Follow

Submissions from 2015

Link

Collective Rituals as Meaningful Expressions of the Relationships between People, Water and Forest: A Case Study from Northern Thailand, Katesuda Sitthisuntikul and Pierre Horowitz

Link

Genome-wide scans reveal cryptic population structure in a dry-adapted eucalypt, Dorothy A. Steane, Brad M. Potts, Elizabeth McLean, Lesley Collins, Suzanne M. Prober, William D. Stock, Rene E. Vaillancourt, and Margaret Byrne

Link

The Geneva Conventions and Cyber-Warfare: A Technical Approach, Iain Sutherland, Konstantinos Xynos, Andrew Jones, and Andrew Blyth

PDF

Do water buffalo facilitate dispersal of invasive alien tree species Acacia nilotica in Bekol Savanna Baluran National Park?, Sutomo

An Investigation into factors inhibiting Australian end-users from utilising ADSL Router security effectively, Patryk Szewczyk

Link

Your broadband router is not as secure as you think it is, Patryk Szewczyk and Nikolai Hampton

PDF

The Canadian Healthy Infant Longitudinal Development (CHILD) birth cohort study: Assessment of environmental exposures, Tim K. Takaro, James A. Scott, Ryan W. Allen, Sonia S. Anand, Allan B. Becker, A. Dean Befus, Michael Brauer, Joanne Duncan, Diana L. Lefebvre, Wendy Lou, Piush J. Mandhane, Kathleen E. McLean, Gregory Miller, Hind Sbihi, Huan Shu, Padmaja Subbarao, Stuart E. Turvey, Amanda J. Wheeler, Leilei Zeng, Malcolm R. Sears, and Jeffrey R. Brook

Link

A combination of meteorological and satellite-based drought indices in a better drought assessment and forecasting in Northeast Thailand, Watinee Thavorntam, Netnapid Tantemsapya, and Leisa Armstrong

Link

Formation of the radical self: Constructs of change in western youth to acts of terrorism on home-soil, Robyn Torok

Link

How are Western youth conditioned to commit terrorist acts?, Robyn Torok

Link

How social media was key to Islamic State’s attacks on Paris, Robyn Torok

Link

Institutionalised moral reframing: A research based model on Islamic radicalisation on social media, Robyn Torok

Link

Symbiotic radicalisation strategies: Propaganda tools and neuro linguistic programming, Robyn Torok

Link

Terror group’s social media ploy edges out rivals, wins recruits, Robyn Torok

Link

Terrorists use marketing skills to attract new recruits online, Robyn Torok

Link

Mobile Based Healthcare Management Using Artificial Intelligence, Amiya Kumar Tripathy, Rebeck Carvalho, Keshav Pawaskar, Suraj Yadav, and Vijay Yadav

Link

Mediassistedge - Simplifying Diagnosis Procedure & Improving Patient Doctor Connectivity, Amiya Kumar Tripathy, Rebeck Carvalho, Ajit Puthenputhussery, Nikita Chhabhaiya, and Bijoy Anthony

Link

Travolution - An Embedded System in Passenger Car for Road Safety, Amiya Kumar Tripathy, Sejal Chopra, Samantha Bosco, Srinidhi Shetty, and Firdos Sayyed

Link

Voice For The Mute, Amiya Kumar Tripathy, Dipti Jadhav, Steffi A. Barreto, Daphne Rasquinha, and Sonia S. Mathew

Link

Opinion Mining from User Reviews, Amiya Kumar Tripathy, Revathy Sundararajan, Chinmay Deshpande, Pankaj Mishra, and Neha Natarajan

PDF

A profile of prolonged, persistent SSH attack on a Kippo Based Honeynet, Craig Valli, Priya N. Rabadia, and Andrew Woodward

Link

Key issues in mine closure planning related to pit lakes, Jerry Vandenberg, Clint Mccullough, and Devin Castendyk

Link

An affine equivariant anamorphosis for compositional data [Conference paper], K. G. Van Den Boogaart, R. Tolosana-Delgado, and Ute Mueller

