Submissions from 2008
Distinct Effects of Testosterone on Plasma and Cerebrospinal Fluid Amyloid-beta Levels, Eka Wahjoepramono, Linda Wijaya, Kevin Taddei, Georgia Martins, Matthew Howard, Karl De Ruyck, Kristyn Bates, Satvinda Dhaliwal, Giuseppe Verdile, Malcolm Carruthers, and Ralph Martins
Improving the IEEE802.15.4 Re-Association Process in Mobile Sensor Networks, Kartinah Zen and Daryoush Habibi
Improving Mobile Sensor Connectivity Time in the IEEE 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, and Iftekhar Ahmad
Performance Evaluation of IEEE 802.15.4 for Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, and Iftekhar Ahmad
Submissions from 2007
The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al Hajri and Patricia Williams
The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al-Hajri and Patricia Williams
Modelling interstate tourism demand in Australia: A cointegration approach, David Allen, Ghialy Yap, and Riaz Shareef
Introduction to Mobile Phone Flasher Devices and Considerations for their Use in Mobile Phone Forensics, Marwan Al-Zarouni
A Proof-of-Concept Project for Utilizing U3 Technology in Incident Response, Marwan Al-Zarouni and Haitham Al-Hajri
Taxonomy of iPhone Activation and SIM Unlocking Methods, Marwan Al-Zarouni and Haitham Al-Hajri
The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia Williams
The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia A. Williams
Data mining can empower grower's crop decision making, L. Armstrong, Y. Vaugh, and D. Diepeveen
Light-emitting diode-compatible probes for indirect detection of anions in CE, Peter Balding, Mary Boyce, MC Breadmore, and M Macka
Opening up thinking: Reflections of group work in a bilingual postgraduate program, Margaret Bowering, Bridget M. Leggett, Michael Harvey, and Leng Hui
A Comprehensive Firewall Testing Methodology, Murray Brand
Forensic analysis avoidance techniques of malware, Murray Brand
Information Dichotomy Article Schools Version, Barbara Combes and Robyn Valli
Methodological concerns for determining power output in the jump squat, Prue Cormie, R Deane, and JM McBride
The influence of body mass on calculation of power during lower body resistance exercises, Prue Cormie, JM McBride, and GO McCaulley
The role of different types of detached macrophytes in the food and habitat choice of a surf-zone inhabiting amphipod, Karen R. Crawley and Glenn A. Hyndes
Variation among diets in discrimination of delta13C and delta15N in the amphipod Allorchestes compressa, Karen R. Crawley, Glenn A. Hyndes, and Mathew A. Vanderklift
Explaining IT usage in the non-government human service organisation (NGHSO), Zane D'Mello and Philip Dobson
Making the case for critical realism: Examining the implementation of automated performance management systems, Phillip Dobson, John Myles, and Paul Jackson
A dynamic four-dimensional model of occupational balance [APOTC], Kiah Evans
Increasing security in the physical layer of wireless communication, Luke Golygowski
Information Security Surveys: A Review of the Methodologies, the Critics and a Pragmatic Approach to their Purposes and Usage, Alexis Guillot and Sue Kennedy
Technological Barriers to Successful eLearning in Computer Science, Yuwanuch Gulatee and Barbara Combes
Corporate social disclosures by Indonesian listed companies: A pilot study, Juniati Gunawan
Minimizing the Number of Constraints for Shared Backup Path Protection (SBPP) in Shared Risk Link Group (SRLG) Optical Mesh Networks, Daryoush Habibi, Viet Quoc Phung, and Hoang N. Nguyen
Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment, Peter Hannay and Peter James
A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase I proof of concept, Peter Hannay, Andrew Woodward, and Nic Cope
Network Security – Is IP Telephony Helping The Cause?, Paul Hansen and Andrew Woodward
