Follow

Submissions from 2011

Link

Case studies: A security science research methodology, Bill Bailey

Link

Using traffic analysis to identify The Second Generation Onion Router, John Barker, Peter Hannay, and Patryk Szewczyk

PDF

Enhancing automated red teaming with Monte Carlo Tree Search, Daniel Beard

Link

Seeing the full picture: The case for extending security ceremony analysis, Giampaolo Bella and Lizzie Coles-Kemp

Link

Assessing the relationship between fire and grazing on soil characteristics and mite communities in a semi-arid savanna of northern Australia, Stephen Beyer, Adrianne Kinnear, Lindsay Hutley, Keith McGuinness, and Karen Gibb

Link

Cooperative Multi-robot Navigation and Mapping of Unknown Terrain, Adrian Boeing, Thomas Braunl, Robert Reid, Aidan Morgan, and Kevin Vinsen

Link

A proposal for utilising active jamming for the defence of RFID systems against attack, Christopher Bolan

Link

Can we learn how systems work? , Fabio Boschetti, Pierre Yves-Hardy, Nicola Grigg, and Pierre Horwitz

Link

Organisational Resilience: Understanding and identifying the essential concepts, Bruce Braes and David Brooks

Link

Forensic Recovery and Analysis of the Artefacts of Crimeware Toolkits, Murray Brand

Link

A Threat to Cyber Resilience : A Malware Rebirthing Botnet, Murray Brand, Craig Valli, and Andrew Woodward

Link

AE2 Commander: Simulation and serious games in the online cultural heritage space, Mark Brogan and Martin Masek

Link

RIM Professionals Australasia Technology Survey 2010-Part 1, Mark Brogan and David Roberts

PDF

Security risk management: A psychometric map of expert knowledge structure, David Brooks

Link

Security risk management in the Asia Pacific region: What are security professional using?, David Brooks and Hamish Cotton

Link

Intelligent buildings: An investigation into current and emerging security vulnerabilities in automated building systems using an applied defeat methodology, David J. Brooks

Link

Organisational security: From expert knowledge construct to a body of knowledge, David J. Brooks

PDF

Quantitative approaches in climate change ecology, Christopher J. Brown, David S. Schoeman, William J. Sydeman, Keith Brander, Lauren B. Buckley, Michael Burrows, Carlos M. Duarte, Pippa J. Moore, John M. Pandolfi, Elvira Poloczanska, William Venables, and Anthony J. Richardson

Link

The pace of shifting climate in marine and terrestrial ecosystems, Michael Burrows, David Schoeman, Lauren Buckley, Pippa Moore, Elvira Poloczanska, Keith Brander, Chris Brown, John Bruno, Carlos Duarte, Benjamin Halpern, Johanna Holding, Carrie Kappel, Wolfgang Kiessling, Mary O'Connor, John Pandolfi, Camille Parmesan, Franklin Schwing, William Sydeman, and Anthony Richardson

PDF

Children's Exposure to Metals: A Community-Initiated Study, Anna Carita Callan, Matthew Winters, Caroline Barton, Mary C. Boyce, and Andrea Lee Hinwood

Link

Recent developments in privacy and healthcare: Different paths for RFID in Europe and North America?, Joseph Cannataci

PDF

Shall we play a game?, Craig Caulfield

PDF

Teaching software engineering project management-A novel approach for software engineering programs, Craig Caulfield, David Veal, and Stanislaw Maj

PDF

An investigation into the use of neural networks for the prediction of the stock exchange of Thailand, Suchira Chaigusin

Link

Looking at Clouds from Both Sides: The Advantages and Disadvantages of Placing Personal Narratives in the Cloud, Lizzie Coles-Kemp, Joseph Reddington, and Patricia H. Williams

Link

Student voices: Re-conceptualising and re-positioning Australian library and information science education for the twenty-first century, Barbara Combes, Jo Hanisch, Mary Carroll, and Hilary Hughes

Link

Website Accessibility in Australia and the Australian Government's national transition strategy, Vivienne Conway

PDF

Website Accessibility in Western Australian Public Libraries, Vivienne Conway

E-governance of the Forest: Management by Multivalence, David Cook

Link

Finance, fear, and family: issues of trust and the common ground with terrorist funding, David Cook and Timothy Smith

Link

The Battle for Money Transfers: The allure of PayPal and Western Union over Familial remittance networks, David Cook and Timothy Smith

Link

Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users, David Cook, Patryk Szewczyk, and Krishnun Sansurooah

Link

Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens, David Cook, Patryk Szewczyk, and Krishnun Sansurooah

Link

Mapping the organizational relations within physical security’s body of knowledge: a management heuristic of sound theory and best practice, Michael Coole and David Brooks

