Follow

Submissions from 2011

Link

Case studies: A security science research methodology, Bill Bailey

Link

Using traffic analysis to identify The Second Generation Onion Router, John Barker, Peter Hannay, and Patryk Szewczyk

Link

Seeing the full picture: The case for extending security ceremony analysis, Giampaolo Bella and Lizzie Coles-Kemp

Link

Cooperative Multi-robot Navigation and Mapping of Unknown Terrain, Adrian Boeing, Thomas Braunl, Robert Reid, Aidan Morgan, and Kevin Vinsen

Link

A proposal for utilising active jamming for the defence of RFID systems against attack, Christopher Bolan

Organisational Resilience: Understanding and identifying the essential concepts, Bruce Braes and David Brooks

Link

Forensic Recovery and Analysis of the Artefacts of Crimeware Toolkits, Murray Brand

Link

A Threat to Cyber Resilience : A Malware Rebirthing Botnet, Murray Brand, Craig Valli, and Andrew Woodward

Link

AE2 Commander: Simulation and serious games in the online cultural heritage space, Mark Brogan and Martin Masek

Link

In the shadow of the cloud - technology in the RIM workspace, Mark Brogan and David Roberts

PDF

Security risk management: A psychometric map of expert knowledge structure, David Brooks

Link

Security risk management in the Asia Pacific region: What are security professional using?, David Brooks and Hamish Cotton

Link

Intelligent buildings: An investigation into current and emerging security vulnerabilities in automated building systems using an applied defeat methodology, David J. Brooks

Link

Organisational security: From expert knowledge construct to a body of knowledge, David J. Brooks

Link

Recent developments in privacy and healthcare: Different paths for RFID in Europe and North America?, Joseph Cannataci

PDF

Teaching software engineering project management-A novel approach for software engineering programs, Craig Caulfield, David Veal, and Stanislaw Maj

Link

Looking at Clouds from Both Sides: The Advantages and Disadvantages of Placing Personal Narratives in the Cloud, Lizzie Coles-Kemp, Joseph Reddington, and Patricia H. Williams

Link

Student voices: Re-conceptualising and re-positioning Australian library and information science education for the twenty-first century, Barbara Combes, Jo Hanisch, Mary Carroll, and Hilary Hughes

PDF

Website Accessibility in Western Australian Public Libraries, Vivienne Conway

E-governance of the Forest: Management by Multivalence, David Cook

Link

Finance, Fear and Family: Issues of Trust and the Common Ground with Terrorist Funding, David Cook and Timothy Smith

Link

The Battle for Money Transfers: The allure of PayPal and Western Union over Familial remittance networks, David Cook and Timothy Smith

Link

Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users, David Cook, Patryk Szewczyk, and Krishnun Sansurooah

Link

Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens, David Cook, Patryk Szewczyk, and Krishnun Sansurooah

Link

Mapping the organizational relations within physical security's body of knowledge: a management heuristic of sound theory and best practice, Michael Coole and David Brooks

Not art, not science, but artistry: Why Professional Artistry should matter to the intelligence community, Jeffrey D. Corkill

Link

User perceptions of end user license agreements in the smartphone environment, Hamish Cotton and Christopher Bolan

Link

Incorporating Genetic Algorithm into Rough Feature Selection for High Dimensional Biomedical Data, Vinh Q. Dang, Chio- Peng Lam, and Chang Su Lee

Link

A strategy to articulate the facility management knowledge categories within the built environment, Robert Doleman and David Brooks

Systemic failures of fire protection equipment in Australian aged care nursing facilities, Robert Doleman and David Brooks

Link

Is there a core set of skills for visual analysis across different imaging technologies?, Craig H.M. Donald

Link

Individualised responses to vigilance demands and their management, Fiona M. Donald and Craig H.M. Donald

PDF

High-dimensional Objective-based Data Farming, Zeng Fanchao, James Decraene, Malcolm Low, Wentong Cai, Suiping Zhou, and Philip F. Hingston

