Follow

Submissions from 2013

PDF

Information Behavior and Japanese Students: How Can an Understanding of the Research Process Lead to Better Information Literacy?, Yusuke Ishimura

Submissions from 2012

Link

Scholarly use of E-books in a virtual academic environment: A Case Study, Pervaiz Ahmad and Mark Brogan

Link

An Investigation into the Wi-Fi protected setup pin of the Linksys WRT160N v2, Symon Aked, Christopher Bolan, and Murray Brand

PDF

A Proposed Method for Examining Wireless Device Vulnerability to Brute Force Attacks via WPS External Registrar PIN Authentication Design Vulnerability, Symon Aked, Christopher Bolan, and Murray Brand

PDF

Factors influencing the use of information and communication technology (ICT) tools by the rural famers in Ratnagiri District of Maharashtra, India. , Leisa Armstrong and N. Gandhi

Link

Use of Information and Communication Technology (ICT) tools by rural farmers in Ratnagiri District of Maharastra, India. , Leisa Armstrong, Niketa Gandhi, and K Lanjekar

PDF

A Technical Guide to Designing and Implementing Effective Web Surveys, Gregory Baatard

PDF

A Technical Guide to Effective and Accessible Web Surveys, Gregory Baatard

Link

Creating a counter insurgency program: Elements required based upon a comparative analysis of research findings, William Bailey

Link

Proactive Security Protection of Critical Infrastructure: A Process Driven Methodology, William Bailey and Robert Doleman

PDF

Using Monte Carlo Tree Search for Replanning in a Multistage Simultaneous Game, Daniel Beard, Philip Hingston, and Martin Masek

Link

WAMbot: Team MAGICian's entry to the Multi Autonomous Ground-robotic International Challenge 2010, Adrian Boeing, Mark Boulton, Thomas Braunl, Brian Frisch, Sam Lopes, Aidan Morgan, Frank Ophelders, Sushil Pangeni, Robert Reid, Kevin Vinsen, Nicolas Garel, Chang Su Lee, Martin Masek, Anthony Attwood, Michael Fazio, and Adam Gandossi

Link

Real-Time Tactical Motion Planning and Obstacle Avoidance for Multi-Robot Cooperative Reconnaissance, Adrian Boeing, Sushil Pangeni, Thomas Braunl, and Chang Su Lee

Link

A proposed formula for comparing kill password effectiveness in single password RFID systems, Christopher Bolan

PDF

Utilizing the RFID LOCK Command Against Multiple Targets, Christopher Bolan

Link

In the shadow of the cloud - technology in the RIM workspace: RIMPA 2010 Technology Survey - Part 2, Mark Brogan and David Roberts

PDF

Corporate Security: Using knowledge construction to define a practising body of knowledge, David Brooks

PDF

Security threats and risks of Intelligent Building Systems: Protecting facilities from current and emerging vulnerabilities, David Brooks

PDF

Online Course Content Auditing: Templates and Practices, Justin Brown and Gregory Baatard

PDF

Web Accessibility in Corporate Australia: Perceptions versus Reality, Justin Brown and Vivienne Conway

PDF

Shall we play a game?, Craig William Caulfield, Stanislaw Maj, J C Xia, and David Veal

Link

An improved APIT location algorithm for wireless sensor networks, WenHua Cheng, Jia Li, and Huaizhong Li

Link

Website Accessibility: a Comparative Analysis of Australian National and State/Territory Library Websites, Vivienne Conway, Justin Brown, Scott Hollier, and Cam Nicholl

PDF

User Reaction Towards End User License Agreements on Android Smartphones, Hamish Cotton and Christopher Bolan

Link

Corporate Security in the Asia Pacific Region: Crisis, Crime, Fraud and Misconduct, Christopher Cubbage and David Brooks

PDF

Science or Experience; what is more relevant ?, Kenneth Fowle and Hadyn Green

Link

Informing security through Cultural Cognition: The influence of cultural bias on operational security, Melvyn Griffiths and David Brooks

PDF

The 2011 IDN Homograph Attack Mitigation Survey, Peter Hannay and Gregory Baatard

PDF

A Multimodal Problem for Competitive Coevolution, Philip Hingston, Tirtha Ranjeet, Chiou Peng Lam, and Martin Masek