The Need for an Investigation into Possible Security Threats Associated with SQL Based EMR software, Lee Heinke
Mood 300 IPTV decoder forensics, An Hilven
How safe is Azeroth, or, are MMORPGs a security risk?, An Hilven and Andrew Woodward
Steganalysis in computer forensics, Ahmed Ibrahim
Bait Uptake and Caching by Red Foxes and Nontarget Species in Urban Reserves, Jennifer Jackson, Dorian Moro, Peter Mawson, Mark Lund, and Amanda Mellican
Can SDV technology be utilised in a smartphone to prevent forensic analysis?, Peter James
Securing VoIP: A Framework to Mitigate or Manage Risks, Peter James and Andrew Woodward
Perceptions of preparers and users to accounting change: A case study in an Australian university, Nazmi Sae'b Jarrar, Malcolm Smith, and Colin Dolley
Data mining and genetic algorithm application in bioinformatics with microarray, Chao Ying Jiao and Dongguang Li
The Effect of an Exercise Intervention on Physical and Cognitive Function, Emotional Health and Quality of Life Among Older Adults with Dementia in Bangkok, Sirikul Karuncharernpanit
Analysis of PKI as a means of securing ODF documents, Gautham Kasinath and Leisa Armstrong
Importance of Verification and Validation of Data Sources in Attaining Information Superiority, Gautham Kasinath and Leisa Armstrong
Analysis of PKI as a Means of Securing ODF Documents, Gautham Kasinath and Leisa J. Armstrong
Importance of Verification and Validation of Data Sources in Attaining Information Superiority, Gautham Kasinath and Leisa J. Armstrong
Securing J2ME Mobile Application API Using XACML, Gautham Kasinath and Leisa J. Armstrong
Always the optimist?, Eric Kordt and Craig Standing
Reliability of time-to-exhaustion versus time-trial running tests in runners, Paul B. Laursen, Graeme T. Francis, Chris Abbiss, Michael J. Newton, and Kazunori Nosaka
Effect of leaf movement on epiphytic algal biomass of seagrass leaves, Paul Lavery, Tara Reid, Glenn Hyndes, and Beverley Van Elven
Knowledge mapping readiness, Joseph Lee and Dieter Fink
Tracing USB Device artefacts on Windows XP operating system for forensic purpose, Victor Chileshe Luo
Varying foraging strategies of Labridae in seagrass habitats: Herbivory in temperate seagrass meadows?, Lachlan D. MacArthur and Glenn A. Hyndes
Distribution and reproductive biology of the sandbar shark, Carcharhinus plumbeus (Nardo), in Western Australian waters, Rory Brian Mcauley, C. A. Simpfendorfer, Glenn A. Hyndes, and R. C.J. Lenanton
Molecular Markers of Circulating Melanoma Cells, Sandra Medic, Robert L. Pearce, Peter J. Heenan, and Melanie Ziman
Working in a cross-cultural setting, Peter Milnes, Clare Fenwick, Keith Truscott, and Winsome St John
Attenuation of muscle damage by preconditioning with muscle hyperthermia 1-day prior to eccentric exercise, Kazunori Nosaka, Makii Mishan Muthalib, A Lavender, and Paul B. Laursen
Network Security Devices and Protocols Using State Model Diagrams, C. Nuangjamnong, D. Veal, and S. P. Maj
On diverse routing for Shared Risk Link Groups (SRLGs) in Optical Mesh Networks, Quoc Viet Phung, Daryoush Habibi, and Hoang Nguyen
A Novel Beam Deflection Method for Wide Angle Laser Scanning, Kaveh Sahba, Kamal Alameh, and Clifton Smith
Triangulation Based Static Wide Angle Laser Scanning For Obstacle Detection, Kaveh Sahba, Kamal Alameh, and Clifton Smith
Cylindrical quasi-cavity waveguide for static wide angle pattern projection, Kaveh Sahba, Kamal Alameh, Clifton Smith, and Arie Paap
Photonics-based spectral reflectance sensor for plant discrimination, Kaveh Sahba, Sreten Askraba, and Kamal Alameh
An approach in identifying and tracing back spoofed IP packets to their sources, Krishnun Sansurooah
An overview and examination of digital PDA devices under forensics toolkits, Krishnun Sansurooah
An overview and examination of digital PDA devices under forensics toolkits, Krishnun Sansurooah
