Follow

Submissions from 2009

Link

Comparison between electrically evoked and voluntary isometric contractions for biceps brachii muscle oxidative metabolism using near-infrared spectroscopy, Makii Mishan Muthalib, Marc Jubeau, Guillaume Y. Millet, Nicola A. Maffiuletti, and Kazunori Nosaka

PDF

Synchronous Asynchronicity: The Use of Mobiles to Pattern Face-to-Face Encounters in Chaotic Environments, Jason Raymond Noble and Lelia Rosalind Green

Link

Nano-Structured Magnetic Photonic Crystals for Magneto-Optic Polarization Controllers at the Communication-band Wavelengths, Mohammad Nur-E-Alam, Mikhail Vasiliev, and Kamal Alameh

Link

The 2009 Personal Firewall Robustness Evaluation, Ken Pydayya, Peter Hannay, and Patryk Szewczyk

Link

Using a Virtual Body to Aid in Exergaming System Development, Jeffrey Ronald Sinclair, Philip Hingston, Martin Masek, and Kazunori Nosaka

Link

Management practices and the valuing of sessional staff, Heather Sparrow

Link

Surviving and sustaining teaching excellence: A narrative of ‘entrapment’, Heather Sparrow

Link

A technology ecosystem perspective on hospital management information systems: Lessons from the health literature, Craig Standing and Christopher Bain

Link

The use and perception of e-marketplaces: An institutional perspective, Craig Standing, Ian Michael Sims, and Susan Standing

Link

The relationship between electronic marketplace strategy and structure, Susan Standing and Craig Standing

Link

Ambassadorial role playing as a competitive advantage in international hospitality: Pourquoi Pas?, Charlotte Tocanne and Alfred Ogle

PDF

RF magnetron sputtered (BiDy)3(FeGa)5O12:Bi2O3 composite garnet-oxide materials possessing record magneto-optic quality in the visible spectral region, Mikhail Vasiliev, Mohammad Alam, V.A. Kotov, Kamal Alameh, V.I. Belotelov, V.I. Burkov, and A.K. Zvezdin

Link

Higher education students’ perceptions of effective assessment, Julia Wren, Heather Sparrow, Jeremy Northcote, and Sue Sharp

Link

A new algorithm to improve mobile sensor node connectivity based on link quality indicator, Kartinah Zen, Daryoush Habibi, and Iftekhar Ahmad

Submissions from 2008

Link

iPhone forensics methodology and tools, Haitham Al-Hajri and Krishnun Sansurooah

Organisational security: A propositional study to map expert knowledge, Adel Alruwaii and David Brooks

Psychometric risk perception: Why some individuals elect not to act on risks?, Jaber Alsuhaimi and David Brooks

Link

Digital forensics and the legal system: A dilemma of our times, James Tetteh Ami-Narh and Patricia Williams

PDF

Digital forensics and the legal system: A dilemma of our times, James Tetteh Ami-Narh and Patricia A.H. Williams

Freedom fighters or terrorists by another name?, William J. Bailey and Adam Mcgill

PDF

Soft Computing In The Forecasting Of The Stock Exchange Of Thailand, Suchira Chaigusin, Chaiyaporn Chirathamjaree, and Judith Clayden

Australia's oil refining industry - Importance, threats and emergency response, Amanda East and William Bailey

A dynamic four-dimensional model of occupational balance, Kiah Evans

Link

Testing parallelization paradigms for MOEAs, Sadeesha Gamhewa and Philip Hingston

Link

Drift, Susie Greenhill

Link

An examination of corporate social disclosures in the annual reports of Indonesian listed companies, Juniati Gunawan, Geri Djajadikerta, and George Smith

Link

Willingness to buy non-deceptive counterfeit products: A case study of Indonesian consumers, Anas Hidayat, Katherine Mizerski, and Madeleine Ogilvie

PDF

Preventing the Acquisition of Data from Virtual Machine based Secure PortableExecution Environments, Peter James

Link

Secure Portable Execution Environments: A Review of Available Technologies, Peter James

Link

Stepped mirrored structures for generating true time delays in stationary optical delay line proof-of-principle experiments for application to optical coherence tomography, Paul V. Jansz, G Wild, and Steven Hinckley

PDF

A micro-photonic stationary optical delay line for fibre optic time domain OCT, Paul V. Jansz, Graham Wild, and Steven Hinckley

