Submissions from 2015
Sicariomorpha, a new myrmecophilous goblin spider genus (Araneae, Oonopidae) associated with Asian army ants, Ricardo Ott, Christoph Von Beeren, Rosli Hashim, Volker Witte, and Mark S. Harvey
Joint movement similarities for robust 3D action recognition using skeletal data, H. Pazhoumand-Dar, C.-P. Lam, and M. Masek
A novel fuzzy based home occupant monitoring system using kinect cameras, Hossein Pazhoumand-Dar, Chiou-Peng Lam, and Martin Masek
Evolving cellular automata for maze generation, Andrew Pech, Philip Hingston, Martin Masek, and Chiou P. Lam
Climate-adjusted provenancing: A strategy for climate-resilient ecological restoration, Suzanne M. Prober, Margaret Byrne, Elizabeth H. McLean, Dorothy A. Steane, Brad M. Potts, Rene E. Vaillancourt, and William D. Stock
Small phytoplankton drive high summertime carbon and nutrient export in the Gulf of California and Eastern Tropical North Pacific, V. Puigcorbe, C.R. Benitez-nelson, P. Masque, E. Verdeny, A.E. White, B.N. Popp, F.G. Prahl, and P.J. Lam
Increasing sediment accumulation rates in La Fonera (Palamós) submarine canyon axis and their relationship with bottom trawling activities, P. Puig, J. Martin, P. Masque, and A. Palanques
Intelligent network intrusion detection using an evolutionary computation approach, Samaneh Rastegari
Evolving statistical rulesets for network intrusion detection, Samaneh Rastegari, Philip F. Hingston, and Chiou Peng Lam
A Statistical Rule Learning Approach to Network Intrusion Detection. Paper presented at the IT Convergence and Security (ICITCS), Samaneh Rastegari, Chiou-Peng P. Lam, and Philip F. Hingston
Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems, H. Read, I. Sunderland, K. Xynos, and F. Roarson
Failure of science, death of nature, H.F. Recher
Multiple Drivers of Decline In The Global Status Of Freshwater Crayfish (Decapoda: Astacidea), Nadia I. Richman, Monika Bohm, Susan Adams, Fernando Alvarez, Elizabeth A. Bergey, John J.S. Bunn, Quinton Burnham, Jay Cordeiro, Jason Coughran, Keith A. Crandall, Kathryn L. Dawkins, Robert J. DiStefano, Niall E. Doran, Lennart Edsman, Arnold G. Eversole, Leopold Fureder, James M. Furse, Francessa Gherardi, Premek Hamr, David M. Holdich, Pierre Horwitz, Kerrylyn Johnston, Clive M. Jones, Julia P.G. Jones, Robert L. Jones, Thomas G. Jones, Tadashi Kawai, Susan Lawler, Marilu Lopez-Mejia, Rebecca M. Miller, Carlos Pedraza-Lara, Julian D. Reynolds, Alastair M.M. Richardson, Mark B. Schiltz, Guenter A. Schuster, Peter J. Sibley, Catherine Souty-Grosset, Christopher A. Taylor, Roger F. Thoma, Jerry Walls, Todd S. Walsh, and Ben Collen
Development of an in-field voltammetric method for the determination of barium, Samantha N. Ridgway
Submarine groundwater discharge as a major source of nutrients to the Mediterranean Sea, Valenti Rodellas, Jordi Garcia-Orellana, Pere Masque, Mor Feldman, and Yishai Weinstein
The influence of sediment sources on radium-derived estimates of Submarine Groundwater Discharge, Valentí Rodellas, Jordi Garcia-Orellana, Pere Masqué, and Joan S. Font-Muñoz
Continuous user authentication using multi-modal biometrics, Hataichanok Saevanee, Nathan Clarke, Steven Furnell, and Valerio Biscione
A forensics framework and method in the acquisition and extraction of data from NAND Flash memory storage chip, Krishnun Sansurooah
Nano-engineered flexible pH sensor for point-of-care urease detection, A Sardarinejad, Devendra Maurya, C Y. Tay, B Y. Marshall, and Kamal Alameh
