Submissions from 2012
Environmental influences on virus–host interactions in an Australian subtropical reservoir, Christin Sawstrom and Peter Pollard
An investigation into remote transactions, David Shaw
A review of Bennelongia De Deckker & McKenzie, 1981(Crustacea, Ostracoda) species from eastern Australia with the description of three new species, Rylan Shearn, Annette Koenders, Stuart Halse, Isa Schoen, and Koen Martens
Identification requirements and policy in alternative remittance : a measure of legislative adherence, Timothy J. Smith
Interactive effects of altered rainfall and simulated nitrogen deposition on seedling establishment in a global biodiversity hotspot, Rachel Standish, Joseph B Fontaine, R Harris, William Stock, and R Hobbs
Molecular delineation of species in the coral holobiont, Michael Stat, Andrew Baker, David Bourne, Adrienne Correa, Zac Forsman, Megan Huggett, Xavier Pochon, Derek Skillings, Robert Toonen, Madeleine van Oppen, and Ruth Gates
Dendroecological indicators of historical responses of pines to water and nutrient availability on a superficial aquifer in south-western Australia, William Stock, Lindsay Bourke, and Raymond Froend
Phylogenetic ecology of foliar N and P concentrations and N:P ratios across mediterranean-type ecosystems, William Stock and G Anthony Verboom
A case study of internet banking security of mainland Chinese banks: A customer perspective, Panida Subsorn and Sunsern Limwiriyakul
Prediction of water retention curve of a layer packed with soil particles from particle size distribution, Nobuhide Takahashi, Masataka Tsurukawa, Chikao Arai, Hiroshi Fukunaga, and Koichi Yamada
Harmful algae are not harmful to everyone, Mads Thomsen, Thibaut De Bettignies, Thomas Wernberg, M Holmer, and Bastien Debeuf
A Meta-Analysis of Seaweed Impacts on Seagrasses: Generalities and Knowledge Gaps, Mads Thomsen, Thomas Wernberg, Aschwin H. Engelen, Fernando Tuya, Mat A. Vanderklift, Marianne Holmer, Karen J. McGlathery, Francisco Arenas, Jonne Kotta, and Brian R. Silliman
Al-Jihad Fi Sabilillah: in the Heart of Green Birds, Robyn Torok
Managing the Mapuche: Security and Identity collisions in Chile, Robyn Torok
Security awareness by online banking users in Western Australian of phishing attacks, Nattakant Utakrit
An Investigation into the effect of stochastic annual rainfall on crop yields in South Western Australia, Yunous Vagh
The application of a visual data mining framework to determine soil, climate and land-use relationships, Yunous Vagh
A Data Mining Perspective of the Dual Effect of Rainfall and Temperature on Wheat Yield, Yunous Vagh and Jitian Xiao
Mining temperature profile data for shire-level crop yield prediction, Yunous Vagh and Jitian Xiao
Importance of topography and topsoil selection and storage in successfully rehabilitating post-closure sand mines featuring pit lakes, Eddie Van Etten, Clinton Mccullough, and Mark Lund
Diversity among Macroalgae-Consuming Fishes on Coral Reefs: A Transcontinental Comparison, Adriana Verges, Scott Bennett, and David R. Bellwood
Validation of portable digital voltammeter, pdv6000+ instrument for detection of lead in rain water samples in Esperance, Western Australia, Magdelena Wajrak and P McCafferty
Developing an empirical model of canopy water flux describing the common response of transpiration to solar radiation and VPD across five contrasting woodlands and forests, Rhys Whitley, Daniel Taylor, Catriona Macinnis-Ng, Melanie Zeppel, Isa Yunusa, Anthony O'Grady, Raymond Froend, Belinda Medlyn, and Derek Eamus
Ecohealth: Connecting Ecology, Health and Sustainability, Bruce Wilcox, Alonso Aguirre, and Pierre Horwitz
The Development of a National Approach to CDA: Successes, Challenges and Lessons Learned from Australia, Patricia Williams, Sarah Gaunt, Grahame Grieve, Vincent McCauley, and Hugh Leslie
Sound Foundations: Leveraging International Standards for Australia's National Ehealth System, Patricia Williams and Vincent McCauley
Noise Tolerance for Real-time Evolutionary Learning of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, and Lyndon While
Real-Time Evolutionary Learning of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, and Lyndon While
Spatial distribution of glomalin-related soil protein and its relationships with root mycorrhization, soil aggregates, carbohydrates, activity of protease and β-glucosidase in the rhizosphere of Citrus unshiu, Qiangsheng Wu, Xinhua He, YingNing Zou, KaiPing He, YaHong Sun, and MingQin Cao
