Follow

Submissions from 2011

Link

Considering Complexity Theory in Understanding Information Management in Health Systems, Shirlee-ann Knight

Link

Information Management in Health Systems: Considering an Organic Approach, Shirlee-ann Knight

PDF

The Combined Conceptual Life Cycle Model of Information Quality in User Perceptions of IQ On The Web, Shirlee-ann Knight

Link

The combined conceptual life-cycle model of information quality: Part 1, an investigative framework, Shirlee-ann Knight

PDF

A Preliminary Introduction to the OTAM: Exploring Users’ Perceptions of their on-going Interaction with Adopted Technologies, Shirlee-ann Knight and Janice M. Burn

Link

Risk assessment for mobile devices, Thomas Ledermuller and Nathan L. Clarke

Link

A Rough-fuzzy Hybrid Approach on a Neuro-Fuzzy Classifier for High Dimensional Data, Chang Su Lee

Link

Feature Reduction using a GA-Rough Hybrid Approach on Bio-medical data, Chang Su Lee

Link

Rough-fuzzy Hybrid Approach for Identification of Bio-Markers and Classification on Alzheimer's Disease Data, ChangSu Lee, Chiou-Peng Lam, and Martin Masek

PDF

Reinforcement learning of competitive and cooperative skills in soccer agents, Jinsong Leng and Chee Lim

Link

Outliers Detection with Correlated Subspaces for High Dimensional Datasets, Jinsong T. Leng and Zhihu Huang

Link

An Exploration of 1st and 2nd Generation CPTED for End of Year School Leavers at Rottnest Island, John Letch, Ellice Mcglinn, Jonathan Bell, Emma Downing, and David Cook

PDF

Behaviour Profiling for Transparent Authentication for Mobile Devices, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

Misuse Detection for Mobile Devices Using Behaviour Profiling, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

Engineering design of strategies for winning iterated prisoner's dilemma competitions, Jiawei Li, Philip Hingston, and Graham Kendall

Link

Australian primary health care check: Who is accountable for information security?, Rachel J. Mahncke and Patricia A H Williams

Link

Student opinions on their development of non-technical skills in IT education, W Makasiranondh, S Maj, and D Veal

PDF

A pedagogical rich interactive on-line learning platform for Network Technology students in Thailand, Woratat Makasiranondh, Stanislaw Maj, and David Veal

An Overview of Browser Vulnerability Attacks, Countermeasures and Detection Tools, Masood Mansoori and Ray Hunt

Link

An Evaluation of Data Erasing Tools, Thomas Martin and Andrew Jones

PDF

Managing Multidisciplinary Student Design Teams, Martin Masek, Joo Jung, and Barnard Clarkson

Link

Trusted interoperability and the patient safety issues of parasitic health care software, Vincent B. McCauley and Patricia A H Williams

Link

Information Leakage through Online Social Networking Opening the Doorway for Advanced Persistence Threats, Nurul Nuha Abdul Molok, Atif Ahmad, and Shanton Chang

Link

Empowering protest through social media, Simon O'Rourke

Link

Spatial and Temporal Visualisation Techniques for Crash Analysis, Charlotte S. Plug, Jianhong Xia, and Craig Caulfield

Link

Can Current Packet Analysis Software Detect BitTORRENT Activity or Extract Files From BTP and uTP Traffic Streams?, William Pung and Andrew Woodward

Link

Critical infrastructure Protection: An Ethical Choice, Graeme Pye, Matthew Warren, and William Hutchinson

PDF

Effective Scheduling Algorithm for On-Demand XML Data Broadcasts in Wireless Environments, Yongrui Qin, Hua Wang, and Jitian Xiao

PDF

Analysis of Key Installation Protection using Computerized Red Teaming, Tirtha Ranjeet, Philip Hingston, Chiou Peng Lam, and Martin Masek

Link

The effects of diversity maintenance on coevolution for an intransitive numbers problem, Tirtha Ranjeet, Martin Masek, Philip Hingston, and Chiou Peng Lam

