Follow

Submissions from 2013

Link

Cloud forensics: a research perspective, Sameera Almulla, Youssef Iraqi, and Andrew Jones

Link

Breaking the theft-chain-cycle: Property marking as a defensive tool , William J. Bailey and David J. Brooks

Link

Intention-oriented programming support for runtime adaptive autonomic cloud-based applications, Thar Baker, Michael Mackay, Martin Randles, and Azzelarare Taleb-Bendiab

Link

Twitter influence and cumulative perceptions of extremist support: A case study of Geert Wilders, Gabrielle Blanquart and David M. Cook

PDF

E-learning with docugames: AE2 Commander, Mark P. Brogan and Martin Masek

Link

Developing a mobile audiometric sound booth application for Apple IOS devices, Luke J. Brook and Patricia A. Williams

Link

Artificial and computational intelligence for games on mobile platforms, Clare Bates Congdon, Philip F. Hingston, and Graham Kendall

The contemporary Australian intelligence domain, Jeffrey Corkill and Alan Davies

PDF

Security, control and deviance: Mapping the security domain and why it matters, Jeffrey D. Corkill and Michael P. Coole

Link

Search in real-time video games, Peter I. Cowling, Michael Buro, Michal Bida, Adi Botea, Bruno Bouzy, Martin V. Butz, Philip Hingston, Hector Munoz-Avila, Dana Nau, and Moshe Sipper

Link

The effectiveness of internet activity erasure tools to protect privacy, Brian Cusack, Andrew Woodward, Scott Butson, and Benjamin Leber

Link

Activities of daily living classification using depth features, Laurence J. Da Luz, Martin Masek, and Chiou Peng P. Lam

Link

NSC-NSGA2: Optimal search for finding multiple thresholds for nearest shrunken centroid, Vinh Q. Dang and Chiou-Peng Lam

Link

NSC-GA: Search for optimal shrinkage thresholds for nearest shrunken centroid, Vinh Q. Dang, Chiou-Peng P. Lam, and Chang Su Lee

Link

The contemporary Australian intelligence domain: A multi dimension examination, Alan Davies and Jeffrey Corkill

Link

Is emergency management considered a component of business continuity management?, Kenny Frohde and David J. Brooks

Link

iTRAQ-based quantitative proteomic analysis reveals new metabolic pathways of wheat seedling growth under hydrogen peroxide stress, Pei Ge, Pengchao Hao, Min Cao, Guangfang Guo, Dongwen Lv, Saminathan Subburaj, Xiaohui Li, Xing Yan, Jitian Xiao, Wujun Ma, and Yueming Yan

Link

Geo Forensics: Classes of locational data sources for embedded devices, Peter Hannay

Link

Exchanging demands: Weaknesses in SSL implementations for mobile platforms, Peter Hannay, Clinton R. Carpene, Craig Valli, Andrew J. Woodward, and Michael N. Johnstone

Link

A study on information induced medication errors, Rebecca J. Hermon and Patricia A. Williams

PDF

Mobile games with intelligence: a killer application?, Philip Hingston, Clare Bates Congdon, and Graham Kendall

PDF

Information Behavior and Japanese Students: How Can an Understanding of the Research Process Lead to Better Information Literacy?, Yusuke Ishimura

Link

Security aspects of military sensor-based defence systems, Michael N. Johnstone and Robert Thompson

Link

Automated detection of vehicles with machine learning, Michael N. Johnstone and Andrew J. Woodward

Link

Intention-oriented modelling support for GORE in elastic cloud applications, Yasir Karam, Thar Baker, and Azzelarare Taleb-Bendiab

Link

Oblivious clouds: towards self-conscious cloud based application development, Yasir Karam, Thar Baker, and Azzelarare Taleb-Bendiab

Link

Support for intention driven cloud government entitlement services, Yasir Karam, Thar Baker, and Azzelarare Taleb-Bendiab

Link

Support for self-optimized organizational patterns in socio-driven elastic clouds, Yasir Karam, Thar Baker, and Azzelarare Taleb-Bendiab

Link

Physical security barrier selection: A decision support analysis, Agnieszka Kiszelewska and Michael Coole

Link

WAMbot: Simulation and modelling of a team of autonomous mobile robots, Martin Masek, Frank Ophelders, Sushil Pangeni, Adrian Boeing, and Thomas Braunl

Link

Improving assessment of groundwater-resource sustainability with deterministic modelling: A case study of the semi-arid Musi sub-basin, South India [Amélioration de l'évaluation de la pérennité de la ressource en eau souterraine à l'aide d'une modélisation déterministe: Cas du sous-bassin semi aride Musi, Inde du Sud], S Massuel, B A. George, J P. Venot, L Bharati, and S Acharya