Not art, not science, but artistry: Why Professional Artistry should matter to the intelligence community, Jeffrey D. Corkill

Link

User perceptions of end user license agreements in the smartphone environment, Hamish Cotton and Christopher Bolan

PDF

An analysis and comparison of predominant word sense disambiguation algorithms, David J. Craggs

Link

Responding to Emerging Challenges: Multilateral Environmental Agreements and Highly Pathogenic Avian Influenza H5N1, Ruth Cromie, Nick Davidson, Colin Galbraith, Ward Hagemeijer, Pierre Horwitz, Rebecca Lee, Taej Mundkur, and David Stroud

Link

Incorporating Genetic Algorithm into Rough Feature Selection for High Dimensional Biomedical Data, Vinh Q. Dang, Chio- Peng Lam, and Chang Su Lee

Link

Survival and Population Size of the Frog Heleioporus Albopunctatus in a Highly Modified, Agricultural Landscape, Robert Davis and J Roberts

Link

Diversity and composition of ectomycorrhizal community on seedling roots: the role of host preference and soil origin, Qiong Ding, Yu Liang, Pierre Legendre, Xin-hua He, Ke-quan Pei, Xiao-jun Du, and Ke-ping Ma

Link

A strategy to articulate the facility management knowledge categories within the built environment, Robert Doleman and David Brooks

Systemic failures of fire protection equipment in Australian aged care nursing facilities, Robert Doleman and David Brooks

Link

Is there a core set of skills for visual analysis across different imaging technologies?, Craig H.M. Donald

Link

Individualised responses to vigilance demands and their management, Fiona M. Donald and Craig H.M. Donald

Link

Linking hydraulic conductivity and photosynthesis to water-source partitioning in trees versus seedlings, Paul L. Drake, Ray H. Froend, and Peter J. Franks

Link

Long-term pig manure application reduces the requirement of chemical phosphorus and potassium in two rice-wheat sites in subtropical China, YingHua Duan, M Xu, Xinhua He, Shuanglai Li, and X Sun

PDF

Risk-based intervention profiling in complex environments (impacted by time-restricted conditions), Joseph D. Ducie

PDF

High-dimensional Objective-based Data Farming, Zeng Fanchao, James Decraene, Malcolm Low, Wentong Cai, Suiping Zhou, and Philip F. Hingston

PDF

Model based test suite minimization using metaheuristics, Usman Farooq

Link

Visualising Forensic Data: Investigation to Court, Kenneth Fowle and Damian Schofield

PDF

Estimation of CBR Value Using Dynamic Cone Penetrometer, K S. Gill, A K. Choudhary, and S K. Shukla

Link

Factors Affecting the Distribution of Nutrients in the Tree Organs of Eucalyptus Camaldulensis in the Arid Lands of Western Australia, Hiroyuki Hamano, Noriko Saito, Yoshiko Tanaka, Shigeru Kato, Kiyotaka Tahara, Nobuhide Takahashi, Koichi Yamada, and Toshinori Kojima

PDF

Kindle Forensics: Acquisition and Analysis, Peter Hannay

Link

GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering, Peter Hannay and Gregory Baatard

Link

Red teaming with coevolution, Philip Hingston and Mike Preuss

Link

A preliminary investigation of distributed and cooperative user authentication, C Hocking, Steven Furnell, Nathan Clarke, and P Reynolds

Link

Authentication Aura - A Distributed Approach to User Authentication, C. G. Hocking, Steven Furnell, Nathan Clarke, and P. L. Reynolds

Link

Access to Inland Waters for Tourism: Ecosystem Services and Trade-offs, Pierre Horwitz and M Carter

PDF

The relationship between water, health and global environmental change, as interpreted through five key Multilateral Environmental Agreements (MEAs), Pierre Horwitz, Lucilla Spini, Kathryn Campbell, R J Thomas, and Jo Mulongoy

PDF

A new seal verification for Chinese color seal, Zhihu Huang and Jinsong Leng

PDF

Assessing practical laboratory skills in undergraduate molecular biology courses, Lynne Hunt, Annette Koenders, and Vidar Gynnild

Link

A longitudinal study of wi-fi access point security inthe Perth central business district, Emil Jacobson and Andrew Woodward

Link

Quantifying the effect of graphical password guidelines for better security, Mohd Jali and Steven Furnell

Link

Are Existing Security Models Suitable for Teleworking?, Peter James

Link

A Secure Portable Application Device to Support Network Centric Warfare, Peter James

Link

Modelling misuse cases as a means of capturing security requirements, Michael N. Johnstone

Link

Security aspects of sensor-based defence systems, Michael N. Johnstone

Link

Penetration of Zigbee-based wireless sensor networks, Michael N. Johnstone and Jeremy A. Jarvis

