Follow

Submissions from 2008

Link

Distinct Effects of Testosterone on Plasma and Cerebrospinal Fluid Amyloid-beta Levels, Eka Wahjoepramono, Linda Wijaya, Kevin Taddei, Georgia Martins, Matthew Howard, Karl De Ruyck, Kristyn Bates, Satvinda Dhaliwal, Giuseppe Verdile, Malcolm Carruthers, and Ralph Martins

Link

Improving the IEEE802.15.4 Re-Association Process in Mobile Sensor Networks, Kartinah Zen and Daryoush Habibi

PDF

Improving Mobile Sensor Connectivity Time in the IEEE 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, and Iftekhar Ahmad

PDF

Performance Evaluation of IEEE 802.15.4 for Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, and Iftekhar Ahmad

Submissions from 2007

Link

The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al Hajri and Patricia Williams

PDF

The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al-Hajri and Patricia Williams

Link

Modelling interstate tourism demand in Australia: A cointegration approach, David Allen, Ghialy Yap, and Riaz Shareef

PDF

Introduction to Mobile Phone Flasher Devices and Considerations for their Use in Mobile Phone Forensics, Marwan Al-Zarouni

PDF

A Proof-of-Concept Project for Utilizing U3 Technology in Incident Response, Marwan Al-Zarouni and Haitham Al-Hajri

PDF

Taxonomy of iPhone Activation and SIM Unlocking Methods, Marwan Al-Zarouni and Haitham Al-Hajri

Link

The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia Williams

PDF

The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia A. Williams

Data mining can empower grower's crop decision making, L. Armstrong, Y. Vaugh, and D. Diepeveen

Link

Light-emitting diode-compatible probes for indirect detection of anions in CE, Peter Balding, Mary Boyce, MC Breadmore, and M Macka

Link

Opening up thinking: Reflections of group work in a bilingual postgraduate program, Margaret Bowering, Bridget M. Leggett, Michael Harvey, and Leng Hui

PDF

A Comprehensive Firewall Testing Methodology, Murray Brand

PDF

Forensic analysis avoidance techniques of malware, Murray Brand

Link

Information Dichotomy Article Schools Version, Barbara Combes and Robyn Valli

Link

Methodological concerns for determining power output in the jump squat, Prue Cormie, R Deane, and JM McBride

Link

The influence of body mass on calculation of power during lower body resistance exercises, Prue Cormie, JM McBride, and GO McCaulley

Link

The role of different types of detached macrophytes in the food and habitat choice of a surf-zone inhabiting amphipod, Karen R. Crawley and Glenn A. Hyndes

Link

Variation among diets in discrimination of delta13C and delta15N in the amphipod Allorchestes compressa, Karen R. Crawley, Glenn A. Hyndes, and Mathew A. Vanderklift

Explaining IT usage in the non-government human service organisation (NGHSO), Zane D'Mello and Philip Dobson

Link

Making the case for critical realism: Examining the implementation of automated performance management systems, Phillip Dobson, John Myles, and Paul Jackson

A dynamic four-dimensional model of occupational balance [APOTC], Kiah Evans

PDF

Increasing security in the physical layer of wireless communication, Luke Golygowski

PDF

Information Security Surveys: A Review of the Methodologies, the Critics and a Pragmatic Approach to their Purposes and Usage, Alexis Guillot and Sue Kennedy

Technological Barriers to Successful eLearning in Computer Science, Yuwanuch Gulatee and Barbara Combes

Link

Corporate social disclosures by Indonesian listed companies: A pilot study, Juniati Gunawan

PDF

Minimizing the Number of Constraints for Shared Backup Path Protection (SBPP) in Shared Risk Link Group (SRLG) Optical Mesh Networks, Daryoush Habibi, Viet Quoc Phung, and Hoang N. Nguyen

Link

Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment, Peter Hannay and Peter James

PDF

A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase I proof of concept, Peter Hannay, Andrew Woodward, and Nic Cope

PDF

Network Security – Is IP Telephony Helping The Cause?, Paul Hansen and Andrew Woodward

PDF

The Need for an Investigation into Possible Security Threats Associated with SQL Based EMR software, Lee Heinke

PDF

Mood 300 IPTV decoder forensics, An Hilven

Link

How safe is Azeroth, or, are MMORPGs a security risk?, An Hilven and Andrew Woodward