Link

An exploratory study of the lived experience of being an intelligence analyst, Sharon Moss, Jeffrey Corkill, and Eyal Gringart

Link

Towards detection and control of civilian unmanned aerial vehicles, Matthew Peacock and Michael N. Johnstone

PDF

Testing a distributed denial of service defence mechanism using red teaming, Samaneh Rastegari, Philip Hingston, Chiou-Peng Lam, and Murray Brand

Link

Current and emerging technologies employed to abate crime and to promote security, Rick Sarre, David J. Brooks, Clifton L. Smith, and Rick Draper

PDF

Technology Corner: Visualising forensic data: Evidence guidelines (Part 2), Damian Schofield and Ken Fowle

PDF

Technology corner: Visualising forensic data: Evidence (Part 1), Damian Schofield and Ken Fowle

Link

Cartoons for e-health informatics, Moira G. Sim, Eric L. Khong, Ashleigh C. Mcevoy, Toni Wain, Mick Sim, and Patricia A. Williams

Link

Connectivity check for modular self reconfigurable robots, Rajesh Subramanian, Martin Masek, and Chang Su Lee

Link

Usability and security support offered through ADSL router user manuals, Patryk S. Szewczyk

Link

Sellers continue to give away confidential information on second hand memory cards sold in Australia, Patryk S. Szewczyk, Nikki Robins, and Krishnun Sansurooah

Link

Benchmarking web accessibility evaluation tools: Measuring the harm of sole reliance on automated tests, Markel Vigo, Justin A. Brown, and Vivienne L. Conway

Link

The influence and deception of Twitter: the authenticity of the narrative and slacktivism in the Australian electoral process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille Abdul Rahman, and David M. Cook

PDF

Usefulness of infeasible solutions in evolutionary search: an empirical and mathematical study, Lyndon While and Philip Hingston

Link

Creating context: Making sense of geo-location and social media data for health, Patricia A. Williams

Link

Information security governance: A risk assessment approach to health information systems protection, Patricia A. Williams

Link

It will never happen to us: The likelihood and impact of privacy breaches on health data in Australia, Patricia A. Williams and Emma Hossack

Link

A rapidly moving target: Conformance with e-health standards for mobile computing, Patricia A. Williams and Vincent McCauley

Submissions from 2012

Link

Scholarly use of E-books in a virtual academic environment: A Case Study, Pervaiz Ahmad and Mark Brogan

Link

An Investigation into the Wi-Fi protected setup pin of the Linksys WRT160N v2, Symon Aked, Christopher Bolan, and Murray Brand

PDF

A Proposed Method for Examining Wireless Device Vulnerability to Brute Force Attacks via WPS External Registrar PIN Authentication Design Vulnerability, Symon Aked, Christopher Bolan, and Murray Brand

PDF

Factors influencing the use of information and communication technology (ICT) tools by the rural famers in Ratnagiri District of Maharashtra, India. , Leisa Armstrong and N. Gandhi

Link

Use of Information and Communication Technology (ICT) tools by rural farmers in Ratnagiri District of Maharastra, India. , Leisa Armstrong, Niketa Gandhi, and K Lanjekar

PDF

A Technical Guide to Designing and Implementing Effective Web Surveys, Gregory Baatard

PDF

A Technical Guide to Effective and Accessible Web Surveys, Gregory Baatard

Link

Creating a counter insurgency program: Elements required based upon a comparative analysis of research findings, William Bailey

Link

Proactive Security Protection of Critical Infrastructure: A Process Driven Methodology, William Bailey and Robert Doleman

PDF

Using Monte Carlo Tree Search for Replanning in a Multistage Simultaneous Game, Daniel Beard, Philip Hingston, and Martin Masek

Link

WAMbot: Team MAGICian's entry to the Multi Autonomous Ground-robotic International Challenge 2010, Adrian Boeing, Mark Boulton, Thomas Braunl, Brian Frisch, Sam Lopes, Aidan Morgan, Frank Ophelders, Sushil Pangeni, Robert Reid, Kevin Vinsen, Nicolas Garel, Chang Su Lee, Martin Masek, Anthony Attwood, Michael Fazio, and Adam Gandossi

Link

Real-Time Tactical Motion Planning and Obstacle Avoidance for Multi-Robot Cooperative Reconnaissance, Adrian Boeing, Sushil Pangeni, Thomas Braunl, and Chang Su Lee

Link

A proposed formula for comparing kill password effectiveness in single password RFID systems, Christopher Bolan

PDF

Utilizing the RFID LOCK Command Against Multiple Targets, Christopher Bolan

Link

In the shadow of the cloud - technology in the RIM workspace: RIMPA 2010 Technology Survey - Part 2, Mark Brogan and David Roberts