Arbuscular mycorrhizas alter root system architecture of Citrus tangerine through regulating metabolism of endogenous polyamines, Q S Wu, Xinhua He, Y. N. Zou, C Y Liu, Jie XIAO, and Yan Li
A new latex price forecasting model to reduce the risk of rubber overpopulation in Thailand, Jitian Xiao and Panida Subsorn
The Blk Pathway Functions As A Tumor Suppressor In Chronic Myeloid Leukemia Stem Cells, Haojian Zhang, Cong Peng, Yiguo Hu, Huawei Li, Zhi Sheng, Yaoyu Chen, Con Sullivan, Jan Cerny, Lloyd Hutchinson, Anne Higgings, Patricia Miron, Xueqing Zhang, Michael A. Brehm, Dongguang Li, Michael R. Green, and Shaoguang Li
Scd1 plays a tumor-suppressive role in survival of leukemia stem cells and the development of chronic myeloid leukemia, H Zhang, H Li, N Ho, Dongguang Li, and Shaoguang Li
Decomposition of Abies faxoniana litter varies with freeze-thaw stages and altitudes in subalpine/alpine forests of southwest China, J Zhu, Xinhua He, F Wu, Wanquin Yang, and B Tan
Submissions from 2011
Antioxidant and Antimicrobial Attributes of Different Solvent Extracts from Leaves and Flowers of Akk [Calotropis Procera (Ait.) Ait. F.)], Naveed Ahmad, Farooq Anwar, Sohail Hameed, and Mary C. Boyce
An investigation into darknets and the content available via anonymous peer-to-peer file sharing, Symon Aked
Guidelines for the digital forensic processing of Smartphones, Khawla Abdulla Alghafli, Andrew Jones, and Thomas Martin
Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk, Kim Andersson and Patryk Szewczyk
A risk index model for security incident prioritisation, Nor Badrul Anuar, Steven Furnell, Maria Papadakil, and Nathan Clarke
Effective ICTs in Agricultural Value Chains to Improve Food Security: An International Perspective, Leisa Armstrong, Dean Diepeveen, and Niketa Gandhi
Case studies: A security science research methodology, Bill Bailey
Using traffic analysis to identify The Second Generation Onion Router, John Barker, Peter Hannay, and Patryk Szewczyk
Enhancing automated red teaming with Monte Carlo Tree Search, Daniel Beard
Seeing the full picture: The case for extending security ceremony analysis, Giampaolo Bella and Lizzie Coles-Kemp
Assessing the relationship between fire and grazing on soil characteristics and mite communities in a semi-arid savanna of northern Australia, Stephen Beyer, Adrianne Kinnear, Lindsay Hutley, Keith McGuinness, and Karen Gibb
Cooperative Multi-robot Navigation and Mapping of Unknown Terrain, Adrian Boeing, Thomas Braunl, Robert Reid, Aidan Morgan, and Kevin Vinsen
A proposal for utilising active jamming for the defence of RFID systems against attack, Christopher Bolan
Can we learn how systems work? , Fabio Boschetti, Pierre Yves-Hardy, Nicola Grigg, and Pierre Horwitz
Organisational Resilience: Understanding and identifying the essential concepts, Bruce Braes and David Brooks
Forensic Recovery and Analysis of the Artefacts of Crimeware Toolkits, Murray Brand
A Threat to Cyber Resilience : A Malware Rebirthing Botnet, Murray Brand, Craig Valli, and Andrew Woodward
AE2 Commander: Simulation and serious games in the online cultural heritage space, Mark Brogan and Martin Masek
RIM Professionals Australasia Technology Survey 2010-Part 1, Mark Brogan and David Roberts
Security risk management: A psychometric map of expert knowledge structure, David Brooks
Security risk management in the Asia Pacific region: What are security professional using?, David Brooks and Hamish Cotton
Organisational security: From expert knowledge construct to a body of knowledge, David J. Brooks
Quantitative approaches in climate change ecology, Christopher J. Brown, David S. Schoeman, William J. Sydeman, Keith Brander, Lauren B. Buckley, Michael Burrows, Carlos M. Duarte, Pippa J. Moore, John M. Pandolfi, Elvira Poloczanska, William Venables, and Anthony J. Richardson
The pace of shifting climate in marine and terrestrial ecosystems, Michael Burrows, David Schoeman, Lauren Buckley, Pippa Moore, Elvira Poloczanska, Keith Brander, Chris Brown, John Bruno, Carlos Duarte, Benjamin Halpern, Johanna Holding, Carrie Kappel, Wolfgang Kiessling, Mary O'Connor, John Pandolfi, Camille Parmesan, Franklin Schwing, William Sydeman, and Anthony Richardson
Children's Exposure to Metals: A Community-Initiated Study, Anna Carita Callan, Matthew Winters, Caroline Barton, Mary C. Boyce, and Andrea Lee Hinwood
Recent developments in privacy and healthcare: Different paths for RFID in Europe and North America?, Joseph Cannataci
Shall we play a game?, Craig Caulfield
Teaching software engineering project management-A novel approach for software engineering programs, Craig Caulfield, David Veal, and Stanislaw Maj