PDF

Estimation of bias with the single-zone assumption in measurement of residential air exchange using the perfluorocarbon tracer gas method, K Van Ryswyk, L. Wallace, D. Fugler, M. MacNeill, M. E. Heroux, M. D. Gibson, J. R. Guernsey, W. Kindzierski, and A. J. Wheeler

Link

Turf-forming algal assemblages on temperate reefs are strongly influenced by the territorial herbivorous fish Parma mccullochi (Pomacentridae), Frederico Vitelli, Glenn A. Hyndes, A. Kendrick, and Aldo Turco

PDF

A stable wavelength-spacing-tunable dual-wavelength single-longitudinal-mode fiber ring laser based on a DMD filter, Tao Wang, Gang Liu, Su-Hua Zhou, Hui-Chun Yang, Bin-Bin Yan, Xiao Chen, Chong-Xiu Yu, Xin-Zhu Sang, Feng Xiao, and Kamal Alameh

Link

Security and privacy issues for mobile health, Patricia A.H. Williams and Anthony J. Maeder

PDF

Cybersecurity Vulnerabilities in Medical Devices: A Complex Environment and Multifaceted Problem, Patricia A.H. Williams and Andrew J. Woodward

Link

An uncomfortable change: Shifting perceptions to establish pragmatic cyber security, Andrew Woodward and Patricia A.H. Williams

Link

Predicting the temporal response of seagrass meadows to dredging using Dynamic Bayesian Networks, P. P.-Y. Wu, K. Mengersen, K. Mcmahon, G. A. Kendrick, and M. J. Caley

Link

Work-integrated learning: Linking research and teaching for a win-win situation, J Xia, Craig Caulfield, and S Ferns

Link

Australia could become a leader in cybersecurity research, Alex Zelinsky, Andrew Goldsmith, Craig Valli, Jodi Steel, Liz Sonenberg, Sven Rogge, and Vijay Varadhararjan

Link

Apply technology acceptance model with big data analytics and unity game engine, Hongye Zhong and Jitian Xiao

Link

Design for a network centric enterprise forensic system, Hongye Zhong and Jitian Xiao

PDF

A revision of the Western Australian species of the Australian harvestman genus Nunciella (Opiliones: Triaenonychidae), Sharon Angela Zuiddam

Submissions from 2014

Link

Geography, climate, and biodiversity: the history and future of Mediterranean-type ecosystems, David Ackerly, William D. Stock, and Jasper Slingsby

Link

The E-book Power User in Academic and Research Libraries: Deep Log Analysis and User Customisation, Pervaiz Ahmad, Mark Brogan, and Michael N. Johnstone

Link

Determining what characteristics constitute a darknet, Symon Aked, Christopher Bolan, and Murray Brand

Link

A novel mobility-aware data transfer service (MADTS) based on DDS standards, Basem Al-Madani, Ayaz ul Hussan Khan, and Zubair A. Baig

PDF

Information provision and retrieval in the farming industry in Western Australia, Hasham al Musawi

PDF

Tego - A framework for adversarial planning, Daniel Ashlock and Philip Hingston

Link

Authentication and authorisation in entrusted unions, Dhouha F. Ayed, Jan Camenisch, Tanya Ignatenko, Michael N. Johnstone, Paul Koster, Brigitta Lange, Milan Petković, Dieter Sommer, and John Zic

PDF

A Genetic Algorithm-Based Feature Selection, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen

PDF

Application of Cellular Neural Networks and Naive Bayes Classifier in Agriculture, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen

PDF

On The Application Of Genetic Probabilistic Neural Networksand Cellular Neural Networks In Precision Agriculture, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen

PDF

Zernike moments and genetic algorithm : tutorial and application, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen

A computational approach to plant leaves identification, Oluleye Hezekiah Babatunde, Leisa Armstrong, J Leng, and D Diepeveen

Link

Securing the internet of things infrastructure – Standards and techniques, Zubair A. Baig

Link

Countering crime in hostile environments: securing vulnerable humanitarian aid workers in Paua New Guinea, William J. Bailey

PDF

Hybrid intelligent model for software maintenance prediction, Abdulrahman Ahmed Bobakr Baqais, Mohammad Alshayeb, and Zubair A. Baig

