Submissions from 2010

An eAgriculture-based Decision Support Framework for Information Dissemination, Leisa Armstrong, Dean Diepeveen, and Khumphicha Tantisantisom

Using Traffic Analysis to Identify Tor Usage - A Proposed Study, John Barker, Peter Hannay, and Christopher Bolan


National security: A propositional study to develop resilience indicators as an aid to personnel vetting, David Brooks, Jeff Corkill, Julie-Ann Pooley, Lynne Cohen, Cath Ferguson, and Craig Harms


The significance of learning style with respect to achievement in first year programming students., Vivian Campbell and Michael Johnstone

An implementation of a garment-fitting simulation system using laser scanned 3D body data., Changsuk Cho, Jun-Young Park, Adrian Boeing, and Philip Hingston

Hardware Implementation of the Self Assessment Manikin, Warren Creemers and Philip Hingston

The 2010 IDN Homograph Attack Mitigation Survey, Peter Hannay and Christopher Bolan


A New Design for a Turing Test for Bots, Philip Hingston


Evolving Group Strategies for IPD, Philip Hingston


RedTNet: A Network Model for Strategy Games., Philip Hingston, Mike Preuss, and Daniel Spierling


A Distributed and Cooperative User Authentication Framework, C.G. Hocking, Steven Furnell, Nathan Clarke, and P L Reynolds


Analysis of Hu's Moment Invariants on Image Scaling and Rotation, Zhihu Huang and Jinsong Leng


An Online Ballistics Imaging System for Firearm Identification, Zhihu Huang and Jinsong Leng


A Novel Binarization Algorithm for Ballistics Imaging Systems, Zhihu Huang and Jinsong Leng

New technologies: dissonance, influence and radical behaviours, William E. Hutchinson

Influence Operations and Behavioural Change, William Hutchinson and Matthew Warren

Assessing image-based authentication techniques in a web-based environment., M Z. Jali, Steven M. Furnell, and P S. Dowland


How do you make information security user friendly?, Andrew Jones


Digital forensics and the issues of identity., Andrew Jones and Thomas Martin


Patterns Relevant to the Temporal Data-Context of an Alarm of Interest, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li

Computational Intelligence for Functional Testing, Chiou Peng Lam

Adaptive T-S type Rough-Fuzzy Inference Systems (ARFIS) for Mobile Robot Navigation, Chang Su Lee


A Novel Subspace Outlier Detection Approach in High Dimensional Data Sets, Jinsong Leng

Mining Outliers in Correlated Subspaces for High Dimensional Data Sets, Jinsong Leng and Tzung-Pei Hong

Analyzing Texture Features of Ballistic Projectile Images for Firearm Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li

Optical Imaging and Analysis of Firing-pin Marks for Ballistics Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li


A Wrapper-Based Feature Selection for Analysis of Large Data Sets, Jinsong Leng, Craig Valli, and Leisa Armstrong


Android Forensics: Simplifying Cell Phone Examinations., Jeff Lessard and Gary Kessler


Behaviour Profiling on Mobile Devices., Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Cross-Cultural Education: Learning Methodology and Behaviour Analysis for Asian Students in IT Field of Australian Universities, Jie Lu, Kum Chin, Juan Yao, Jun Xu, and Jitian Xiao

State Model Diagrams - A Universal, Model Driven Method for Network System Configuration and Management, Stanislaw Maj

An Evaluation of Firewall Configuration Methods, Stanislaw Maj, Woratat Makasiranondh, and David Veal

State Model Diagrams - A Universal Runtime Network Management Tool, Stanislaw Maj, Woratat Makasiranondh, and David Veal

An Evaluation of State Model Diagrams for Secure Network Configuration and Management, Stanislaw Maj and David Veal

Evaluating Layer 3 Device Tunnelling and Access Control List Security Bandwidths Using B-node Theory, Stanislaw Maj and David Veal

Parsimony Analysis - A Novel Method of Structured Knowledge Representation for Teaching Computer Science, Stanislaw Maj and David Veal

Using State Model Diagrams to Manage Secure Layer 2 Switches, Stanislaw Maj and David Veal

A Preliminary Evaluation of the new Cisco Network Security Course, Stanislaw Maj, David Veal, and Lotfi Yassa

An integrated multimedia based platform for teaching network security, Woratat Makasiranondh, Stanislaw Maj, and David Veal

Factors affecting the sustainability of Computer Information Systems: Embedding new technology into a hospital environment., Donald Mcdermid, Linda Kristjanson, and Nigel Spry

An Information Security Governance Encounter for Australian Primary Care Health Providers., Donald Mcdermid, Rachel Mahncke, and Patricia Williams

The Growing Need for On-Scene Triage of Mobile Devices., Richard P. Mislan, Eoghan Casey, and Gary C. Kessler

Breaches in Medical Information Security: The Problem of Reporting, Neha Patel and Patricia Williams


Interrogation of Water Catchment Data Sets Using Data Mining Techniques, Ajdin Sehovic, Leisa Armstrong, and Dean Diepeveen


Testing an Exergame for Effectiveness and Attractiveness., Jeffrey Ronald Sinclair, Philip Hingston, Martin Masek, and Kazunori Nosaka

An Evaluation of Agile Software Methodology Techniques, Anuradha Sutharshan and Stanislaw Maj


The ADSL Router Forensics Process, Patryk Szewczyk


Ignorant Experts: Computer and Network Security Support From Internet Service Providers, Patryk Szewczyk and Craig Valli


An Analysis of Information Security Awareness within Home and Work Environments, Shuhaili Talib, Nathan Clarke, and Steven Furnell