Link

Air Cargo Security, Norman Shanks

Link

Hold Baggage Screening, Norman Shanks

Link

Security Training, Narayanan Srinivasan

Link

Enhancing Agile Methods for Multicultural Software Project Teams, Anuradha Sutharshan and s Maj

Analysis of Data Remaining on Second Hand ADSL Routers, Patryk Szewczyk

Link

Usability of Internet Security Software: Have They Got it Right?, Patryk Szewczyk

Link

A 2011 investigation into remnant data on second hand memory cards sold in Australia, Patryk Szewczyk and Krishnun Sansurooah

Link

Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia, Craig Valli, Andrew Woodward, and P Hannay

PDF

A low cost adaptive graphical user interface for the visually handicapped with multiple conditions, David Veal and Stanislaw Maj

Link

Information leakage through second hand USB flash drives within the United Kingdom, Chaerani Widya, Nathan Clarke, and Christopher Bolan

Link

Why Australia's e-health system will be a vulnerable national asset, Patricia A. Williams

Link

Help or hindrance: The practicality of applying security standards in healthcare, Patricia A H Williams

Is the Biggest Threat to Medical Information Simply a Lack of Understanding?, Patricia A.H. Williams

Link

Studies on Pareto-based multi-objective Competitive Coevolutionary Dynamics, F Zeng, J Decraene, M Low, W Cai, and Philip Hingston

Link

R-tfidf, A variety of tf-idf Term Weighting Strategy in Document Categorization, Dengya Zhu and Jitian Xiao

Submissions from 2010

A study of audience responses to the media discourse about the 'Other': The Fear of Terrorism between Australian Muslims and the Broader Community , Anne Aly

Fear, victimisation and identity: The community victimisation perspective and social inclusion of Australian Muslims, Anne Aly

Information Operations Matters: Best practices, Leigh Armistead

An eAgriculture-based Decision Support Framework for Information Dissemination, Leisa Armstrong, Dean Diepeveen, and Khumphicha Tantisantisom

Using Traffic Analysis to Identify Tor Usage - A Proposed Study, John Barker, Peter Hannay, and Christopher Bolan

PDF

The significance of learning style with respect to achievement in first year programming students., Vivian Campbell and Michael Johnstone

An implementation of a garment-fitting simulation system using laser scanned 3D body data., Changsuk Cho, Jun-Young Park, Adrian Boeing, and Philip Hingston

Hardware Implementation of the Self Assessment Manikin, Warren Creemers and Philip Hingston

The 2010 IDN Homograph Attack Mitigation Survey, Peter Hannay and Christopher Bolan

PDF

A New Design for a Turing Test for Bots, Philip Hingston

PDF

Evolving Group Strategies for IPD, Philip Hingston

PDF

RedTNet: A Network Model for Strategy Games., Philip Hingston, Mike Preuss, and Daniel Spierling

PDF

A Distributed and Cooperative User Authentication Framework, C.G. Hocking, Steven Furnell, Nathan Clarke, and P L Reynolds

PDF

Analysis of Hu's Moment Invariants on Image Scaling and Rotation, Zhihu Huang and Jinsong Leng

PDF

An Online Ballistics Imaging System for Firearm Identification, Zhihu Huang and Jinsong Leng

PDF

A Novel Binarization Algorithm for Ballistics Imaging Systems, Zhihu Huang and Jinsong Leng

New technologies: dissonance, influence and radical behaviours, William E. Hutchinson

Influence Operations and Behavioural Change, William Hutchinson and Matthew Warren

Assessing image-based authentication techniques in a web-based environment., M Z. Jali, Steven M. Furnell, and P S. Dowland

PDF

How do you make information security user friendly?, Andrew Jones

PDF

Digital forensics and the issues of identity., Andrew Jones and Thomas Martin

PDF

Patterns Relevant to the Temporal Data-Context of an Alarm of Interest, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li