Intrusion Detection System (IDS) techniques and responses for mobile wireless networks, Krishnun Sansurooah
Managing Analysis, David Shaw
The Effect of Accentuated Eccentric Load on Jump Kinetics in High-Performance Volleyball Players, Jeremy Sheppard, Robert U. Newton, and Michael Mcguigan
Considerations for the design of exergames, Jeffrey Ronald Sinclair, Philip Hingston, and Martin Masek
The Phantasm of ATM Withdrawal, Nattakant Utakrit
Defunking Dewey: Taking fiction out of the equation, Robyn Valli and Barbara Combes
Electoral violence in mid nineteenth-century England and Wales, Justin Wasserman and Edwin Jaggard
The Effect of Classical Music on Painting Quality and Classroom Behaviour for Students with Severe Intellectual Disabilities in Special Schools, Russell F. Waugh and Jane V. Riddoch
Medical Identity Theft – Not Feeling Like Yourself?, Darren Webb
Exposure assessment: a case study, Hayden Wing and Jacques Oosthuizen
Providing QoS for Symmetrical Voice/Video Traffic in Wireless Networks, Justin Wyatt, Daryoush Habibi, Iftekhar Ahmad, and Hushairi Zen
A Segregation Based MAC Protocol for Real-Time Multimedia Traffic in WLANs, Hushairi Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad, and Justin Wyatt
Adaptive Segregation-Based MAC Protocol for Real-Time Multimedia Traffic in WLANs, Hushairi Zen, Daryoush Habibi, Alexander Rassau, and Justin Wyatt
Submissions from 2006
Dynamic pacing strategies during the cycle phase of an ironman triathlon, Chris Abbiss, Marc Quod, David Martin, Kevin Netto, Kazunori Nosaka, Hamilton Lee, Rob Suriano, David Bishop, and Paul Laursen
Mobile handset forensic evidence: a challenge for law enforcement, Marwan Al-Zarouni
Mobile Handset Forensic Evidence: a challenge for Law Enforcement, Marwan Al-Zarouni
The Reality of Risks from Consented use of USB Devices, Marwan Al-Zarouni
Security risk assessment: Group approach to a consensual outcome, Ben Beard and David J. Brooks
Managing Information Security Complexity, Murray Brand
Modelling layer 2 and layer 3 device bandwidth using B-Node theory, Steven Cikara, Stanislaw Maj, and David Thomas Shaw
Literacy and recent history of diarrhoea are predictive of plasmodium falciparum parasitaemia in Kenyan adults, Rodney Coldren, Trish Prosser, Fredrick Ogolla, and Victor Ofula
Influence of different volumes and types of detached macrophytes on fish community structure in surf zones of sandy beaches, Karen Crawley, Glenn Hyndes, and Susanne Ayvazian
The effects of biotechnology education on Australian high school students' understandings and attitudes about biotechnology processes, Vaille Dawson and Christina Soames
From Systems to Network? Developments in the state records authority of New South Wales regional repositories, Wayne Andrew Doubleday
Pollution minimisation practices in the Australian mining and mineral processing industries, Catherine Driussi and Janis Jansz
Technological options for waste minimisation in the mining industry, Catherine Driussi and Janis Jansz
Information Systems Success in the Public Sector: Stakeholders' Perspectives and Emerging Alignment Model, Ivana Elpez and Dieter Fink
A model of information security governance for e-business, Dieter Fink, Tobias Huegle, and Martin Dortschy
In search of community in Western Australia: A qualitative study of adults conceptualisations of their communities, Andria Green, Lynne Cohen, and Julie Ann Pooley
Identifying the Challenges in Teaching Computer Science Topics Online, Yuwanuch Gulatee and Barbara Combes
A methodology for the examination of the effectiveness of secure erasure tools running on Windows XP - research in progress, Anthony Hadfield, Michael Ahern, Leo Sell, and Andrew Woodward
Security Issues of IEEE 802.16 (WiMAX), Jamshed Hasan
The framing of ATSIC Chairman Geoff Clark in the Australian, Lauren Heinritz and Beate Josephi