Link

Omnivory and opportunism characterize food webs in a large dry-tropics river system, Melanie L. Blanchette, Aaron M. Davis, Timothy D. Jardine, and Richard G. Pearson

Link

Digitally augmenting physical spaces for personalised learning, Julie Boston, Martin Masek, Mark P. Brogan, and Chiou Peng Lam

Link

Sustainability mining: Water for mining, and mining water, Gemma L. Broderick and Pierre Horwitz

Intrusion Detection Systems in the Protection of Assets, David J. Brooks

Corporate security and the stratum of security management, David J. Brooks and Jeffrey D. Corkill

Engineering Principles in the Protection of Assets, David J. Brooks and Clifton L. Smith

PDF

Systematics and biogeography of the Australian burrowing freshwater crayfish genus Engaewa Riekk (Decapoda: Parastacidae), Quinton Burnham

PDF

A preliminary investigation of the potential effects of the invasive Mozambique tilapia Oreochromis mossambicus on the native fish assemblages of Lake MacLeod, Western Australia, Hannah Cameron-Caluori

Link

Changes in the abundance and distribution of the New Zealand fur seal (Arctocephalus forsteri) in Western Australia: Are they approaching carrying capacity?, Richard Campbell, David Holley, Peter Collins, and Shannon Armstrong

Link

Volatile Memory Acquisition Tools – A Comparison Across Taint And Correctness, William Campbell

PDF

Fate of Eucalyptus marginata seed from canopy-store to emergence in the northern jarrah forests of Western Australia: Research to help improve regeneration following shelterwood treatment, Jeffrey Cargill

Link

A Survey Of IPv6 Address Usage In The Public Domain Name System, Clinton R. Carpene and Andrew J. Woodward

PDF

Beyond proximity: The importance of green space useability to self-reported health, May Carter and Pierre Horwitz

Link

Barcoding of mygalomorph spiders (Araneae:Mygalomorphae) in the Pilbara bioregion of Western Australia reveals a highly diverse biota, Mark A. Castalanelli, Roy Teale, Michael G. Rix, W J. Kennington, and Mark S. Harvey

A review of the use of ICT to support Agricultural development in India, Pallavie Chatuphale and Leisa Armstrong

PDF

Community building, multiculturalism and the suburban public library, Rajeswari Chelliah

Link

Development of location-based services for recommending departure stations to park and ride users, Zhirong Chen, Jianhong Cecilia Xia, Buntoro Irawan, and Craig Caulfied

Link

A survey of a personalised location-based service architecture for property hunting, Z Chen, J Xia, and C Caulfield

Link

Locational wireless and social media-based surveillance, Maxim Chernyshev

Link

The zombies strike back: Towards client-side BeEF detection, Maxim Chernyshev and Peter Hannay

Link

Swan grazing on seagrass: Abundance but not grazing pressure varies over an annual cycle in a temperate estuary, Gary E. Choney, Kathryn McMahon, Paul S. Lavery, and Neil Collier

PDF

Website accessibility in Australia and the national transition strategy: Outcomes and findings, Vivienne Conway

Link

Identity multipliers and the mistaken twittering of birds of a feather, David M. Cook

Link

Twitter Deception And Influence: Issues Of Identity, Slacktivism, And Puppetry, David M. Cook, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, and Shaquille Abdul Rahman

Link

Birds of a feather deceive together: The chicanery of multiplied metadata, D. M. Cook

Link

Do Security Systems Fail Because Of Entropy?, Michael P. Coole and David J. Brooks

Link

Plant ecophysiological diversity, Michael Cramer, Adam West, Simon Power, Robert Skelton, and William D. Stock

Link

Numerical Study Of The Influence Of Foundation Compressibility And Reinforcement Stiffness On The Behavior Of Reinforced Soil Walls, I.P Damians, Richard Bathurst, A Josa, and A Lloret

