security support offered through ADSL router user manuals, Patryk Szewczyk

Link

Sellers continue to give away confidential information on second hand memory cards sold in Australia, Patryk Szewczyk, Nikki Robins, and Krishnun Sansurooah

Link

Australia's National Broadband Network-A cybersecure critical infrastructure?, Nigel Wilson

Link

Work-integrated learning: Linking research and teaching for a win-win situation, J Xia, Craig Caulfield, and S Ferns

Link

How civil aviation threatens national security, A Yates and Nara Srinivasan

Link

Design for integrated WiFi defence strategy in mordern enterprise context, Hongye Zhong and Jitian Xiao

Submissions from 2013

Link

Cloud forensics: a research perspective, Sameera Almulla, Youssef Iraqi, and Andrew Jones

Link

Breaking the theft-chain-cycle: Property marking as a defensive tool , William J. Bailey and David J. Brooks

Link

Intention-oriented programming support for runtime adaptive autonomic cloud-based applications, Thar Baker, Michael Mackay, Martin Randles, and Azzelarare Taleb-Bendiab

Link

Twitter influence and cumulative perceptions of extremist support: A case study of Geert Wilders, Gabrielle Blanquart and David M. Cook

PDF

E-learning with docugames: AE2 Commander, Mark P. Brogan and Martin Masek

Link

Developing a mobile audiometric sound booth application for Apple IOS devices, Luke J. Brook and Patricia A. Williams

Link

Artificial and computational intelligence for games on mobile platforms, Clare Bates Congdon, Philip F. Hingston, and Graham Kendall

The contemporary Australian intelligence domain, Jeffrey Corkill and Alan Davies

PDF

Security, control and deviance: Mapping the security domain and why it matters, Jeffrey D. Corkill and Michael P. Coole

Link

Search in real-time video games, Peter I. Cowling, Michael Buro, Michal Bida, Adi Botea, Bruno Bouzy, Martin V. Butz, Philip Hingston, Hector Munoz-Avila, Dana Nau, and Moshe Sipper

Link

The effectiveness of internet activity erasure tools to protect privacy, Brian Cusack, Andrew Woodward, Scott Butson, and Benjamin Leber

Link

Activities of daily living classification using depth features, Laurence J. Da Luz, Martin Masek, and Chiou Peng P. Lam

Link

NSC-NSGA2: Optimal search for finding multiple thresholds for nearest shrunken centroid, Vinh Q. Dang and Chiou-Peng Lam

Link

NSC-GA: Search for optimal shrinkage thresholds for nearest shrunken centroid, Vinh Q. Dang, Chiou-Peng P. Lam, and Chang Su Lee

Link

The contemporary Australian intelligence domain: A multi dimension examination, Alan Davies and Jeffrey Corkill

Link

Is emergency management considered a component of business continuity management?, Kenny Frohde and David J. Brooks

Link

iTRAQ-based quantitative proteomic analysis reveals new metabolic pathways of wheat seedling growth under hydrogen peroxide stress, Pei Ge, Pengchao Hao, Min Cao, Guangfang Guo, Dongwen Lv, Saminathan Subburaj, Xiaohui Li, Xing Yan, Jitian Xiao, Wujun Ma, and Yueming Yan

Link

Geo Forensics: Classes of locational data sources for embedded devices, Peter Hannay

Link

Exchanging demands: Weaknesses in SSL implementations for mobile platforms, Peter Hannay, Clinton R. Carpene, Craig Valli, Andrew J. Woodward, and Michael N. Johnstone

Link

A study on information induced medication errors, Rebecca J. Hermon and Patricia A. Williams

PDF

Mobile games with intelligence: a killer application?, Philip Hingston, Clare Bates Congdon, and Graham Kendall

Link

Analysis on Segmentation and Registration for Chinese Seal Identification, Zhihu Huang and Jinsong Leng

PDF

Information Behavior and Japanese Students: How Can an Understanding of the Research Process Lead to Better Information Literacy?, Yusuke Ishimura

Link

Embedding Secure Programming in the Curriculum: Some Lessons Learned, Michael N. Johnstone

Link

Security aspects of military sensor-based defence systems, Michael N. Johnstone and Robert Thompson

Link

Automated detection of vehicles with machine learning, Michael N. Johnstone and Andrew J. Woodward

Link

Intention-oriented modelling support for GORE in elastic cloud applications, Yasir Karam, Thar Baker, and Azzelarare Taleb-Bendiab

Link

Oblivious clouds: towards self-conscious cloud based application development, Yasir Karam, Thar Baker, and Azzelarare Taleb-Bendiab

Link

Support for intention driven cloud government entitlement services, Yasir Karam, Thar Baker, and Azzelarare Taleb-Bendiab

Link

Support for self-optimized organizational patterns in socio-driven elastic clouds, Yasir Karam, Thar Baker, and Azzelarare Taleb-Bendiab

Link

Physical security barrier selection: A decision support analysis, Agnieszka Kiszelewska and Michael Coole

Link

WAMbot: Simulation and modelling of a team of autonomous mobile robots, Martin Masek, Frank Ophelders, Sushil Pangeni, Adrian Boeing, and Thomas Braunl

Link

Improving assessment of groundwater-resource sustainability with deterministic modelling: A case study of the semi-arid Musi sub-basin, South India [Amélioration de l'évaluation de la pérennité de la ressource en eau souterraine à l'aide d'une modélisation déterministe: Cas du sous-bassin semi aride Musi, Inde du Sud], S Massuel, B A. George, J P. Venot, L Bharati, and S Acharya

Link

An exploratory study of the lived experience of being an intelligence analyst, Sharon Moss, Jeffrey Corkill, and Eyal Gringart