An automated detection process to detect ovarian tissues using type P63 digitized color images, TM Shahriar Sazzad, Leisa Armstrong, and Amiya K. Tripathy
Evolution, systematics & geographic parthenogenesis of Ilyodromus (Crustacea, Ostracoda), Rylan James Shearn
Collective Rituals as Meaningful Expressions of the Relationships between People, Water and Forest: A Case Study from Northern Thailand, Katesuda Sitthisuntikul and Pierre Horowitz
Genome-wide scans reveal cryptic population structure in a dry-adapted eucalypt, Dorothy A. Steane, Brad M. Potts, Elizabeth McLean, Lesley Collins, Suzanne M. Prober, William D. Stock, Rene E. Vaillancourt, and Margaret Byrne
The Geneva Conventions and Cyber-Warfare: A Technical Approach, Iain Sutherland, Konstantinos Xynos, Andrew Jones, and Andrew Blyth
An Investigation into factors inhibiting Australian end-users from utilising ADSL Router security effectively, Patryk Szewczyk
Your broadband router is not as secure as you think it is, Patryk Szewczyk and Nikolai Hampton
The Canadian Healthy Infant Longitudinal Development (CHILD) birth cohort study: Assessment of environmental exposures, Tim K. Takaro, James A. Scott, Ryan W. Allen, Sonia S. Anand, Allan B. Becker, A. Dean Befus, Michael Brauer, Joanne Duncan, Diana L. Lefebvre, Wendy Lou, Piush J. Mandhane, Kathleen E. McLean, Gregory Miller, Hind Sbihi, Huan Shu, Padmaja Subbarao, Stuart E. Turvey, Amanda J. Wheeler, Leilei Zeng, Malcolm R. Sears, and Jeffrey R. Brook
A combination of meteorological and satellite-based drought indices in a better drought assessment and forecasting in Northeast Thailand, Watinee Thavorntam, Netnapid Tantemsapya, and Leisa Armstrong
Formation of the radical self: Constructs of change in western youth to acts of terrorism on home-soil, Robyn Torok
How are Western youth conditioned to commit terrorist acts?, Robyn Torok
How social media was key to Islamic State’s attacks on Paris, Robyn Torok
Institutionalised moral reframing: A research based model on Islamic radicalisation on social media, Robyn Torok
Symbiotic radicalisation strategies: Propaganda tools and neuro linguistic programming, Robyn Torok
Terror group’s social media ploy edges out rivals, wins recruits, Robyn Torok
Terrorists use marketing skills to attract new recruits online, Robyn Torok
Mobile Based Healthcare Management Using Artificial Intelligence, Amiya Kumar Tripathy, Rebeck Carvalho, Keshav Pawaskar, Suraj Yadav, and Vijay Yadav
Mediassistedge - Simplifying Diagnosis Procedure & Improving Patient Doctor Connectivity, Amiya Kumar Tripathy, Rebeck Carvalho, Ajit Puthenputhussery, Nikita Chhabhaiya, and Bijoy Anthony
Travolution - An Embedded System in Passenger Car for Road Safety, Amiya Kumar Tripathy, Sejal Chopra, Samantha Bosco, Srinidhi Shetty, and Firdos Sayyed
Voice For The Mute, Amiya Kumar Tripathy, Dipti Jadhav, Steffi A. Barreto, Daphne Rasquinha, and Sonia S. Mathew
Opinion Mining from User Reviews, Amiya Kumar Tripathy, Revathy Sundararajan, Chinmay Deshpande, Pankaj Mishra, and Neha Natarajan
A profile of prolonged, persistent SSH attack on a Kippo Based Honeynet, Craig Valli, Priya N. Rabadia, and Andrew Woodward
Key issues in mine closure planning related to pit lakes, Jerry Vandenberg, Clint Mccullough, and Devin Castendyk
An affine equivariant anamorphosis for compositional data [Conference paper], K. G. Van Den Boogaart, R. Tolosana-Delgado, and Ute Mueller
Estimation of bias with the single-zone assumption in measurement of residential air exchange using the perfluorocarbon tracer gas method, K Van Ryswyk, L. Wallace, D. Fugler, M. MacNeill, M. E. Heroux, M. D. Gibson, J. R. Guernsey, W. Kindzierski, and A. J. Wheeler
