Follow

Submissions from 2012

PDF

A Meta-Analysis of Seaweed Impacts on Seagrasses: Generalities and Knowledge Gaps, Mads Thomsen, Thomas Wernberg, Aschwin H. Engelen, Fernando Tuya, Mat A. Vanderklift, Marianne Holmer, Karen J. McGlathery, Francisco Arenas, Jonne Kotta, and Brian R. Silliman

Link

Al-Jihad Fi Sabilillah: in the Heart of Green Birds, Robyn Torok

Link

Managing the Mapuche: Security and Identity collisions in Chile, Robyn Torok

PDF

Role of food availability in the bathymetric distribution of the starfish Marthasterias glacialis (Lamk.)on reefs of northern Portugal [Efecto de la disponibilidad alimenticia sobre la distribución batimétrica de la estrella de mar Marthasterias glacialis (Lamk.) en arrecifes del norte de Portugal], Fernando Tuya and Pedro Duarte

PDF

Security awareness by online banking users in Western Australian of phishing attacks, Nattakant Utakrit

Link

An Investigation into the effect of stochastic annual rainfall on crop yields in South Western Australia, Yunous Vagh

PDF

The application of a visual data mining framework to determine soil, climate and land-use relationships, Yunous Vagh

PDF

A Data Mining Perspective of the Dual Effect of Rainfall and Temperature on Wheat Yield, Yunous Vagh and Jitian Xiao

Link

Mining temperature profile data for shire-level crop yield prediction, Yunous Vagh and Jitian Xiao

Link

Importance of topography and topsoil selection and storage in successfully rehabilitating post-closure sand mines featuring pit lakes, Eddie Van Etten, Clinton Mccullough, and Mark Lund

PDF

Diversity among Macroalgae-Consuming Fishes on Coral Reefs: A Transcontinental Comparison, Adriana Verges, Scott Bennett, and David R. Bellwood

Link

Validation of portable digital voltammeter, pdv6000+ instrument for detection of lead in rain water samples in Esperance, Western Australia, Magdelena Wajrak and P McCafferty

Link

Developing an empirical model of canopy water flux describing the common response of transpiration to solar radiation and VPD across five contrasting woodlands and forests, Rhys Whitley, Daniel Taylor, Catriona Macinnis-Ng, Melanie Zeppel, Isa Yunusa, Anthony O'Grady, Raymond Froend, Belinda Medlyn, and Derek Eamus

Link

Ecohealth: Connecting Ecology, Health and Sustainability, Bruce Wilcox, Alonso Aguirre, and Pierre Horwitz

Link

The Development of a National Approach to CDA: Successes, Challenges and Lessons Learned from Australia, Patricia Williams, Sarah Gaunt, Grahame Grieve, Vincent McCauley, and Hugh Leslie

Link

Sound Foundations: Leveraging International Standards for Australia's National Ehealth System, Patricia Williams and Vincent McCauley

PDF

Noise Tolerance for Real-time Evolutionary Learning of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, and Lyndon While

PDF

Real-Time Evolutionary Learning of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, and Lyndon While

Link

Spatial distribution of glomalin-related soil protein and its relationships with root mycorrhization, soil aggregates, carbohydrates, activity of protease and β-glucosidase in the rhizosphere of Citrus unshiu, Qiangsheng Wu, Xinhua He, YingNing Zou, KaiPing He, YaHong Sun, and MingQin Cao

Link

Arbuscular mycorrhizas alter root system architecture of Citrus tangerine through regulating metabolism of endogenous polyamines, Q S Wu, Xinhua He, Y. N. Zou, C Y Liu, Jie XIAO, and Yan Li

Link

An efficient web document clustering algorithm for building dynamic similarity profile in similarity-aware web caching, Jitian Xiao

Link

A new latex price forecasting model to reduce the risk of rubber overpopulation in Thailand, Jitian Xiao and Panida Subsorn

Link

The Blk Pathway Functions As A Tumor Suppressor In Chronic Myeloid Leukemia Stem Cells, Haojian Zhang, Cong Peng, Yiguo Hu, Huawei Li, Zhi Sheng, Yaoyu Chen, Con Sullivan, Jan Cerny, Lloyd Hutchinson, Anne Higgings, Patricia Miron, Xueqing Zhang, Michael A. Brehm, Dongguang Li, Michael R. Green, and Shaoguang Li

PDF

Scd1 plays a tumor-suppressive role in survival of leukemia stem cells and the development of chronic myeloid leukemia, H Zhang, H Li, N Ho, Dongguang Li, and Shaoguang Li

Link

Decomposition of Abies faxoniana litter varies with freeze-thaw stages and altitudes in subalpine/alpine forests of southwest China, J Zhu, Xinhua He, F Wu, Wanquin Yang, and B Tan

Submissions from 2011

Link

Antioxidant and Antimicrobial Attributes of Different Solvent Extracts from Leaves and Flowers of Akk [Calotropis Procera (Ait.) Ait. F.)], Naveed Ahmad, Farooq Anwar, Sohail Hameed, and Mary C. Boyce