Regulator Guidance and Legislation Relevant to Pit Lakes, Hugh Jones and Clinton Mccullough

Link

Sequential anaerobic-aerobic treatment of azo dyes: Decolourisation and amine degradability, M. Jonstrup, Naresh K. Radhakrishnan, M. Murto, and B. Mattiasson

Link

Information evaluation: How one group of intelligence analysts go about the task, John Joseph and Jeff Corkill

Link

Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework, Mahmoud Khonji, Y Iraqi, and Andrew Jones

Link

Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

Link

Lexical URL analysis for discriminating phishing and legitimate websites, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones

Link

A study of feature subset evaluators and feature subset searching methods for phishing classification, Mahmoud Khonji, Andrew Jones, and Youssef Iraqi

Link

Forces that structure plant communities: quantifying the importance of the mycorrhizal symbiosis, J. Klironomos, M. Zobel, M. Tibbett, William D. Stock, M.C. Rillig, J.L. Parrent, M. Moora, A.M. Koch, J.M. Facelli, E. Facelli, I.A. Dickie, and J.D. Bever

Link

Considering Complexity Theory in Understanding Information Management in Health Systems, Shirlee-ann Knight

Link

Information Management in Health Systems: Considering an Organic Approach, Shirlee-ann Knight

PDF

The Combined Conceptual Life Cycle Model of Information Quality in User Perceptions of IQ On The Web, Shirlee-ann Knight

Link

The combined conceptual life-cycle model of information quality: Part 1, an investigative framework, Shirlee-ann Knight

PDF

A Preliminary Introduction to the OTAM: Exploring Users’ Perceptions of their on-going Interaction with Adopted Technologies, Shirlee-ann Knight and Janice M. Burn

PDF

Alarm management: Mining for groups of co-occuring alarm tags, Savo Kordic

Link

Assessing wetland ecosystem services and poverty interlinkages: A general framework and case study, Ritesh Kumar, Pierre Horwitz, G. Randy Milton, Sonali Sellamuttu, Sebastian Buckton, Nick Davidson, Ajit Pattnaik, Monica Zavagli, and Chris Baker

Link

Risk assessment for mobile devices, Thomas Ledermuller and Nathan L. Clarke

Link

A Rough-fuzzy Hybrid Approach on a Neuro-Fuzzy Classifier for High Dimensional Data, Chang Su Lee

Link

Feature Reduction using a GA-Rough Hybrid Approach on Bio-medical data, Chang Su Lee

Link

Rough-fuzzy Hybrid Approach for Identification of Bio-Markers and Classification on Alzheimer's Disease Data, ChangSu Lee, Chiou-Peng Lam, and Martin Masek

Link

A rapid quantitative determination of phenolic acids in Brassica oleracea by capillary zone electrophoresis, Iris Lee, Mary Boyce, and Michael Breadmore

PDF

Reinforcement learning of competitive and cooperative skills in soccer agents, Jinsong Leng and Chee Lim

Link

Outliers Detection with Correlated Subspaces for High Dimensional Datasets, Jinsong T. Leng and Zhihu Huang

Link

An Exploration of 1st and 2nd Generation CPTED for End of Year School Leavers at Rottnest Island, John Letch, Ellice Mcglinn, Jonathan Bell, Emma Downing, and David Cook

Link

Long-term combined application of manure and NPK fertilizers influenced nitrogen retention and stabilization of organic C in Loess soil, Bin Liang, Xueyun Yang, Xinhua He, Daniel Murphy, and Jianbin Zhou

Link

Effects of 17-year Fertilization on Soil Microbial Biomass C and N and Soluble Organic C and N in Loessial Soil During Maize Growth, Bin Liang, Xueyun Yang, Xinhua He, and Jianbin Zhou

PDF

Behaviour Profiling for Transparent Authentication for Mobile Devices, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

Misuse detection for mobile devices using behaviour profiling, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland

Link

Engineering design of strategies for winning iterated prisoner's dilemma competitions, Jiawei Li, Philip Hingston, and Graham Kendall

Link

Nitrite, Sodium Nitroprusside, Potassium Ferricyanide and Hydrogen Peroxide Release Dormancy of Amaranthus Retroflexus Seeds in a Nitric Oxide-Dependent Manner, Xuanyu Liu, Zhijun Deng, Hongyan Cheng, Xinhua He, and Songquan Song

Link

Rapid Change of AM Fungal Community in a Rain-Fed Wheat Field With Short-Term Plastic Film Mulching Practice, Yongjun Liu, Lin Mao, Xinhua He, Gang Cheng, Xiaojun Ma, Lizhe An, and Huyuan Feng

Link

Meeting Environmental Goals for Pit Lake Restoration - Factoring in the Biology, Mark A. Lund and Clint D. McCullough