Link

Steganalysis in computer forensics, Ahmed Ibrahim

Link

Bait Uptake and Caching by Red Foxes and Nontarget Species in Urban Reserves, Jennifer Jackson, Dorian Moro, Peter Mawson, Mark Lund, and Amanda Mellican

Link

Can SDV technology be utilised in a smartphone to prevent forensic analysis?, Peter James

PDF

Securing VoIP: A Framework to Mitigate or Manage Risks, Peter James and Andrew Woodward

Link

Perceptions of preparers and users to accounting change: A case study in an Australian university, Nazmi Sae'b Jarrar, Malcolm Smith, and Colin Dolley

Data mining and genetic algorithm application in bioinformatics with microarray, Chao Ying Jiao and Dongguang Li

Link

The Effect of an Exercise Intervention on Physical and Cognitive Function, Emotional Health and Quality of Life Among Older Adults with Dementia in Bangkok, Sirikul Karuncharernpanit

PDF

Analysis of PKI as a means of securing ODF documents, Gautham Kasinath and Leisa Armstrong

PDF

Importance of Verification and Validation of Data Sources in Attaining Information Superiority, Gautham Kasinath and Leisa Armstrong

PDF

Analysis of PKI as a Means of Securing ODF Documents, Gautham Kasinath and Leisa J. Armstrong

PDF

Importance of Verification and Validation of Data Sources in Attaining Information Superiority, Gautham Kasinath and Leisa J. Armstrong

Securing J2ME Mobile Application API Using XACML, Gautham Kasinath and Leisa J. Armstrong

PDF

Always the optimist?, Eric Kordt and Craig Standing

Link

Reliability of time-to-exhaustion versus time-trial running tests in runners, Paul B. Laursen, Graeme T. Francis, Chris Abbiss, Michael J. Newton, and Kazunori Nosaka

PDF

Effect of leaf movement on epiphytic algal biomass of seagrass leaves, Paul Lavery, Tara Reid, Glenn Hyndes, and Beverley Van Elven

Knowledge mapping readiness, Joseph Lee and Dieter Fink

PDF

Tracing USB Device artefacts on Windows XP operating system for forensic purpose, Victor Chileshe Luo

Link

Varying foraging strategies of Labridae in seagrass habitats: Herbivory in temperate seagrass meadows?, Lachlan D. MacArthur and Glenn A. Hyndes

Link

Distribution and reproductive biology of the sandbar shark, Carcharhinus plumbeus (Nardo), in Western Australian waters, Rory Brian Mcauley, C. A. Simpfendorfer, Glenn A. Hyndes, and R. C.J. Lenanton

Link

Molecular Markers of Circulating Melanoma Cells, Sandra Medic, Robert L. Pearce, Peter J. Heenan, and Melanie Ziman

Link

Working in a cross-cultural setting, Peter Milnes, Clare Fenwick, Keith Truscott, and Winsome St John

Link

Attenuation of muscle damage by preconditioning with muscle hyperthermia 1-day prior to eccentric exercise, Kazunori Nosaka, Makii Mishan Muthalib, A Lavender, and Paul B. Laursen

PDF

Network Security Devices and Protocols Using State Model Diagrams, C. Nuangjamnong, D. Veal, and S. P. Maj

Link

On diverse routing for Shared Risk Link Groups (SRLGs) in Optical Mesh Networks, Quoc Viet Phung, Daryoush Habibi, and Hoang Nguyen

Link

A Novel Beam Deflection Method for Wide Angle Laser Scanning, Kaveh Sahba, Kamal Alameh, and Clifton Smith

PDF

Triangulation Based Static Wide Angle Laser Scanning For Obstacle Detection, Kaveh Sahba, Kamal Alameh, and Clifton Smith

PDF

Cylindrical quasi-cavity waveguide for static wide angle pattern projection, Kaveh Sahba, Kamal Alameh, Clifton Smith, and Arie Paap

Link

Photonics-based spectral reflectance sensor for plant discrimination, Kaveh Sahba, Sreten Askraba, and Kamal Alameh

PDF

An approach in identifying and tracing back spoofed IP packets to their sources, Krishnun Sansurooah

PDF

An overview and examination of digital PDA devices under forensics toolkits, Krishnun Sansurooah

Link

An overview and examination of digital PDA devices under forensics toolkits, Krishnun Sansurooah