PDF

Using Contextual Constructs Model to frame Doctoral Research Methodology, Shirlee-ann Knight and Donna Cross

Link

On analysis of circle moments and texture features for cartridge images recognition, Jinsong Leng and Zhihu Huang

PDF

Assessment of Climate Change Effect on Water Harvesting Structures in Rainfed Regions: Geospatial Data Mining Approach, Sreedhar Nallan and Leisa Armstrong

PDF

Exploration games played on a DDR Pad can constitute beneficial physical exercise, Kimthy Nguyen, Bohan Li, Martin Masek, and Yuwanuch Gulatee

Link

A case study of internet banking security of mainland Chinese banks: A customer perspective, Panida Subsorn and Sunsern Limwiriyakul

Link

An Investigation into the effect of stochastic annual rainfall on crop yields in South Western Australia, Yunous Vagh

Link

The application of a visual data mining framework to determine soil, climate and land-use relationships, Yunous Vagh

PDF

A Data Mining Perspective of the Dual Effect of Rainfall and Temperature on Wheat Yield, Yunous Vagh and Jitian Xiao

Link

Mining temperature profile data for shire-level crop yield prediction, Yunous Vagh and Jitian Xiao

Link

The Development of a National Approach to CDA: Successes, Challenges and Lessons Learned from Australia, Patricia Williams, Sarah Gaunt, Grahame Grieve, Vincent McCauley, and Hugh Leslie

Link

Sound Foundations: Leveraging International Standards for Australia's National Ehealth System , Patricia Williams and Vincent McCauley

PDF

Noise Tolerance for Real-time Evolutionary Learning of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, and Lyndon While

PDF

Real-Ttme Evolutionary Learning of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, and Lyndon While

Link

An efficient web document clustering algorithm for building dynamic similarity profile in similarity-aware web caching , Jitian Xiao

PDF

Scd1 plays a tumor-suppressive role in survival of leukemia stem cells and the development of chronic myeloid leukemia, H Zhang, H Li, N Ho, Dongguang Li, and Shaoguang Li

Submissions from 2011

Link

An investigation into darknets and the content available via anonymous peer-to-peer file sharing, Symon Aked

Link

Guidelines for the digital forensic processing of Smartphones, Khawla Abdulla Alghafli, Andrew Jones, and Thomas Martin

Link

Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk, Kim Andersson and Patryk Szewczyk

Link

A risk index model for security incident prioritisation , Nor Badrul Anuar, Steven Furnell, Maria Papadakil, and Nathan Clarke

Link

Effective ICTsin Agricultural Value Chains to Improve Food Security: An International Perspective , Leisa Armstrong, Dean Diepeveen, and Niketa Gandhi

Link

Case studies: A security science research methodology, Bill Bailey

Link

Using traffic analysis to identify The Second Generation Onion Router, John Barker, Peter Hannay, and Patryk Szewczyk

Link

Seeing the full picture: The case for extending security ceremony analysis, Giampaolo Bella and Lizzie Coles-Kemp

Link

Cooperative Multi-robot Navigation and Mapping of Unknown Terrain, Adrian Boeing, Thomas Braunl, Robert Reid, Aidan Morgan, and Kevin Vinsen

Link

A proposal for utilising active jamming for the defence of RFID systems against attack, Christopher Bolan

Organisational Resilience: Understanding and identifying the essential concepts, Bruce Braes and David Brooks

Link

Forensic Recovery and Analysis of the Artefacts of Crimeware Toolkits, Murray Brand

Link

A Threat to Cyber Resilience : A Malware Rebirthing Botnet, Murray Brand, Craig Valli, and Andrew Woodward

Link

AE2 Commander: Simulation and serious games in the online cultural heritage space, Mark Brogan and Martin Masek

Link

In the shadow of the cloud - technology in the RIM workspace, Mark Brogan and David Roberts

PDF

Security risk management: A psychometric map of expert knowledge structure, David Brooks

Link

Security risk management in the Asia Pacific region: What are security professional using?, David Brooks and Hamish Cotton

Link

Intelligent buildings: An investigation into current and emerging security vulnerabilities in automated building systems using an applied defeat methodology, David J. Brooks