PDF

Evolutionary approaches for feature selection in biological data, Vinh Q. Dang

Link

Data carving using artificial headers, R. Daniel, N. L. Clarke, and F. Li

PDF

Improving pre-hospital care at mass gathering events: Applying military intelligence methodology to the St John ambulance WA event health operations, Alan James Davies

Link

Impact of Phytophthora-dieback on birds in Banksia woodlands in south west Western Australia, Robert A. Davis, Leonie E. Valentine, Michael D. Craig, Barbara Wilson, Wesley J. Bancroft, and Marnie Mallie

Link

Forensic memory dump analysis and recovery of the artefacts of using TOR bundle browser – The need, Divya Dayalamurthy

Link

To eradicate feral cats, we need to know how many are out there, Tim Doherty

Link

Ferals, strays, pets: how to control the cats that are eating our wildlife, Tim Doherty and Mike Calver

PDF

A critical review of habitat use by feral cats and key directions for future research and management, Tim S. Doherty, Andrew J. Bengsen, and Robert A. Davis

Link

Task disengagement and implications for vigilance performance in CCTV surveillance, F M. Donald and Craig H. M. Donald

PDF

Contrasting biogeochemical cycles of cobalt in the surface western Atlantic Ocean, Gabrial Dulaquais, Marie Boye, Rob Middag, Stephanis Owens, Viene Puigcorbe, Ken Buesseler, Pere Masque´, Hein J. de Baar, and Xavier Carton

PDF

Influence of hydrological and environmental conditions on mangrove vegetation at coastal and inland semi-arid areas of the Gascoyne region, Natasha Robin Dunham

The validation of pilot malting Australia's malting facility against a commercial malthouse, Hugh Dunn, Jon Luff, Allen Tarr, Stefan Harasymow, Damien Morrison, Agnieszka Janusz, and Doug Stewart

Link

Australian goblin spiders of the genus ischnothyreus (Araneae, Oonopidae), Karen L. Edward and Mark S. Harvey

Link

Persistent issues in encryption software: A heuristic and cognitive walkthrough, Jad El-Abed and Patryk S. Szewczyk

Link

Differences in predator composition alter the direction of structure-mediated predation risk in macrophyte communities, Simone Farina, Rohan Arthur, Jordi F. Pages, Patricia Prado, Javier Romero, Adriana Verges, Glenn A. Hyndes, Ken L. Heck, Sybil Glenos, and Teresa Alcoverro

Link

Conceptualizing the project and developing a field measurement plan, James Fourqurean, Beverly Johnson, J. Boone Kauffman, Hilary Kennedy, Igino Emmer, Jennifer Howard, Emily Pidgeon, and Oscar Serrano

Link

Field sampling of vegetative carbon pools in coastal ecosystems, James Fourqurean, Beverly Johnson, J. Boone Kauffman, Hilary Kennedy, Catherine Lovelock, Neil Saintilan, Daniel M. Alongi, Miguel Cifuentes, Margareth Copertino, Steve Crooks, Carlos Duarte, Miguel Fortes, Jennifer Howard, Andreas Hutahaean, James Kairo, Núria Marbà, Daniel Murdiyarso, Emily Pidgeon, Peter Ralph, and Oscar Serrano

PDF

Experiences Of Heat Stress Vulnerability And Climate Change Among Farmers In Ghana, Kwasi Frimpong, Jacques d. Oosthuizen, and Eddie J. Van Etten

PDF

Recent Trends In Temperature And Relative Humidity in Bawku East, Northern Ghana, Kwasi Frimpong, Jacques d. Oosthuizen, and Eddie J. Van Etten

PDF

The Extent Of Heat On Health And Sustainable Farming In Ghana - Bawku East, Kwasi Frimpong, Jacques Oosthuizen, and Eddie J. Van Etten

Link

Is emergency management an integrated element of business continuity management? A case study with security professionals in Western Australia, Kenny Frohde and David J. Brooks

Link

Development of on-site heavy metal analysis method and technology for selective removal of radioactive cesium from the extracts of designated waste, Y. Fujikawa, H. Ozaki, P. Wei, H. Tsuno, A. Fujinaga, S. Taniguchi, R. Takanami, Paul Lewtas, S. Sakura, and K. Fujiwara