An investigation into the use of neural networks for the prediction of the stock exchange of Thailand, Suchira Chaigusin
Looking at Clouds from Both Sides: The Advantages and Disadvantages of Placing Personal Narratives in the Cloud, Lizzie Coles-Kemp, Joseph Reddington, and Patricia H. Williams
Student voices: Re-conceptualising and re-positioning Australian library and information science education for the twenty-first century, Barbara Combes, Jo Hanisch, Mary Carroll, and Hilary Hughes
Website Accessibility in Australia and the Australian Government's national transition strategy, Vivienne Conway
Website Accessibility in Western Australian Public Libraries, Vivienne Conway
E-governance of the Forest: Management by Multivalence, David Cook
Finance, fear, and family: issues of trust and the common ground with terrorist funding, David Cook and Timothy Smith
The Battle for Money Transfers: The allure of PayPal and Western Union over Familial remittance networks, David Cook and Timothy Smith
Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users, David Cook, Patryk Szewczyk, and Krishnun Sansurooah
Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens, David Cook, Patryk Szewczyk, and Krishnun Sansurooah
Mapping the organizational relations within physical security’s body of knowledge: a management heuristic of sound theory and best practice, Michael Coole and David Brooks
Not art, not science, but artistry: Why Professional Artistry should matter to the intelligence community, Jeffrey D. Corkill
User perceptions of end user license agreements in the smartphone environment, Hamish Cotton and Christopher Bolan
An analysis and comparison of predominant word sense disambiguation algorithms, David J. Craggs
Responding to Emerging Challenges: Multilateral Environmental Agreements and Highly Pathogenic Avian Influenza H5N1, Ruth Cromie, Nick Davidson, Colin Galbraith, Ward Hagemeijer, Pierre Horwitz, Rebecca Lee, Taej Mundkur, and David Stroud
Incorporating Genetic Algorithm into Rough Feature Selection for High Dimensional Biomedical Data, Vinh Q. Dang, Chio- Peng Lam, and Chang Su Lee
Survival and Population Size of the Frog Heleioporus Albopunctatus in a Highly Modified, Agricultural Landscape, Robert Davis and J Roberts
Diversity and composition of ectomycorrhizal community on seedling roots: the role of host preference and soil origin, Qiong Ding, Yu Liang, Pierre Legendre, Xin-hua He, Ke-quan Pei, Xiao-jun Du, and Ke-ping Ma
A strategy to articulate the facility management knowledge categories within the built environment, Robert Doleman and David Brooks
Systemic failures of fire protection equipment in Australian aged care nursing facilities, Robert Doleman and David Brooks
Is there a core set of skills for visual analysis across different imaging technologies?, Craig H.M. Donald
Individualised responses to vigilance demands and their management, Fiona M. Donald and Craig H.M. Donald
Linking hydraulic conductivity and photosynthesis to water-source partitioning in trees versus seedlings, Paul L. Drake, Ray H. Froend, and Peter J. Franks
Long-term pig manure application reduces the requirement of chemical phosphorus and potassium in two rice-wheat sites in subtropical China, YingHua Duan, M Xu, Xinhua He, Shuanglai Li, and X Sun
Risk-based intervention profiling in complex environments (impacted by time-restricted conditions), Joseph D. Ducie
High-dimensional Objective-based Data Farming, Zeng Fanchao, James Decraene, Malcolm Low, Wentong Cai, Suiping Zhou, and Philip F. Hingston
Model based test suite minimization using metaheuristics, Usman Farooq
Visualising Forensic Data: Investigation to Court, Kenneth Fowle and Damian Schofield
Estimation of CBR Value Using Dynamic Cone Penetrometer, K S. Gill, A K. Choudhary, and S K. Shukla
Factors Affecting the Distribution of Nutrients in the Tree Organs of Eucalyptus Camaldulensis in the Arid Lands of Western Australia, Hiroyuki Hamano, Noriko Saito, Yoshiko Tanaka, Shigeru Kato, Kiyotaka Tahara, Nobuhide Takahashi, Koichi Yamada, and Toshinori Kojima
Kindle Forensics: Acquisition and Analysis, Peter Hannay
GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering, Peter Hannay and Gregory Baatard
Red teaming with coevolution, Philip Hingston and Mike Preuss
A preliminary investigation of distributed and cooperative user authentication, C Hocking, Steven Furnell, Nathan Clarke, and P Reynolds
Authentication Aura - A Distributed Approach to User Authentication, C. G. Hocking, Steven Furnell, Nathan Clarke, and P. L. Reynolds