Link

Organisational security: From expert knowledge construct to a body of knowledge, David J. Brooks

Link

Recent developments in privacy and healthcare: Different paths for RFID in Europe and North America?, Joseph Cannataci

PDF

Teaching software engineering project management-A novel approach for software engineering programs, Craig Caulfield, David Veal, and Stanislaw Maj

Link

Looking at Clouds from Both Sides: The Advantages and Disadvantages of Placing Personal Narratives in the Cloud, Lizzie Coles-Kemp, Joseph Reddington, and Patricia H. Williams

Link

Student voices: Re-conceptualising and re-positioning Australian library and information science education for the twenty-first century, Barbara Combes, Jo Hanisch, Mary Carroll, and Hilary Hughes

PDF

Website Accessibility in Western Australian Public Libraries, Vivienne Conway

E-governance of the Forest: Management by Multivalence, David Cook

Link

Finance, Fear and Family: Issues of Trust and the Common Ground with Terrorist Funding, David Cook and Timothy Smith

Link

The Battle for Money Transfers: The allure of PayPal and Western Union over Familial remittance networks, David Cook and Timothy Smith

Link

Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users, David Cook, Patryk Szewczyk, and Krishnun Sansurooah

Link

Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens, David Cook, Patryk Szewczyk, and Krishnun Sansurooah

Link

Mapping the organizational relations within physical security's body of knowledge: a management heuristic of sound theory and best practice, Michael Coole and David Brooks

Not art, not science, but artistry: Why Professional Artistry should matter to the intelligence community, Jeffrey D. Corkill

Link

User perceptions of end user license agreements in the smartphone environment, Hamish Cotton and Christopher Bolan

Link

Incorporating Genetic Algorithm into Rough Feature Selection for High Dimensional Biomedical Data, Vinh Q. Dang, Chio- Peng Lam, and Chang Su Lee

Link

A strategy to articulate the facility management knowledge categories within the built environment, Robert Doleman and David Brooks

Systemic failures of fire protection equipment in Australian aged care nursing facilities, Robert Doleman and David Brooks

Link

Is there a core set of skills for visual analysis across different imaging technologies?, Craig H.M. Donald

Link

Individualised responses to vigilance demands and their management, Fiona M. Donald and Craig H.M. Donald

PDF

High-dimensional Objective-based Data Farming, Zeng Fanchao, James Decraene, Malcolm Low, Wentong Cai, Suiping Zhou, and Philip F. Hingston

Link

Visualising Forensic Data: Investigation to Court, Kenneth Fowle and Damian Schofield

PDF

Estimation of CBR Value Using Dynamic Cone Penetrometer, K S. Gill, A K. Choudhary, and S K. Shukla

Link

Kindle Forensics: Acquisition and Analysis, Peter Hannay

Link

GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering, Peter Hannay and Gregory Baatard

Link

Red teaming with coevolution, Philip Hingston and Mike Preuss

Link

A preliminary investigation of distributed and cooperative user authentication, C Hocking, Steven Furnell, Nathan Clarke, and P Reynolds

Link

Authentication Aura - A Distributed Approach to User Authentication, C. G. Hocking, Steven Furnell, Nathan Clarke, and P. L. Reynolds

PDF

A new seal verification for Chinese color seal, Zhihu Huang and Jinsong Leng

Link

A longitudinal study of Wi-Fi access point security in the Perth central business district, Emil Jacobson and Andrew Woodward

Link

Are existing security models suitable for teleworking, Peter James

Link

Modelling misuse cases as a means of capturing security requirements, Michael N. Johnstone

Link

Security aspects of sensor-based defence systems, Michael N. Johnstone

Link

Penetration of Zigbee-based wireless sensor networks, Michael N. Johnstone and Jeremy A. Jarvis

Link

Information evaluation: How one group of intelligence analysts go about the task, John Joseph and Jeff Corkill

Link

Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework, Mahmoud Khonji, Y Iraqi, and Andrew Jones

Link

Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

Lexical URL analysis for discriminating phishing and legitimate websites, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

A study of feature subset evaluators and feature subset searching methods for phishing classification, Mahmoud Khonji, Andrew Jones, and Youssef Iraqi