Turf-forming algal assemblages on temperate reefs are strongly influenced by the territorial herbivorous fish Parma mccullochi (Pomacentridae), Frederico Vitelli, Glenn A. Hyndes, A. Kendrick, and Aldo Turco
A stable wavelength-spacing-tunable dual-wavelength single-longitudinal-mode fiber ring laser based on a DMD filter, Tao Wang, Gang Liu, Su-Hua Zhou, Hui-Chun Yang, Bin-Bin Yan, Xiao Chen, Chong-Xiu Yu, Xin-Zhu Sang, Feng Xiao, and Kamal Alameh
Security and privacy issues for mobile health, Patricia A.H. Williams and Anthony J. Maeder
Cybersecurity Vulnerabilities in Medical Devices: A Complex Environment and Multifaceted Problem, Patricia A.H. Williams and Andrew J. Woodward
An uncomfortable change: Shifting perceptions to establish pragmatic cyber security, Andrew Woodward and Patricia A.H. Williams
Predicting the temporal response of seagrass meadows to dredging using Dynamic Bayesian Networks, P. P.-Y. Wu, K. Mengersen, K. Mcmahon, G. A. Kendrick, and M. J. Caley
Work-integrated learning: Linking research and teaching for a win-win situation, J Xia, Craig Caulfield, and S Ferns
Australia could become a leader in cybersecurity research, Alex Zelinsky, Andrew Goldsmith, Craig Valli, Jodi Steel, Liz Sonenberg, Sven Rogge, and Vijay Varadhararjan
Apply technology acceptance model with big data analytics and unity game engine, Hongye Zhong and Jitian Xiao
Design for a network centric enterprise forensic system, Hongye Zhong and Jitian Xiao
A revision of the Western Australian species of the Australian harvestman genus Nunciella (Opiliones: Triaenonychidae), Sharon Angela Zuiddam
Submissions from 2014
Geography, climate, and biodiversity: the history and future of Mediterranean-type ecosystems, David Ackerly, William D. Stock, and Jasper Slingsby
The E-book Power User in Academic and Research Libraries: Deep Log Analysis and User Customisation, Pervaiz Ahmad, Mark Brogan, and Michael N. Johnstone
Determining what characteristics constitute a darknet, Symon Aked, Christopher Bolan, and Murray Brand
A novel mobility-aware data transfer service (MADTS) based on DDS standards, Basem Al-Madani, Ayaz ul Hussan Khan, and Zubair A. Baig
Information provision and retrieval in the farming industry in Western Australia, Hasham al Musawi
Tego - A framework for adversarial planning, Daniel Ashlock and Philip Hingston
Authentication and authorisation in entrusted unions, Dhouha F. Ayed, Jan Camenisch, Tanya Ignatenko, Michael N. Johnstone, Paul Koster, Brigitta Lange, Milan Petković, Dieter Sommer, and John Zic
A Genetic Algorithm-Based Feature Selection, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen
Application of Cellular Neural Networks and Naive Bayes Classifier in Agriculture, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen
On The Application Of Genetic Probabilistic Neural Networksand Cellular Neural Networks In Precision Agriculture, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen
Zernike moments and genetic algorithm : tutorial and application, Oluleye H. Babatunde, Leisa Armstrong, Jinsong Leng, and Dean Diepeveen
A computational approach to plant leaves identification, Oluleye Hezekiah Babatunde, Leisa Armstrong, J Leng, and D Diepeveen
Securing the internet of things infrastructure – Standards and techniques, Zubair A. Baig
Countering crime in hostile environments: securing vulnerable humanitarian aid workers in Paua New Guinea, William J. Bailey
Hybrid intelligent model for software maintenance prediction, Abdulrahman Ahmed Bobakr Baqais, Mohammad Alshayeb, and Zubair A. Baig