Link

Visualising Forensic Data: Investigation to Court, Kenneth Fowle and Damian Schofield

PDF

Estimation of CBR Value Using Dynamic Cone Penetrometer, K S. Gill, A K. Choudhary, and S K. Shukla

Link

Kindle Forensics: Acquisition and Analysis, Peter Hannay

Link

GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering, Peter Hannay and Gregory Baatard

Link

Red teaming with coevolution, Philip Hingston and Mike Preuss

Link

A preliminary investigation of distributed and cooperative user authentication, C Hocking, Steven Furnell, Nathan Clarke, and P Reynolds

Link

Authentication Aura - A Distributed Approach to User Authentication, C. G. Hocking, Steven Furnell, Nathan Clarke, and P. L. Reynolds

PDF

A new seal verification for Chinese color seal, Zhihu Huang and Jinsong Leng

Link

A longitudinal study of Wi-Fi access point security in the Perth central business district, Emil Jacobson and Andrew Woodward

Link

Are existing security models suitable for teleworking, Peter James

Link

Modelling misuse cases as a means of capturing security requirements, Michael N. Johnstone

Link

Security aspects of sensor-based defence systems, Michael N. Johnstone

Link

Penetration of Zigbee-based wireless sensor networks, Michael N. Johnstone and Jeremy A. Jarvis

Link

Information evaluation: How one group of intelligence analysts go about the task, John Joseph and Jeff Corkill

Link

Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework, Mahmoud Khonji, Y Iraqi, and Andrew Jones

Link

Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

Lexical URL analysis for discriminating phishing and legitimate websites, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

A study of feature subset evaluators and feature subset searching methods for phishing classification, Mahmoud Khonji, Andrew Jones, and Youssef Iraqi

Link

Considering Complexity Theory in Understanding Information Management in Health Systems, Shirlee-ann Knight

Link

Information Management in Health Systems: Considering an Organic Approach, Shirlee-ann Knight

PDF

The Combined Conceptual Life Cycle Model of Information Quality in User Perceptions of IQ On The Web, Shirlee-ann Knight

Link

The combined conceptual life-cycle model of information quality: Part 1, an investigative framework, Shirlee-ann Knight

PDF

A Preliminary Introduction to the OTAM: Exploring Users’ Perceptions of their on-going Interaction with Adopted Technologies, Shirlee-ann Knight and Janice M. Burn

Link

Risk assessment for mobile devices, Thomas Ledermuller and Nathan L. Clarke

Link

A Rough-fuzzy Hybrid Approach on a Neuro-Fuzzy Classifier for High Dimensional Data, Chang Su Lee

Link

Feature Reduction using a GA-Rough Hybrid Approach on Bio-medical data, Chang Su Lee

Link

Rough-fuzzy Hybrid Approach for Identification of Bio-Markers and Classification on Alzheimer's Disease Data, ChangSu Lee, Chiou-Peng Lam, and Martin Masek

PDF

Reinforcement learning of competitive and cooperative skills in soccer agents, Jinsong Leng and Chee Lim

Link

Outliers Detection with Correlated Subspaces for High Dimensional Datasets, Jinsong T. Leng and Zhihu Huang

Link

An Exploration of 1st and 2nd Generation CPTED for End of Year School Leavers at Rottnest Island, John Letch, Ellice Mcglinn, Jonathan Bell, Emma Downing, and David Cook

PDF

Behaviour Profiling for Transparent Authentication for Mobile Devices, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

Misuse Detection for Mobile Devices Using Behaviour Profiling, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

Engineering design of strategies for winning iterated prisoner's dilemma competitions, Jiawei Li, Philip Hingston, and Graham Kendall

Link

Australian primary health care check: Who is accountable for information security?, Rachel J. Mahncke and Patricia A H Williams