Link

An investigation into darknets and the content available via anonymous peer-to-peer file sharing, Symon Aked

Link

Guidelines for the digital forensic processing of Smartphones, Khawla Abdulla Alghafli, Andrew Jones, and Thomas Martin

Link

Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk, Kim Andersson and Patryk Szewczyk

Link

A risk index model for security incident prioritisation, Nor Badrul Anuar, Steven Furnell, Maria Papadakil, and Nathan Clarke

Link

Effective ICTs in Agricultural Value Chains to Improve Food Security: An International Perspective, Leisa Armstrong, Dean Diepeveen, and Niketa Gandhi

Link

Case studies: A security science research methodology, Bill Bailey

Link

Using traffic analysis to identify The Second Generation Onion Router, John Barker, Peter Hannay, and Patryk Szewczyk

PDF

Enhancing automated red teaming with Monte Carlo Tree Search, Daniel Beard

Link

Seeing the full picture: The case for extending security ceremony analysis, Giampaolo Bella and Lizzie Coles-Kemp

Link

Assessing the relationship between fire and grazing on soil characteristics and mite communities in a semi-arid savanna of northern Australia, Stephen Beyer, Adrianne Kinnear, Lindsay Hutley, Keith McGuinness, and Karen Gibb

Link

Cooperative Multi-robot Navigation and Mapping of Unknown Terrain, Adrian Boeing, Thomas Braunl, Robert Reid, Aidan Morgan, and Kevin Vinsen

Link

A proposal for utilising active jamming for the defence of RFID systems against attack, Christopher Bolan

Link

Can we learn how systems work? , Fabio Boschetti, Pierre Yves-Hardy, Nicola Grigg, and Pierre Horwitz

Link

Organisational Resilience: Understanding and identifying the essential concepts, Bruce Braes and David Brooks

Link

Forensic Recovery and Analysis of the Artefacts of Crimeware Toolkits, Murray Brand

Link

A Threat to Cyber Resilience : A Malware Rebirthing Botnet, Murray Brand, Craig Valli, and Andrew Woodward

Link

AE2 Commander: Simulation and serious games in the online cultural heritage space, Mark Brogan and Martin Masek

Link

RIM Professionals Australasia Technology Survey 2010-Part 1, Mark Brogan and David Roberts

PDF

Security risk management: A psychometric map of expert knowledge structure, David Brooks

Link

Security risk management in the Asia Pacific region: What are security professional using?, David Brooks and Hamish Cotton

Link

Intelligent buildings: An investigation into current and emerging security vulnerabilities in automated building systems using an applied defeat methodology, David J. Brooks

Link

Organisational security: From expert knowledge construct to a body of knowledge, David J. Brooks

PDF

Quantitative approaches in climate change ecology, Christopher J. Brown, David S. Schoeman, William J. Sydeman, Keith Brander, Lauren B. Buckley, Michael Burrows, Carlos M. Duarte, Pippa J. Moore, John M. Pandolfi, Elvira Poloczanska, William Venables, and Anthony J. Richardson

Link

The pace of shifting climate in marine and terrestrial ecosystems, Michael Burrows, David Schoeman, Lauren Buckley, Pippa Moore, Elvira Poloczanska, Keith Brander, Chris Brown, John Bruno, Carlos Duarte, Benjamin Halpern, Johanna Holding, Carrie Kappel, Wolfgang Kiessling, Mary O'Connor, John Pandolfi, Camille Parmesan, Franklin Schwing, William Sydeman, and Anthony Richardson

PDF

Children's Exposure to Metals: A Community-Initiated Study, Anna Carita Callan, Matthew Winters, Caroline Barton, Mary C. Boyce, and Andrea Lee Hinwood

Link

Recent developments in privacy and healthcare: Different paths for RFID in Europe and North America?, Joseph Cannataci

PDF

Shall we play a game?, Craig Caulfield

PDF

Teaching software engineering project management-A novel approach for software engineering programs, Craig Caulfield, David Veal, and Stanislaw Maj

PDF

An investigation into the use of neural networks for the prediction of the stock exchange of Thailand, Suchira Chaigusin

Link

Looking at Clouds from Both Sides: The Advantages and Disadvantages of Placing Personal Narratives in the Cloud, Lizzie Coles-Kemp, Joseph Reddington, and Patricia H. Williams

Link

Student voices: Re-conceptualising and re-positioning Australian library and information science education for the twenty-first century, Barbara Combes, Jo Hanisch, Mary Carroll, and Hilary Hughes

Link

Website Accessibility in Australia and the Australian Government's national transition strategy, Vivienne Conway

PDF

Website Accessibility in Western Australian Public Libraries, Vivienne Conway

E-governance of the Forest: Management by Multivalence, David Cook

Link

Finance, fear, and family: issues of trust and the common ground with terrorist funding, David Cook and Timothy Smith

Link

The Battle for Money Transfers: The allure of PayPal and Western Union over Familial remittance networks, David Cook and Timothy Smith