Link

A comparison of wet and dry etching to fabricate a micro-photonic structure for use in OCT, Paul Jansz, G Wild, and Steven Hinckley

Link

A proposed fibre optic time domain optical coherence tomography system using a micro-photonic stationary optical delay line, Paul Jansz, G Wild, and Steven Hinckley

A new definition of piracy in South East Asia required?, Paul Kevans and William J. Bailey

Link

Nocturnally active western rock lobsters, Panulirus cygnus, forage close to shallow coastal reefs, Lachlan D. MacArthur, Glenn A. Hyndes, R. Babcock, and Mathew Vanderklift

Link

Australian Defense Force Policy and the use of WPA2 as a security option for deployment of 802.11 wireless devices in the field, Drew Mceniery and Andrew Woodward

Link

Luxury purchases by working class, middle aged males in regional Western Australia, Brad Orr, Kate Mizerski, Natalie Collins, and Jamie Murphy

PDF

Evaluation Of An Optical Image Sensor For Use In The Microphotonic Real-Time Vegetation Discrimination System, Arie Paap, Sreten Askraba, Kamal Alameh, and John Rowe

PDF

Photonic-based spectral reflectance sensor for ground-based plant detection and weed discrimination, Arie Paap, Sreten Askraba, Kamal Alameh, and John Rowe

PDF

Data recovery from PalmmsgV001, Satheesaan Pasupatheeswaran

Link

Email 'Message-IDs' helpful for forensic analysis?, Satheesaan Pasupatheswaran

Link

Subverting national internet censorship-an investigation into existing tools and techniques, Jason Smart, Kyle Tedeschi, Daniel Meakins, Peter Hannay, and Christopher Bolan

PDF

Bots Trained to Play Like a Human are More Fun, Bhuman Soni and Philip Hingston

Link

Teaching awards and their impact on university teachers' sense of self-worth, Heather Sparrow

What's in it for me: The role of personal goals in student persistence and success, Heather Sparrow, Adrianne Kinnear, Mary C. Boyce, Sharon Middleton, and Marguerite Mary Cullity

Link

An Analysis of E-Marketplace Literature, Craig Standing, Susan Standing, and Peter Love

PDF

We've thrown away the pens, but are they learning? Using blogs in higher education, Katrina Strampel and Ron Oliver

PDF

Malware, Viruses and Log Visualisation, Iain Swanson

Link

Virtual Environments Support Insider Security Violations, Iain Swanson and Patricia Williams

PDF

Virtual Environments Support Insider Security Violations, Iain Swanson and Patricia A.H. Williams

Link

Malware Detection and Removal: An Examination of Personal Anti-Virus Software, Patryk Szewczyk and Murray Brand

Link

The impact of U3 devices on forensic analysis, Ravi Tank and Patricia Williams

PDF

The Impact of U3 Devices on Forensic Analysis, R. Tank and Patricia A.H. Williams

Link

Decision support systems to support international students: Potential for practice?, Khumphicha Tantisantisom and Judith Clayden

Link

Introducing a new technology to enhance community sustainability: An investigation of the possibilities of sun spots, Suppachart Tantisureeporn and Leisa J. Armstrong

Link

The Malware Analysis Body of Knowledge (MABOK), Craig Valli and Murray William Brand

Link

Luteinizing Hormone Levels are Positively Correlated with Plasma Amyloid-beta Protein Levels in Elderly Men, Giuseppe Verdile, Bu Yeap, Roger Clarnette, Satvinder Dhaliwal, Melanie Burkhardt, S A Paul Chubb, Karl De Ruyck, Mark Rodrigues, Pankaj D. Mehta, Jonathan Foster, David Bruce, and Ralph Martins

PDF

Web-based Courses to Support EFL Learning for Pre-service Teachers: A Thai Pilot Study, Vijittra Vonganusith and Pagram Jeremy

Link

Distinct Effects of Testosterone on Plasma and Cerebrospinal Fluid Amyloid-beta Levels, Eka Wahjoepramono, Linda Wijaya, Kevin Taddei, Georgia Martins, Matthew Howard, Karl De Ruyck, Kristyn Bates, Satvinda Dhaliwal, Giuseppe Verdile, Malcolm Carruthers, and Ralph Martins

Link

Improving the IEEE802.15.4 Re-Association Process in Mobile Sensor Networks, Kartinah Zen and Daryoush Habibi

PDF

Improving Mobile Sensor Connectivity Time in the IEEE 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, and Iftekhar Ahmad

