Submissions from 2015
Institutionalised moral reframing: A research based model on Islamic radicalisation on social media, Robyn Torok
Symbiotic radicalisation strategies: Propaganda tools and neuro linguistic programming, Robyn Torok
Terror group’s social media ploy edges out rivals, wins recruits, Robyn Torok
Terrorists use marketing skills to attract new recruits online, Robyn Torok
Mobile Based Healthcare Management Using Artificial Intelligence, Amiya Kumar Tripathy, Rebeck Carvalho, Keshav Pawaskar, Suraj Yadav, and Vijay Yadav
Mediassistedge - Simplifying Diagnosis Procedure & Improving Patient Doctor Connectivity, Amiya Kumar Tripathy, Rebeck Carvalho, Ajit Puthenputhussery, Nikita Chhabhaiya, and Bijoy Anthony
Travolution - An Embedded System in Passenger Car for Road Safety, Amiya Kumar Tripathy, Sejal Chopra, Samantha Bosco, Srinidhi Shetty, and Firdos Sayyed
Voice For The Mute, Amiya Kumar Tripathy, Dipti Jadhav, Steffi A. Barreto, Daphne Rasquinha, and Sonia S. Mathew
Opinion Mining from User Reviews, Amiya Kumar Tripathy, Revathy Sundararajan, Chinmay Deshpande, Pankaj Mishra, and Neha Natarajan
A profile of prolonged, persistent SSH attack on a Kippo Based Honeynet, Craig Valli, Priya N. Rabadia, and Andrew Woodward
Key issues in mine closure planning related to pit lakes, Jerry Vandenberg, Clint Mccullough, and Devin Castendyk
An affine equivariant anamorphosis for compositional data [Conference paper], K. G. Van Den Boogaart, R. Tolosana-Delgado, and Ute Mueller
Estimation of bias with the single-zone assumption in measurement of residential air exchange using the perfluorocarbon tracer gas method, K Van Ryswyk, L. Wallace, D. Fugler, M. MacNeill, M. E. Heroux, M. D. Gibson, J. R. Guernsey, W. Kindzierski, and A. J. Wheeler
Turf-forming algal assemblages on temperate reefs are strongly influenced by the territorial herbivorous fish Parma mccullochi (Pomacentridae), Frederico Vitelli, Glenn A. Hyndes, A. Kendrick, and Aldo Turco
A stable wavelength-spacing-tunable dual-wavelength single-longitudinal-mode fiber ring laser based on a DMD filter, Tao Wang, Gang Liu, Su-Hua Zhou, Hui-Chun Yang, Bin-Bin Yan, Xiao Chen, Chong-Xiu Yu, Xin-Zhu Sang, Feng Xiao, and Kamal Alameh
Security and privacy issues for mobile health, Patricia A.H. Williams and Anthony J. Maeder
Cybersecurity Vulnerabilities in Medical Devices: A Complex Environment and Multifaceted Problem, Patricia A.H. Williams and Andrew J. Woodward
An uncomfortable change: Shifting perceptions to establish pragmatic cyber security, Andrew Woodward and Patricia A.H. Williams
Predicting the temporal response of seagrass meadows to dredging using Dynamic Bayesian Networks, P. P.-Y. Wu, K. Mengersen, K. Mcmahon, G. A. Kendrick, and M. J. Caley
Work-integrated learning: Linking research and teaching for a win-win situation, J Xia, Craig Caulfield, and S Ferns
Australia could become a leader in cybersecurity research, Alex Zelinsky, Andrew Goldsmith, Craig Valli, Jodi Steel, Liz Sonenberg, Sven Rogge, and Vijay Varadhararjan
Apply technology acceptance model with big data analytics and unity game engine, Hongye Zhong and Jitian Xiao
Design for a network centric enterprise forensic system, Hongye Zhong and Jitian Xiao
A revision of the Western Australian species of the Australian harvestman genus Nunciella (Opiliones: Triaenonychidae), Sharon Angela Zuiddam
Submissions from 2014
Geography, climate, and biodiversity: the history and future of Mediterranean-type ecosystems, David Ackerly, William D. Stock, and Jasper Slingsby
The E-book Power User in Academic and Research Libraries: Deep Log Analysis and User Customisation, Pervaiz Ahmad, Mark Brogan, and Michael N. Johnstone
Determining what characteristics constitute a darknet, Symon Aked, Christopher Bolan, and Murray Brand
A novel mobility-aware data transfer service (MADTS) based on DDS standards, Basem Al-Madani, Ayaz ul Hussan Khan, and Zubair A. Baig
Information provision and retrieval in the farming industry in Western Australia, Hasham al Musawi
Tego - A framework for adversarial planning, Daniel Ashlock and Philip Hingston
Authentication and authorisation in entrusted unions, Dhouha F. Ayed, Jan Camenisch, Tanya Ignatenko, Michael N. Johnstone, Paul Koster, Brigitta Lange, Milan Petković, Dieter Sommer, and John Zic
A Genetic Algorithm-Based Feature Selection, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen
Application of Cellular Neural Networks and Naive Bayes Classifier in Agriculture, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen
On The Application Of Genetic Probabilistic Neural Networksand Cellular Neural Networks In Precision Agriculture, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen
Zernike moments and genetic algorithm : tutorial and application, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen
A computational approach to plant leaves identification, Oluleye Hezekiah Babatunde, Leisa Armstrong, J Leng, and D Diepeveen
Securing the internet of things infrastructure – Standards and techniques, Zubair A. Baig
Countering crime in hostile environments: securing vulnerable humanitarian aid workers in Paua New Guinea, William J. Bailey
Hybrid intelligent model for software maintenance prediction, Abdulrahman Ahmed Bobakr Baqais, Mohammad Alshayeb, and Zubair A. Baig
Omnivory and opportunism characterize food webs in a large dry-tropics river system, Melanie L. Blanchette, Aaron M. Davis, Timothy D. Jardine, and Richard G. Pearson
Digitally augmenting physical spaces for personalised learning, Julie Boston, Martin Masek, Mark P. Brogan, and Chiou Peng Lam
Sustainability mining: Water for mining, and mining water, Gemma L. Broderick and Pierre Horwitz
Intrusion Detection Systems in the Protection of Assets, David J. Brooks
Corporate security and the stratum of security management, David J. Brooks and Jeffrey D. Corkill
Engineering Principles in the Protection of Assets, David J. Brooks and Clifton L. Smith
Systematics and biogeography of the Australian burrowing freshwater crayfish genus Engaewa Riekk (Decapoda: Parastacidae), Quinton Burnham
A preliminary investigation of the potential effects of the invasive Mozambique tilapia Oreochromis mossambicus on the native fish assemblages of Lake MacLeod, Western Australia, Hannah Cameron-Caluori
Changes in the abundance and distribution of the New Zealand fur seal (Arctocephalus forsteri) in Western Australia: Are they approaching carrying capacity?, Richard Campbell, David Holley, Peter Collins, and Shannon Armstrong
Volatile Memory Acquisition Tools – A Comparison Across Taint And Correctness, William Campbell
A Survey Of IPv6 Address Usage In The Public Domain Name System, Clinton R. Carpene and Andrew J. Woodward
Beyond proximity: The importance of green space useability to self-reported health, May Carter and Pierre Horwitz
Barcoding of mygalomorph spiders (Araneae:Mygalomorphae) in the Pilbara bioregion of Western Australia reveals a highly diverse biota, Mark A. Castalanelli, Roy Teale, Michael G. Rix, W J. Kennington, and Mark S. Harvey
A review of the use of ICT to support Agricultural development in India, Pallavie Chatuphale and Leisa Armstrong
Community building, multiculturalism and the suburban public library, Rajeswari Chelliah
Development of location-based services for recommending departure stations to park and ride users, Zhirong Chen, Jianhong Cecilia Xia, Buntoro Irawan, and Craig Caulfied
A survey of a personalised location-based service architecture for property hunting, Z Chen, J Xia, and C Caulfield
Locational wireless and social media-based surveillance, Maxim Chernyshev
The zombies strike back: Towards client-side BeEF detection, Maxim Chernyshev and Peter Hannay
Swan grazing on seagrass: Abundance but not grazing pressure varies over an annual cycle in a temperate estuary, Gary E. Choney, Kathryn McMahon, Paul S. Lavery, and Neil Collier
Website accessibility in Australia and the national transition strategy: Outcomes and findings, Vivienne Conway
Identity multipliers and the mistaken twittering of birds of a feather, David M. Cook
Twitter Deception And Influence: Issues Of Identity, Slacktivism, And Puppetry, David M. Cook, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, and Shaquille Abdul Rahman
Birds of a feather deceive together: The chicanery of multiplied metadata, D. M. Cook
Do Security Systems Fail Because Of Entropy?, Michael P. Coole and David J. Brooks
Plant ecophysiological diversity, Michael Cramer, Adam West, Simon Power, Robert Skelton, and William D. Stock
Numerical Study Of The Influence Of Foundation Compressibility And Reinforcement Stiffness On The Behavior Of Reinforced Soil Walls, I.P Damians, Richard Bathurst, A Josa, and A Lloret
Evolutionary approaches for feature selection in biological data, Vinh Q. Dang
Data carving using artificial headers, R. Daniel, N. L. Clarke, and F. Li
Improving pre-hospital care at mass gathering events: Applying military intelligence methodology to the St John ambulance WA event health operations, Alan James Davies