Link

Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users, David Cook, Patryk Szewczyk, and Krishnun Sansurooah

Link

Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens, David Cook, Patryk Szewczyk, and Krishnun Sansurooah

Link

Mapping the organizational relations within physical security’s body of knowledge: a management heuristic of sound theory and best practice, Michael Coole and David Brooks

Not art, not science, but artistry: Why Professional Artistry should matter to the intelligence community, Jeffrey D. Corkill

Link

User perceptions of end user license agreements in the smartphone environment, Hamish Cotton and Christopher Bolan

PDF

An analysis and comparison of predominant word sense disambiguation algorithms, David J. Craggs

Link

Responding to Emerging Challenges: Multilateral Environmental Agreements and Highly Pathogenic Avian Influenza H5N1, Ruth Cromie, Nick Davidson, Colin Galbraith, Ward Hagemeijer, Pierre Horwitz, Rebecca Lee, Taej Mundkur, and David Stroud

Link

Incorporating Genetic Algorithm into Rough Feature Selection for High Dimensional Biomedical Data, Vinh Q. Dang, Chio- Peng Lam, and Chang Su Lee

Link

Survival and Population Size of the Frog Heleioporus Albopunctatus in a Highly Modified, Agricultural Landscape, Robert Davis and J Roberts

Link

Diversity and composition of ectomycorrhizal community on seedling roots: the role of host preference and soil origin, Qiong Ding, Yu Liang, Pierre Legendre, Xin-hua He, Ke-quan Pei, Xiao-jun Du, and Ke-ping Ma

Link

A strategy to articulate the facility management knowledge categories within the built environment, Robert Doleman and David Brooks

Systemic failures of fire protection equipment in Australian aged care nursing facilities, Robert Doleman and David Brooks

Link

Is there a core set of skills for visual analysis across different imaging technologies?, Craig H.M. Donald

Link

Individualised responses to vigilance demands and their management, Fiona M. Donald and Craig H.M. Donald

Link

Linking hydraulic conductivity and photosynthesis to water-source partitioning in trees versus seedlings, Paul L. Drake, Ray H. Froend, and Peter J. Franks

Link

Long-term pig manure application reduces the requirement of chemical phosphorus and potassium in two rice-wheat sites in subtropical China, YingHua Duan, M Xu, Xinhua He, Shuanglai Li, and X Sun

PDF

Risk-based intervention profiling in complex environments (impacted by time-restricted conditions), Joseph D. Ducie

PDF

High-dimensional Objective-based Data Farming, Zeng Fanchao, James Decraene, Malcolm Low, Wentong Cai, Suiping Zhou, and Philip F. Hingston

PDF

Model based test suite minimization using metaheuristics, Usman Farooq

Link

Visualising Forensic Data: Investigation to Court, Kenneth Fowle and Damian Schofield

PDF

Estimation of CBR Value Using Dynamic Cone Penetrometer, K S. Gill, A K. Choudhary, and S K. Shukla

Link

Factors Affecting the Distribution of Nutrients in the Tree Organs of Eucalyptus Camaldulensis in the Arid Lands of Western Australia, Hiroyuki Hamano, Noriko Saito, Yoshiko Tanaka, Shigeru Kato, Kiyotaka Tahara, Nobuhide Takahashi, Koichi Yamada, and Toshinori Kojima

PDF

Kindle Forensics: Acquisition and Analysis, Peter Hannay

Link

GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering, Peter Hannay and Gregory Baatard

Link

Red teaming with coevolution, Philip Hingston and Mike Preuss

Link

A preliminary investigation of distributed and cooperative user authentication, C Hocking, Steven Furnell, Nathan Clarke, and P Reynolds

Link

Authentication Aura - A Distributed Approach to User Authentication, C. G. Hocking, Steven Furnell, Nathan Clarke, and P. L. Reynolds

Link

Access to Inland Waters for Tourism: Ecosystem Services and Trade-offs, Pierre Horwitz and M Carter

PDF

The relationship between water, health and global environmental change, as interpreted through five key Multilateral Environmental Agreements (MEAs), Pierre Horwitz, Lucilla Spini, Kathryn Campbell, R J Thomas, and Jo Mulongoy

PDF

A new seal verification for Chinese color seal, Zhihu Huang and Jinsong Leng

PDF

Assessing practical laboratory skills in undergraduate molecular biology courses, Lynne Hunt, Annette Koenders, and Vidar Gynnild

Link

A longitudinal study of wi-fi access point security inthe Perth central business district, Emil Jacobson and Andrew Woodward

Link

Quantifying the effect of graphical password guidelines for better security, Mohd Jali and Steven Furnell

Link

Are Existing Security Models Suitable for Teleworking?, Peter James

Link

A Secure Portable Application Device to Support Network Centric Warfare, Peter James

Link

Modelling misuse cases as a means of capturing security requirements, Michael N. Johnstone

Link

Security aspects of sensor-based defence systems, Michael N. Johnstone

Link

Penetration of Zigbee-based wireless sensor networks, Michael N. Johnstone and Jeremy A. Jarvis