Follow

Submissions from 2011

Not art, not science, but artistry: Why Professional Artistry should matter to the intelligence community, Jeffrey D. Corkill

Link

User perceptions of end user license agreements in the smartphone environment, Hamish Cotton and Christopher Bolan

Link

Incorporating Genetic Algorithm into Rough Feature Selection for High Dimensional Biomedical Data, Vinh Q. Dang, Chio- Peng Lam, and Chang Su Lee

Link

A strategy to articulate the facility management knowledge categories within the built environment, Robert Doleman and David Brooks

Systemic failures of fire protection equipment in Australian aged care nursing facilities, Robert Doleman and David Brooks

Link

Is there a core set of skills for visual analysis across different imaging technologies?, Craig H.M. Donald

Link

Individualised responses to vigilance demands and their management, Fiona M. Donald and Craig H.M. Donald

PDF

High-dimensional Objective-based Data Farming, Zeng Fanchao, James Decraene, Malcolm Low, Wentong Cai, Suiping Zhou, and Philip F. Hingston

Link

Visualising Forensic Data: Investigation to Court, Kenneth Fowle and Damian Schofield

PDF

Estimation of CBR Value Using Dynamic Cone Penetrometer, K S. Gill, A K. Choudhary, and S K. Shukla

Link

Kindle Forensics: Acquisition and Analysis, Peter Hannay

Link

GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering, Peter Hannay and Gregory Baatard

Link

Red teaming with coevolution, Philip Hingston and Mike Preuss

Link

A preliminary investigation of distributed and cooperative user authentication, C Hocking, Steven Furnell, Nathan Clarke, and P Reynolds

Link

Authentication Aura - A Distributed Approach to User Authentication, C. G. Hocking, Steven Furnell, Nathan Clarke, and P. L. Reynolds

PDF

A new seal verification for Chinese color seal, Zhihu Huang and Jinsong Leng

Link

A longitudinal study of Wi-Fi access point security in the Perth central business district, Emil Jacobson and Andrew Woodward

Link

Are existing security models suitable for teleworking, Peter James

Link

Modelling misuse cases as a means of capturing security requirements, Michael N. Johnstone

Link

Security aspects of sensor-based defence systems, Michael N. Johnstone

Link

Penetration of Zigbee-based wireless sensor networks, Michael N. Johnstone and Jeremy A. Jarvis

Link

Information evaluation: How one group of intelligence analysts go about the task, John Joseph and Jeff Corkill

Link

Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework, Mahmoud Khonji, Y Iraqi, and Andrew Jones

Link

Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

Lexical URL analysis for discriminating phishing and legitimate websites, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

A study of feature subset evaluators and feature subset searching methods for phishing classification, Mahmoud Khonji, Andrew Jones, and Youssef Iraqi

Link

Considering Complexity Theory in Understanding Information Management in Health Systems, Shirlee-ann Knight

Link

Information Management in Health Systems: Considering an Organic Approach, Shirlee-ann Knight

PDF

The Combined Conceptual Life Cycle Model of Information Quality in User Perceptions of IQ On The Web, Shirlee-ann Knight

Link

The combined conceptual life-cycle model of information quality: Part 1, an investigative framework, Shirlee-ann Knight

PDF

A Preliminary Introduction to the OTAM: Exploring Users’ Perceptions of their on-going Interaction with Adopted Technologies, Shirlee-ann Knight and Janice M. Burn

Link

Risk assessment for mobile devices, Thomas Ledermuller and Nathan L. Clarke

Link

A Rough-fuzzy Hybrid Approach on a Neuro-Fuzzy Classifier for High Dimensional Data, Chang Su Lee

Link

Feature Reduction using a GA-Rough Hybrid Approach on Bio-medical data, Chang Su Lee

Link

Rough-fuzzy Hybrid Approach for Identification of Bio-Markers and Classification on Alzheimer's Disease Data, ChangSu Lee, Chiou-Peng Lam, and Martin Masek

PDF

Reinforcement learning of competitive and cooperative skills in soccer agents, Jinsong Leng and Chee Lim

Link

Outliers Detection with Correlated Subspaces for High Dimensional Datasets, Jinsong T. Leng and Zhihu Huang

Link

An Exploration of 1st and 2nd Generation CPTED for End of Year School Leavers at Rottnest Island, John Letch, Ellice Mcglinn, Jonathan Bell, Emma Downing, and David Cook

PDF

Behaviour Profiling for Transparent Authentication for Mobile Devices, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

Misuse Detection for Mobile Devices Using Behaviour Profiling, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

Engineering design of strategies for winning iterated prisoner's dilemma competitions, Jiawei Li, Philip Hingston, and Graham Kendall

Link

Australian primary health care check: Who is accountable for information security?, Rachel J. Mahncke and Patricia A H Williams

Link

Student opinions on their development of non-technical skills in IT education, W Makasiranondh, S Maj, and D Veal

PDF

A pedagogical rich interactive on-line learning platform for Network Technology students in Thailand, Woratat Makasiranondh, Stanislaw Maj, and David Veal

An Overview of Browser Vulnerability Attacks, Countermeasures and Detection Tools, Masood Mansoori and Ray Hunt

Link

An Evaluation of Data Erasing Tools, Thomas Martin and Andrew Jones

PDF

Managing Multidisciplinary Student Design Teams, Martin Masek, Joo Jung, and Barnard Clarkson

Link

Trusted interoperability and the patient safety issues of parasitic health care software, Vincent B. McCauley and Patricia A H Williams

Link

Information Leakage through Online Social Networking Opening the Doorway for Advanced Persistence Threats, Nurul Nuha Abdul Molok, Atif Ahmad, and Shanton Chang