PDF

Performance Evaluation of IEEE 802.15.4 for Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, and Iftekhar Ahmad

Submissions from 2007

Link

The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al Hajri and Patricia Williams

PDF

The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al-Hajri and Patricia Williams

Link

Modelling interstate tourism demand in Australia: A cointegration approach, David Allen, Ghialy Yap, and Riaz Shareef

PDF

Introduction to Mobile Phone Flasher Devices and Considerations for their Use in Mobile Phone Forensics, Marwan Al-Zarouni

PDF

A Proof-of-Concept Project for Utilizing U3 Technology in Incident Response, Marwan Al-Zarouni and Haitham Al-Hajri

PDF

Taxonomy of iPhone Activation and SIM Unlocking Methods, Marwan Al-Zarouni and Haitham Al-Hajri

Link

The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia Williams

PDF

The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia A. Williams

Data mining can empower grower's crop decision making, L. Armstrong, Y. Vaugh, and D. Diepeveen

Link

Light-emitting diode-compatible probes for indirect detection of anions in CE, Peter Balding, Mary Boyce, MC Breadmore, and M Macka

Link

Opening up thinking: Reflections of group work in a bilingual postgraduate program, Margaret Bowering, Bridget M. Leggett, Michael Harvey, and Leng Hui

PDF

A Comprehensive Firewall Testing Methodology, Murray Brand

PDF

Forensic analysis avoidance techniques of malware, Murray Brand

Link

Information Dichotomy Article Schools Version, Barbara Combes and Robyn Valli

Link

Methodological concerns for determining power output in the jump squat, Prue Cormie, R Deane, and JM McBride

Link

The influence of body mass on calculation of power during lower body resistance exercises, Prue Cormie, JM McBride, and GO McCaulley

Link

The role of different types of detached macrophytes in the food and habitat choice of a surf-zone inhabiting amphipod, Karen R. Crawley and Glenn A. Hyndes

Link

Variation among diets in discrimination of delta13C and delta15N in the amphipod Allorchestes compressa, Karen R. Crawley, Glenn A. Hyndes, and Mathew A. Vanderklift

Explaining IT usage in the non-government human service organisation (NGHSO), Zane D'Mello and Philip Dobson

Link

Making the case for critical realism: Examining the implementation of automated performance management systems, Phillip Dobson, John Myles, and Paul Jackson

A dynamic four-dimensional model of occupational balance [APOTC], Kiah Evans

PDF

Increasing security in the physical layer of wireless communication, Luke Golygowski

PDF

Information Security Surveys: A Review of the Methodologies, the Critics and a Pragmatic Approach to their Purposes and Usage, Alexis Guillot and Sue Kennedy

Technological Barriers to Successful eLearning in Computer Science, Yuwanuch Gulatee and Barbara Combes

Link

Corporate social disclosures by Indonesian listed companies: A pilot study, Juniati Gunawan

PDF

Minimizing the Number of Constraints for Shared Backup Path Protection (SBPP) in Shared Risk Link Group (SRLG) Optical Mesh Networks, Daryoush Habibi, Viet Quoc Phung, and Hoang N. Nguyen

Link

Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment, Peter Hannay and Peter James

PDF

A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase I proof of concept, Peter Hannay, Andrew Woodward, and Nic Cope

PDF

Network Security – Is IP Telephony Helping The Cause?, Paul Hansen and Andrew Woodward

PDF

The Need for an Investigation into Possible Security Threats Associated with SQL Based EMR software, Lee Heinke

PDF

Mood 300 IPTV decoder forensics, An Hilven

Link

How safe is Azeroth, or, are MMORPGs a security risk?, An Hilven and Andrew Woodward

Link

Steganalysis in computer forensics, Ahmed Ibrahim

Link

Bait Uptake and Caching by Red Foxes and Nontarget Species in Urban Reserves, Jennifer Jackson, Dorian Moro, Peter Mawson, Mark Lund, and Amanda Mellican

Link

Can SDV technology be utilised in a smartphone to prevent forensic analysis?, Peter James

PDF

Securing VoIP: A Framework to Mitigate or Manage Risks, Peter James and Andrew Woodward

Link

Perceptions of preparers and users to accounting change: A case study in an Australian university, Nazmi Sae'b Jarrar, Malcolm Smith, and Colin Dolley

Data mining and genetic algorithm application in bioinformatics with microarray, Chao Ying Jiao and Dongguang Li