Omnivory and opportunism characterize food webs in a large dry-tropics river system, Melanie L. Blanchette, Aaron M. Davis, Timothy D. Jardine, and Richard G. Pearson
Digitally augmenting physical spaces for personalised learning, Julie Boston, Martin Masek, Mark P. Brogan, and Chiou Peng Lam
Sustainability mining: Water for mining, and mining water, Gemma L. Broderick and Pierre Horwitz
Intrusion Detection Systems in the Protection of Assets, David J. Brooks
Corporate security and the stratum of security management, David J. Brooks and Jeffrey D. Corkill
Engineering Principles in the Protection of Assets, David J. Brooks and Clifton L. Smith
Systematics and biogeography of the Australian burrowing freshwater crayfish genus Engaewa Riekk (Decapoda: Parastacidae), Quinton Burnham
A preliminary investigation of the potential effects of the invasive Mozambique tilapia Oreochromis mossambicus on the native fish assemblages of Lake MacLeod, Western Australia, Hannah Cameron-Caluori
Changes in the abundance and distribution of the New Zealand fur seal (Arctocephalus forsteri) in Western Australia: Are they approaching carrying capacity?, Richard Campbell, David Holley, Peter Collins, and Shannon Armstrong
Volatile Memory Acquisition Tools – A Comparison Across Taint And Correctness, William Campbell
A Survey Of IPv6 Address Usage In The Public Domain Name System, Clinton R. Carpene and Andrew J. Woodward
Beyond proximity: The importance of green space useability to self-reported health, May Carter and Pierre Horwitz
Barcoding of mygalomorph spiders (Araneae:Mygalomorphae) in the Pilbara bioregion of Western Australia reveals a highly diverse biota, Mark A. Castalanelli, Roy Teale, Michael G. Rix, W J. Kennington, and Mark S. Harvey
A review of the use of ICT to support Agricultural development in India, Pallavie Chatuphale and Leisa Armstrong
Community building, multiculturalism and the suburban public library, Rajeswari Chelliah
Development of location-based services for recommending departure stations to park and ride users, Zhirong Chen, Jianhong Cecilia Xia, Buntoro Irawan, and Craig Caulfied
A survey of a personalised location-based service architecture for property hunting, Z Chen, J Xia, and C Caulfield
Locational wireless and social media-based surveillance, Maxim Chernyshev
The zombies strike back: Towards client-side BeEF detection, Maxim Chernyshev and Peter Hannay
Swan grazing on seagrass: Abundance but not grazing pressure varies over an annual cycle in a temperate estuary, Gary E. Choney, Kathryn McMahon, Paul S. Lavery, and Neil Collier
Website accessibility in Australia and the national transition strategy: Outcomes and findings, Vivienne Conway
Identity multipliers and the mistaken twittering of birds of a feather, David M. Cook
Twitter Deception And Influence: Issues Of Identity, Slacktivism, And Puppetry, David M. Cook, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, and Shaquille Abdul Rahman
Birds of a feather deceive together: The chicanery of multiplied metadata, D. M. Cook
Do Security Systems Fail Because Of Entropy?, Michael P. Coole and David J. Brooks
Plant ecophysiological diversity, Michael Cramer, Adam West, Simon Power, Robert Skelton, and William D. Stock
Numerical Study Of The Influence Of Foundation Compressibility And Reinforcement Stiffness On The Behavior Of Reinforced Soil Walls, I.P Damians, Richard Bathurst, A Josa, and A Lloret
Evolutionary approaches for feature selection in biological data, Vinh Q. Dang