Computational Intelligence for Functional Testing, Chiou Peng Lam

Adaptive T-S type Rough-Fuzzy Inference Systems (ARFIS) for Mobile Robot Navigation, Chang Su Lee

PDF

A Novel Subspace Outlier Detection Approach in High Dimensional Data Sets, Jinsong Leng

Mining Outliers in Correlated Subspaces for High Dimensional Data Sets, Jinsong Leng and Tzung-Pei Hong

Analyzing Texture Features of Ballistic Projectile Images for Firearm Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li

Optical Imaging and Analysis of Firing-pin Marks for Ballistics Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li

PDF

A Wrapper-Based Feature Selection for Analysis of Large Data Sets, Jinsong Leng, Craig Valli, and Leisa Armstrong

PDF

Android Forensics: Simplifying Cell Phone Examinations., Jeff Lessard and Gary Kessler

PDF

Behaviour Profiling on Mobile Devices., Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Cross-Cultural Education: Learning Methodology and Behaviour Analysis for Asian Students in IT Field of Australian Universities, Jie Lu, Kum Chin, Juan Yao, Jun Xu, and Jitian Xiao

State Model Diagrams - A Universal, Model Driven Method for Network System Configuration and Management, Stanislaw Maj

An Evaluation of Firewall Configuration Methods, Stanislaw Maj, Woratat Makasiranondh, and David Veal

State Model Diagrams - A Universal Runtime Network Management Tool, Stanislaw Maj, Woratat Makasiranondh, and David Veal

An Evaluation of State Model Diagrams for Secure Network Configuration and Management, Stanislaw Maj and David Veal

Evaluating Layer 3 Device Tunnelling and Access Control List Security Bandwidths Using B-node Theory, Stanislaw Maj and David Veal

Parsimony Analysis - A Novel Method of Structured Knowledge Representation for Teaching Computer Science, Stanislaw Maj and David Veal

Using State Model Diagrams to Manage Secure Layer 2 Switches, Stanislaw Maj and David Veal

A Preliminary Evaluation of the new Cisco Network Security Course, Stanislaw Maj, David Veal, and Lotfi Yassa

An integrated multimedia based platform for teaching network security, Woratat Makasiranondh, Stanislaw Maj, and David Veal

Factors affecting the sustainability of Computer Information Systems: Embedding new technology into a hospital environment., Donald Mcdermid, Linda Kristjanson, and Nigel Spry

An Information Security Governance Encounter for Australian Primary Care Health Providers., Donald Mcdermid, Rachel Mahncke, and Patricia Williams

The Growing Need for On-Scene Triage of Mobile Devices., Richard P. Mislan, Eoghan Casey, and Gary C. Kessler

Breaches in Medical Information Security: The Problem of Reporting, Neha Patel and Patricia Williams

PDF

Interrogation of Water Catchment Data Sets Using Data Mining Techniques, Ajdin Sehovic, Leisa Armstrong, and Dean Diepeveen

PDF

Testing an Exergame for Effectiveness and Attractiveness., Jeffrey Ronald Sinclair, Philip Hingston, Martin Masek, and Kazunori Nosaka

An Evaluation of Agile Software Methodology Techniques, Anuradha Sutharshan and Stanislaw Maj

PDF

The ADSL Router Forensics Process, Patryk Szewczyk

PDF

Ignorant Experts: Computer and Network Security Support From Internet Service Providers, Patryk Szewczyk and Craig Valli

PDF

An Analysis of Information Security Awareness within Home and Work Environments, Shuhaili Talib, Nathan Clarke, and Steven Furnell

PDF

Application of a Data Mining Framework for the Identification of Agricultural Production Areas in WA , Yunous Vagh, Leisa Armstrong, and Dean Diepeveen

Developing VoIP Router honeypots, Craig Valli and Mohammed Al Lawati

Geotagging Where Cyberspace Comes to Your Place, Craig Valli and Peter Hannay

A Graphical User Interface for the Visually Impaired - an Evaluation, David Veal and Stanislaw Maj