PDF

Corporate Security: Using knowledge construction to define a practising body of knowledge, David Brooks

PDF

Security threats and risks of Intelligent Building Systems: Protecting facilities from current and emerging vulnerabilities, David Brooks

PDF

Online Course Content Auditing: Templates and Practices, Justin Brown and Gregory Baatard

PDF

Web Accessibility in Corporate Australia: Perceptions versus Reality, Justin Brown and Vivienne Conway

PDF

Shall we play a game?, Craig William Caulfield, Stanislaw Maj, J C Xia, and David Veal

Link

An improved APIT location algorithm for wireless sensor networks, WenHua Cheng, Jia Li, and Huaizhong Li

Link

Website Accessibility: a Comparative Analysis of Australian National and State/Territory Library Websites, Vivienne Conway, Justin Brown, Scott Hollier, and Cam Nicholl

PDF

User Reaction Towards End User License Agreements on Android Smartphones, Hamish Cotton and Christopher Bolan

Link

Corporate Security in the Asia Pacific Region: Crisis, Crime, Fraud and Misconduct, Christopher Cubbage and David Brooks

PDF

Science or Experience; what is more relevant ?, Kenneth Fowle and Hadyn Green

Link

Informing security through Cultural Cognition: The influence of cultural bias on operational security, Melvyn Griffiths and David Brooks

PDF

The 2011 IDN Homograph Attack Mitigation Survey, Peter Hannay and Gregory Baatard

PDF

A Multimodal Problem for Competitive Coevolution, Philip Hingston, Tirtha Ranjeet, Chiou Peng Lam, and Martin Masek

PDF

Using Contextual Constructs Model to frame Doctoral Research Methodology, Shirlee-ann Knight and Donna Cross

Link

On analysis of circle moments and texture features for cartridge images recognition, Jinsong Leng and Zhihu Huang

PDF

Assessment of Climate Change Effect on Water Harvesting Structures in Rainfed Regions: Geospatial Data Mining Approach, Sreedhar Nallan and Leisa Armstrong

PDF

Exploration games played on a DDR Pad can constitute beneficial physical exercise, Kimthy Nguyen, Bohan Li, Martin Masek, and Yuwanuch Gulatee

Link

A case study of internet banking security of mainland Chinese banks: A customer perspective, Panida Subsorn and Sunsern Limwiriyakul

Link

An Investigation into the effect of stochastic annual rainfall on crop yields in South Western Australia, Yunous Vagh

Link

The application of a visual data mining framework to determine soil, climate and land-use relationships, Yunous Vagh

PDF

A Data Mining Perspective of the Dual Effect of Rainfall and Temperature on Wheat Yield, Yunous Vagh and Jitian Xiao

Link

Mining temperature profile data for shire-level crop yield prediction, Yunous Vagh and Jitian Xiao

Link

The Development of a National Approach to CDA: Successes, Challenges and Lessons Learned from Australia, Patricia Williams, Sarah Gaunt, Grahame Grieve, Vincent McCauley, and Hugh Leslie

Link

Sound Foundations: Leveraging International Standards for Australia's National Ehealth System , Patricia Williams and Vincent McCauley

PDF

Noise Tolerance for Real-time Evolutionary Learning of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, and Lyndon While

PDF

Real-Ttme Evolutionary Learning of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, and Lyndon While

Link

An efficient web document clustering algorithm for building dynamic similarity profile in similarity-aware web caching , Jitian Xiao

PDF

Scd1 plays a tumor-suppressive role in survival of leukemia stem cells and the development of chronic myeloid leukemia, H Zhang, H Li, N Ho, Dongguang Li, and Shaoguang Li

Submissions from 2011

Link

An investigation into darknets and the content available via anonymous peer-to-peer file sharing, Symon Aked

Link

Guidelines for the digital forensic processing of Smartphones, Khawla Abdulla Alghafli, Andrew Jones, and Thomas Martin

Link

Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk, Kim Andersson and Patryk Szewczyk

Link

A risk index model for security incident prioritisation , Nor Badrul Anuar, Steven Furnell, Maria Papadakil, and Nathan Clarke

Link

Effective ICTsin Agricultural Value Chains to Improve Food Security: An International Perspective , Leisa Armstrong, Dean Diepeveen, and Niketa Gandhi

Link

Case studies: A security science research methodology, Bill Bailey

Link

Using traffic analysis to identify The Second Generation Onion Router, John Barker, Peter Hannay, and Patryk Szewczyk

Link

Seeing the full picture: The case for extending security ceremony analysis, Giampaolo Bella and Lizzie Coles-Kemp

Link

Cooperative Multi-robot Navigation and Mapping of Unknown Terrain, Adrian Boeing, Thomas Braunl, Robert Reid, Aidan Morgan, and Kevin Vinsen