Link

Student opinions on their development of non-technical skills in IT education, W Makasiranondh, S Maj, and D Veal

PDF

A pedagogical rich interactive on-line learning platform for Network Technology students in Thailand, Woratat Makasiranondh, Stanislaw Maj, and David Veal

An Overview of Browser Vulnerability Attacks, Countermeasures and Detection Tools, Masood Mansoori and Ray Hunt

Link

An Evaluation of Data Erasing Tools, Thomas Martin and Andrew Jones

PDF

Managing Multidisciplinary Student Design Teams, Martin Masek, Joo Jung, and Barnard Clarkson

Link

Trusted interoperability and the patient safety issues of parasitic health care software, Vincent B. McCauley and Patricia A H Williams

Link

Information Leakage through Online Social Networking Opening the Doorway for Advanced Persistence Threats, Nurul Nuha Abdul Molok, Atif Ahmad, and Shanton Chang

Link

Empowering protest through social media, Simon O'Rourke

Link

Spatial and Temporal Visualisation Techniques for Crash Analysis, Charlotte S. Plug, Jianhong Xia, and Craig Caulfield

Link

Can Current Packet Analysis Software Detect BitTORRENT Activity or Extract Files From BTP and uTP Traffic Streams?, William Pung and Andrew Woodward

Link

Critical infrastructure Protection: An Ethical Choice, Graeme Pye, Matthew Warren, and William Hutchinson

PDF

Effective Scheduling Algorithm for On-Demand XML Data Broadcasts in Wireless Environments, Yongrui Qin, Hua Wang, and Jitian Xiao

PDF

Analysis of Key Installation Protection using Computerized Red Teaming, Tirtha Ranjeet, Philip Hingston, Chiou Peng Lam, and Martin Masek

Link

The effects of diversity maintenance on coevolution for an intransitive numbers problem, Tirtha Ranjeet, Martin Masek, Philip Hingston, and Chiou Peng Lam

Link

Air Cargo Security, Norman Shanks

Link

Hold Baggage Screening, Norman Shanks

Link

Security Training, Narayanan Srinivasan

Link

Enhancing Agile Methods for Multicultural Software Project Teams, Anuradha Sutharshan and s Maj

Analysis of Data Remaining on Second Hand ADSL Routers, Patryk Szewczyk

Link

Usability of Internet Security Software: Have They Got it Right?, Patryk Szewczyk

Link

A 2011 investigation into remnant data on second hand memory cards sold in Australia, Patryk Szewczyk and Krishnun Sansurooah

Link

Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia, Craig Valli, Andrew Woodward, and P Hannay

PDF

A low cost adaptive graphical user interface for the visually handicapped with multiple conditions, David Veal and Stanislaw Maj

Link

Information leakage through second hand USB flash drives within the United Kingdom, Chaerani Widya, Nathan Clarke, and Christopher Bolan

Link

Why Australia's e-health system will be a vulnerable national asset, Patricia A. Williams

Link

Help or hindrance: The practicality of applying security standards in healthcare, Patricia A H Williams

Is the Biggest Threat to Medical Information Simply a Lack of Understanding?, Patricia A.H. Williams

Link

Studies on Pareto-based multi-objective Competitive Coevolutionary Dynamics, F Zeng, J Decraene, M Low, W Cai, and Philip Hingston

Link

R-tfidf, A variety of tf-idf Term Weighting Strategy in Document Categorization, Dengya Zhu and Jitian Xiao

Submissions from 2010

A study of audience responses to the media discourse about the 'Other': The Fear of Terrorism between Australian Muslims and the Broader Community , Anne Aly

Fear, victimisation and identity: The community victimisation perspective and social inclusion of Australian Muslims, Anne Aly

Information Operations Matters: Best practices, Leigh Armistead

An eAgriculture-based Decision Support Framework for Information Dissemination, Leisa Armstrong, Dean Diepeveen, and Khumphicha Tantisantisom