Application of a Data Mining Framework for the Identification of Agricultural Production Areas in WA , Yunous Vagh, Leisa Armstrong, and Dean Diepeveen

Developing VoIP Router honeypots, Craig Valli and Mohammed Al Lawati

Geotagging Where Cyberspace Comes to Your Place, Craig Valli and Peter Hannay

A Graphical User Interface for the Visually Impaired - an Evaluation, David Veal and Stanislaw Maj

An ill-defined problem : effective biomedical informatics curriculum?, Patricia Williams

Improving Medical Information Security using Contextualization Models, Patricia Williams

Medical Information Security: Is it all too hard? , Patricia Williams

Construction of Similarity Profile of Dynamic Web Documents for Similarity-aware Web Content Management, Jitian Xiao

Cross-cultural Learning Challenges and Teaching Strategies for First-year Asian Students in Australian Universities., Jitian Xiao, Jie Lu, Kum Chin, Jun Xu, and Juan Yao


Autonomous Bee Colony Optimization for Multi-objective Function, F Zeng, James Decraene, Malcolm Low, Philip Hingston, C Wentong, Z Suiping, and M Chandramohan

Submissions from 2009

An Intervention to Increase Positive Attitudes and Address Misconceptions About Australian Muslims: A Call for Education and Open Mindedness , Anne Aly

Media hegemony, activism and identity: Muslim women re-presenting Muslim women., Anne Aly

The historical roots of Al Qaeda's ideology: understanding Ayman al Zawahri's vision and developing an appropriate response., Anne Aly

The Terrorists' Audience: A Model of Internet Radicalisation, Anne Aly

An evaluation of Methodologies for eAgriculture in an Australian Context, Leisa J. Armstrong and Dean A. Diepeveen

An Information-Based Decision Support Framework for eAgriculture, Leisa J. Armstrong and Dean A. Diepeveen

Risk Culture Influences in Internet Safety and Security, S Atkinson, Steven Furnell, and A.D. Phippen

Securing the next generation: enhancing e-safety awareness among young people, Shirley Atkinson, Steven Furnell, and Andy Phippen

Consensual Security Risk Assessment: Overcoming Bias, Conflicting Interests and Parochialism, Benjamin Beard and David Brooks

Safeguarding Australia from Cyber-terrorism: A proposed cyber-terrorism SCADA Risk Framework for Industry Adoption, Christopher Beggs and Matthew Warren

A Spoofing Attack Against an EPC Class One RFID System, Christopher Bolan

Freegate: A Defence against the Pending Censorship of Australia?, Christopher Bolan and Peter Hannay

From desktop to mobile: Examining the security experience, Reinhardt A. Botha, Steven Furnell, and Nathan Clarke

Clipping Mercury's Wings: The Challenge of Email Archiving, Mark Brogan

RMAA Technology Survey 2008: From mainstream to bleeding edge- technology in the RIM workspace., Mark Brogan and David Roberts

Defeating biometric fingerprint systems: An applied testing methodology, David Brooks

Intruder Alarm Systems: Is the Security Industry Installing and Maintaining Alarm Systems in Compliance to Australian Standard AS2201?, David Brooks

Key concepts in security risk management: A psychometric concept map to approach to understanding, David Brooks

What is security: Definition through knowledge categorisation, David Brooks

The Alox5 gene is a novel therapeutic target in cancer stem cells of chronic myeloid leukemia, Yaoyu Chen, Dongguang Li, and Shaoguang Li

Cross-cultural learning and teaching in Australian universities, Kum Leng Chin, Jie Lu, Jun Xu, Jitian Xiao, and Juan Yao


Digital natives or digital refugees? Why we have failed Gen Y?, Barbara Combes

Generation Y: Are they really digital natives or more like digital refugees?, Barbara Combes

Security Decay: An Entropic Approach to Definition and Understanding, M COOLE and David Brooks

Intelligence Support to Law Enforcement: Untangling the Gordian Knot, Jeffrey Corkill

Professional Intelligence Judgement Artistry: Some early observations, Jeffrey Corkill

The function of security in reducing women's fear of crime in open public spaces: A case study of serial sex attacks at a western australian university, Christopher J. Cubbage and Clifton Smith

Applying Data Mining Techniques in the Selection of Plant Traits, Dean A. Diepeveen and Leisa J. Armstrong

Selecting Areas for Land Use Change in a Catchment, Neil Dunstan, Leisa J. Armstrong, and Dean A. A. Diepeveen


A Max-Min Multiobjective Technique to Optimize Model Based Test Suite, Usman Farooq and Chiou P. Lam


Evolving the Quality of a Model-Based Test Suite, Usman Farooq and Chiou P. Lam

Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives, Michael Freeman and Andrew Woodward

SmartPot - Creating a 1st Generation Smartphone Honeypot, Michael Freeman and Andrew Woodward

Mobile Security: A Pocket Guide, Steven Furnell

Scare Tactics - A viable weapon in the security war?, Steven Furnell, Maria Papadaki, and Kerry-Lynn Thomson

From culture to disobedience: Recognising the varying user acceptance of IT security, Steven Furnell and Kerry-Lynn Thomson

Recognising and addressing 'security fatigue', Steven Furnell and Kerry-Lynn Thomson

Wireless device identification for forensic purposes, Lukasz Andrzej Golygowski and Andrew Woodward

Fun & Games: an Introduction to Console Forensics, Peter Hannay

Satellite Navigation Forensics Techniques, Peter Hannay

An Assessment of Internationalised Domain Name Homograph Attack Mitigation Implementations, Peter Hannay and Christopher Bolan