Link

Towards detection and control of civilian unmanned aerial vehicles, Matthew Peacock and Michael N. Johnstone

PDF

Testing a distributed denial of service defence mechanism using red teaming, Samaneh Rastegari, Philip Hingston, Chiou-Peng Lam, and Murray Brand

Link

Current and emerging technologies employed to abate crime and to promote security, Rick Sarre, David J. Brooks, Clifton L. Smith, and Rick Draper

PDF

Technology Corner: Visualising forensic data: Evidence guidelines (Part 2), Damian Schofield and Ken Fowle

PDF

Technology corner: Visualising forensic data: Evidence (Part 1), Damian Schofield and Ken Fowle

Link

Cartoons for e-health informatics, Moira G. Sim, Eric L. Khong, Ashleigh C. Mcevoy, Toni Wain, Mick Sim, and Patricia A. Williams

Link

Connectivity check for modular self reconfigurable robots, Rajesh Subramanian, Martin Masek, and Chang Su Lee

Link

Usability and security support offered through ADSL router user manuals, Patryk S. Szewczyk

Link

Sellers continue to give away confidential information on second hand memory cards sold in Australia, Patryk S. Szewczyk, Nikki Robins, and Krishnun Sansurooah

Link

Benchmarking web accessibility evaluation tools: Measuring the harm of sole reliance on automated tests, Markel Vigo, Justin A. Brown, and Vivienne L. Conway

Link

The influence and deception of Twitter: the authenticity of the narrative and slacktivism in the Australian electoral process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille Abdul Rahman, and David M. Cook

PDF

Usefulness of infeasible solutions in evolutionary search: an empirical and mathematical study, Lyndon While and Philip Hingston

Link

Creating context: Making sense of geo-location and social media data for health, Patricia A. Williams

Link

Does the PCEHR mean a new paradigm for information security? Implications for health information management, Patricia A. Williams

Link

Information security governance: A risk assessment approach to health information systems protection, Patricia A. Williams

Link

It will never happen to us: The likelihood and impact of privacy breaches on health data in Australia, Patricia A. Williams and Emma Hossack

Link

A conceptual framework for secure use of mobile health, Patricia A. Williams and Anthony Maeder

Link

A rapidly moving target: Conformance with e-health standards for mobile computing, Patricia A. Williams and Vincent McCauley

Submissions from 2012

Link

Scholarly use of E-books in a virtual academic environment: A Case Study, Pervaiz Ahmad and Mark Brogan

Link

An Investigation into the Wi-Fi protected setup pin of the Linksys WRT160N v2, Symon Aked, Christopher Bolan, and Murray Brand

PDF

A Proposed Method for Examining Wireless Device Vulnerability to Brute Force Attacks via WPS External Registrar PIN Authentication Design Vulnerability, Symon Aked, Christopher Bolan, and Murray Brand

PDF

Factors influencing the use of information and communication technology (ICT) tools by the rural famers in Ratnagiri District of Maharashtra, India. , Leisa Armstrong and N. Gandhi

Link

Use of Information and Communication Technology (ICT) tools by rural farmers in Ratnagiri District of Maharastra, India. , Leisa Armstrong, Niketa Gandhi, and K Lanjekar

PDF

A Technical Guide to Designing and Implementing Effective Web Surveys, Gregory Baatard

PDF

A Technical Guide to Effective and Accessible Web Surveys, Gregory Baatard

Link

Proactive Security Protection of Critical Infrastructure: A Process Driven Methodology, William Bailey and Robert Doleman

Link

Creating a counter insurgency program: Elements required based upon a comparative analysis of research findings, William J. Bailey

PDF

Using Monte Carlo Tree Search for Replanning in a Multistage Simultaneous Game, Daniel Beard, Philip Hingston, and Martin Masek

Link

WAMbot: Team MAGICian's entry to the Multi Autonomous Ground-robotic International Challenge 2010, Adrian Boeing, Mark Boulton, Thomas Braunl, Brian Frisch, Sam Lopes, Aidan Morgan, Frank Ophelders, Sushil Pangeni, Robert Reid, Kevin Vinsen, Nicolas Garel, Chang Su Lee, Martin Masek, Anthony Attwood, Michael Fazio, and Adam Gandossi

Link

Real-Time Tactical Motion Planning and Obstacle Avoidance for Multi-Robot Cooperative Reconnaissance, Adrian Boeing, Sushil Pangeni, Thomas Braunl, and Chang Su Lee

Link

A proposed formula for comparing kill password effectiveness in single password RFID systems, Christopher Bolan

PDF

Utilizing the RFID LOCK Command Against Multiple Targets, Christopher Bolan

Link

In the shadow of the cloud - technology in the RIM workspace: RIMPA 2010 Technology Survey - Part 2, Mark Brogan and David Roberts

PDF

Corporate Security: Using knowledge construction to define a practising body of knowledge, David Brooks

PDF

Security threats and risks of Intelligent Building Systems: Protecting facilities from current and emerging vulnerabilities, David Brooks

PDF

Online Course Content Auditing: Templates and Practices, Justin Brown and Gregory Baatard

PDF

Web Accessibility in Corporate Australia: Perceptions versus Reality, Justin Brown and Vivienne Conway

PDF

Shall we play a game?, Craig William Caulfield, Stanislaw Maj, J C Xia, and David Veal

Link

An improved APIT location algorithm for wireless sensor networks, WenHua Cheng, Jia Li, and Huaizhong Li

Link

Website Accessibility: a Comparative Analysis of Australian National and State/Territory Library Websites, Vivienne Conway, Justin Brown, Scott Hollier, and Cam Nicholl