Impact of Phytophthora-dieback on birds in Banksia woodlands in south west Western Australia, Robert A. Davis, Leonie E. Valentine, Michael D. Craig, Barbara Wilson, Wesley J. Bancroft, and Marnie Mallie
Forensic memory dump analysis and recovery of the artefacts of using TOR bundle browser – The need, Divya Dayalamurthy
To eradicate feral cats, we need to know how many are out there, Tim Doherty
Ferals, strays, pets: how to control the cats that are eating our wildlife, Tim Doherty and Mike Calver
A critical review of habitat use by feral cats and key directions for future research and management, Tim S. Doherty, Andrew J. Bengsen, and Robert A. Davis
Task disengagement and implications for vigilance performance in CCTV surveillance, F M. Donald and Craig H. M. Donald
Contrasting biogeochemical cycles of cobalt in the surface western Atlantic Ocean, Gabrial Dulaquais, Marie Boye, Rob Middag, Stephanis Owens, Viene Puigcorbe, Ken Buesseler, Pere Masque´, Hein J. de Baar, and Xavier Carton
Influence of hydrological and environmental conditions on mangrove vegetation at coastal and inland semi-arid areas of the Gascoyne region, Natasha Robin Dunham
The validation of pilot malting Australia's malting facility against a commercial malthouse, Hugh Dunn, Jon Luff, Allen Tarr, Stefan Harasymow, Damien Morrison, Agnieszka Janusz, and Doug Stewart
Australian goblin spiders of the genus ischnothyreus (Araneae, Oonopidae), Karen L. Edward and Mark S. Harvey
Persistent issues in encryption software: A heuristic and cognitive walkthrough, Jad El-Abed and Patryk S. Szewczyk
Differences in predator composition alter the direction of structure-mediated predation risk in macrophyte communities, Simone Farina, Rohan Arthur, Jordi F. Pages, Patricia Prado, Javier Romero, Adriana Verges, Glenn A. Hyndes, Ken L. Heck, Sybil Glenos, and Teresa Alcoverro
Conceptualizing the project and developing a field measurement plan, James Fourqurean, Beverly Johnson, J. Boone Kauffman, Hilary Kennedy, Igino Emmer, Jennifer Howard, Emily Pidgeon, and Oscar Serrano
Field sampling of vegetative carbon pools in coastal ecosystems, James Fourqurean, Beverly Johnson, J. Boone Kauffman, Hilary Kennedy, Catherine Lovelock, Neil Saintilan, Daniel M. Alongi, Miguel Cifuentes, Margareth Copertino, Steve Crooks, Carlos Duarte, Miguel Fortes, Jennifer Howard, Andreas Hutahaean, James Kairo, Núria Marbà, Daniel Murdiyarso, Emily Pidgeon, Peter Ralph, and Oscar Serrano
Experiences Of Heat Stress Vulnerability And Climate Change Among Farmers In Ghana, Kwasi Frimpong, Jacques d. Oosthuizen, and Eddie J. Van Etten
Recent Trends In Temperature And Relative Humidity in Bawku East, Northern Ghana, Kwasi Frimpong, Jacques d. Oosthuizen, and Eddie J. Van Etten
The Extent Of Heat On Health And Sustainable Farming In Ghana - Bawku East, Kwasi Frimpong, Jacques Oosthuizen, and Eddie J. Van Etten
Is emergency management an integrated element of business continuity management? A case study with security professionals in Western Australia, Kenny Frohde and David J. Brooks
Development of on-site heavy metal analysis method and technology for selective removal of radioactive cesium from the extracts of designated waste, Y. Fujikawa, H. Ozaki, P. Wei, H. Tsuno, A. Fujinaga, S. Taniguchi, R. Takanami, Paul Lewtas, S. Sakura, and K. Fujiwara
The price of patching, Steven Furnell, Johan van Niekerk, and Nathan Clarke
ICTs for Agricultural Extension: A study in Ratnagiri district of Maharashtra, India, Niketa Gandhi and Leisa Armstrong
Applications of Expert System in Agriculture, Niketa Gandhi, Shubhangi S. Wankhede, and Leisa Armstrong
Planning for the Future: Development of Beneficial End Use From a Quarry Pit Lake, Victoria, Australia, Michael Gerner and Clinton D. Mccullough
A century of vegetation science, David W. Goodall
Identification of unknowns within a probabilistic system: The diagnostic value of attributes, D W. Goodall
Giving students an informed choice when selecting teams for group work, Yuwanuch Gulatee and Martin Masek
Molecular phylogenetic analysis of Western Australian troglobitic chthoniid pseudoscorpions (Pseudoscorpiones:Chthoniidae) points to multiple independent subterranean clades, Sophie E. Harrison, Michelle T. Guzik, Mark S. Harvey, and Andrew D. Austin
A review and redescription of the cosmopolitan pseudoscorpion Chelifer cancroides (Pseudoscorpiones: Cheliferidae), Mark S. Harvey
A new troglobitic ideoroncid pseudoscorpion (Pseudoscorpiones: Ideoroncidae) from southern Africa, Mark S. Harvey and Gerhard Du Preez
Procedures and tools for acquisition and analysis of volatile memory on android smartphones, Andri P. Heriyanto