Link

Empowering protest through social media, Simon O'Rourke

Link

Spatial and Temporal Visualisation Techniques for Crash Analysis, Charlotte S. Plug, Jianhong Xia, and Craig Caulfield

Link

Can Current Packet Analysis Software Detect BitTORRENT Activity or Extract Files From BTP and uTP Traffic Streams?, William Pung and Andrew Woodward

Link

Critical infrastructure Protection: An Ethical Choice, Graeme Pye, Matthew Warren, and William Hutchinson

PDF

Effective Scheduling Algorithm for On-Demand XML Data Broadcasts in Wireless Environments, Yongrui Qin, Hua Wang, and Jitian Xiao

PDF

Analysis of Key Installation Protection using Computerized Red Teaming, Tirtha Ranjeet, Philip Hingston, Chiou Peng Lam, and Martin Masek

Link

The effects of diversity maintenance on coevolution for an intransitive numbers problem, Tirtha Ranjeet, Martin Masek, Philip Hingston, and Chiou Peng Lam

Link

Air Cargo Security, Norman Shanks

Link

Hold Baggage Screening, Norman Shanks

Link

Security Training, Narayanan Srinivasan

Link

Enhancing Agile Methods for Multicultural Software Project Teams, Anuradha Sutharshan and s Maj

Analysis of Data Remaining on Second Hand ADSL Routers, Patryk Szewczyk

Link

Usability of Internet Security Software: Have They Got it Right?, Patryk Szewczyk

Link

A 2011 investigation into remnant data on second hand memory cards sold in Australia, Patryk Szewczyk and Krishnun Sansurooah

Link

Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia, Craig Valli, Andrew Woodward, and P Hannay

PDF

A low cost adaptive graphical user interface for the visually handicapped with multiple conditions, David Veal and Stanislaw Maj

Link

Information leakage through second hand USB flash drives within the United Kingdom, Chaerani Widya, Nathan Clarke, and Christopher Bolan

Link

Why Australia's e-health system will be a vulnerable national asset, Patricia A. Williams

Link

Help or hindrance: The practicality of applying security standards in healthcare, Patricia A H Williams

Is the Biggest Threat to Medical Information Simply a Lack of Understanding?, Patricia A.H. Williams

Link

Studies on Pareto-based multi-objective Competitive Coevolutionary Dynamics, F Zeng, J Decraene, M Low, W Cai, and Philip Hingston

Link

R-tfidf, A variety of tf-idf Term Weighting Strategy in Document Categorization, Dengya Zhu and Jitian Xiao

Submissions from 2010

A study of audience responses to the media discourse about the 'Other': The Fear of Terrorism between Australian Muslims and the Broader Community , Anne Aly

Fear, victimisation and identity: The community victimisation perspective and social inclusion of Australian Muslims, Anne Aly

Information Operations Matters: Best practices, Leigh Armistead

An eAgriculture-based Decision Support Framework for Information Dissemination, Leisa Armstrong, Dean Diepeveen, and Khumphicha Tantisantisom

Using Traffic Analysis to Identify Tor Usage - A Proposed Study, John Barker, Peter Hannay, and Christopher Bolan

PDF

The significance of learning style with respect to achievement in first year programming students., Vivian Campbell and Michael Johnstone

An implementation of a garment-fitting simulation system using laser scanned 3D body data., Changsuk Cho, Jun-Young Park, Adrian Boeing, and Philip Hingston

Hardware Implementation of the Self Assessment Manikin, Warren Creemers and Philip Hingston

The 2010 IDN Homograph Attack Mitigation Survey, Peter Hannay and Christopher Bolan

PDF

A New Design for a Turing Test for Bots, Philip Hingston

PDF

Evolving Group Strategies for IPD, Philip Hingston

PDF

RedTNet: A Network Model for Strategy Games., Philip Hingston, Mike Preuss, and Daniel Spierling

PDF

A Distributed and Cooperative User Authentication Framework, C.G. Hocking, Steven Furnell, Nathan Clarke, and P L Reynolds

PDF

Analysis of Hu's Moment Invariants on Image Scaling and Rotation, Zhihu Huang and Jinsong Leng

PDF

An Online Ballistics Imaging System for Firearm Identification, Zhihu Huang and Jinsong Leng

PDF

A Novel Binarization Algorithm for Ballistics Imaging Systems, Zhihu Huang and Jinsong Leng

New technologies: dissonance, influence and radical behaviours, William E. Hutchinson

Influence Operations and Behavioural Change, William Hutchinson and Matthew Warren

Assessing image-based authentication techniques in a web-based environment., M Z. Jali, Steven M. Furnell, and P S. Dowland

PDF

How do you make information security user friendly?, Andrew Jones

PDF

Digital forensics and the issues of identity., Andrew Jones and Thomas Martin

PDF

Patterns Relevant to the Temporal Data-Context of an Alarm of Interest, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li

Computational Intelligence for Functional Testing, Chiou Peng Lam

Adaptive T-S type Rough-Fuzzy Inference Systems (ARFIS) for Mobile Robot Navigation, Chang Su Lee

PDF

A Novel Subspace Outlier Detection Approach in High Dimensional Data Sets, Jinsong Leng

Mining Outliers in Correlated Subspaces for High Dimensional Data Sets, Jinsong Leng and Tzung-Pei Hong

Analyzing Texture Features of Ballistic Projectile Images for Firearm Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li

Optical Imaging and Analysis of Firing-pin Marks for Ballistics Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li

PDF

A Wrapper-Based Feature Selection for Analysis of Large Data Sets, Jinsong Leng, Craig Valli, and Leisa Armstrong