Link

Intrusion Detection System (IDS) techniques and responses for mobile wireless networks, Krishnun Sansurooah

PDF

Managing Analysis, David Shaw

Link

The Effect of Accentuated Eccentric Load on Jump Kinetics in High-Performance Volleyball Players, Jeremy Sheppard, Robert U. Newton, and Michael Mcguigan

Link

Considerations for the design of exergames, Jeffrey Ronald Sinclair, Philip Hingston, and Martin Masek

PDF

The Phantasm of ATM Withdrawal, Nattakant Utakrit

Defunking Dewey: Taking fiction out of the equation, Robyn Valli and Barbara Combes

Link

Electoral violence in mid nineteenth-century England and Wales, Justin Wasserman and Edwin Jaggard

Link

The Effect of Classical Music on Painting Quality and Classroom Behaviour for Students with Severe Intellectual Disabilities in Special Schools, Russell F. Waugh and Jane V. Riddoch

PDF

Medical Identity Theft – Not Feeling Like Yourself?, Darren Webb

Link

Exposure assessment: a case study, Hayden Wing and Jacques Oosthuizen

PDF

Providing QoS for Symmetrical Voice/Video Traffic in Wireless Networks, Justin Wyatt, Daryoush Habibi, Iftekhar Ahmad, and Hushairi Zen

Link

A Segregation Based MAC Protocol for Real-Time Multimedia Traffic in WLANs, Hushairi Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad, and Justin Wyatt

PDF

Adaptive Segregation-Based MAC Protocol for Real-Time Multimedia Traffic in WLANs, Hushairi Zen, Daryoush Habibi, Alexander Rassau, and Justin Wyatt

Submissions from 2006

Link

Dynamic pacing strategies during the cycle phase of an ironman triathlon, Chris Abbiss, Marc Quod, David Martin, Kevin Netto, Kazunori Nosaka, Hamilton Lee, Rob Suriano, David Bishop, and Paul Laursen

Link

Mobile handset forensic evidence: a challenge for law enforcement, Marwan Al-Zarouni

PDF

Mobile Handset Forensic Evidence: a challenge for Law Enforcement, Marwan Al-Zarouni

PDF

The Reality of Risks from Consented use of USB Devices, Marwan Al-Zarouni

PDF

Security risk assessment: Group approach to a consensual outcome, Ben Beard and David J. Brooks

PDF

Managing Information Security Complexity, Murray Brand

Link

Modelling layer 2 and layer 3 device bandwidth using B-Node theory, Steven Cikara, Stanislaw Maj, and David Thomas Shaw

PDF

Literacy and recent history of diarrhoea are predictive of plasmodium falciparum parasitaemia in Kenyan adults, Rodney Coldren, Trish Prosser, Fredrick Ogolla, and Victor Ofula

Link

Influence of different volumes and types of detached macrophytes on fish community structure in surf zones of sandy beaches, Karen Crawley, Glenn Hyndes, and Susanne Ayvazian

Link

The effects of biotechnology education on Australian high school students' understandings and attitudes about biotechnology processes, Vaille Dawson and Christina Soames

Link

From Systems to Network? Developments in the state records authority of New South Wales regional repositories, Wayne Andrew Doubleday

Link

Pollution minimisation practices in the Australian mining and mineral processing industries, Catherine Driussi and Janis Jansz

Link

Technological options for waste minimisation in the mining industry, Catherine Driussi and Janis Jansz

Link

Information Systems Success in the Public Sector: Stakeholders' Perspectives and Emerging Alignment Model, Ivana Elpez and Dieter Fink

Link

A model of information security governance for e-business, Dieter Fink, Tobias Huegle, and Martin Dortschy

Link

In search of community in Western Australia: A qualitative study of adults conceptualisations of their communities, Andria Green, Lynne Cohen, and Julie Ann Pooley

PDF

Identifying the Challenges in Teaching Computer Science Topics Online, Yuwanuch Gulatee and Barbara Combes

Link

A methodology for the examination of the effectiveness of secure erasure tools running on Windows XP - research in progress, Anthony Hadfield, Michael Ahern, Leo Sell, and Andrew Woodward

PDF

Security Issues of IEEE 802.16 (WiMAX), Jamshed Hasan

Link

The framing of ATSIC Chairman Geoff Clark in the Australian, Lauren Heinritz and Beate Josephi