Submissions from 2012
A Meta-Analysis of Seaweed Impacts on Seagrasses: Generalities and Knowledge Gaps, Mads Thomsen, Thomas Wernberg, Aschwin H. Engelen, Fernando Tuya, Mat A. Vanderklift, Marianne Holmer, Karen J. McGlathery, Francisco Arenas, Jonne Kotta, and Brian R. Silliman
Al-Jihad Fi Sabilillah: in the Heart of Green Birds, Robyn Torok
Managing the Mapuche: Security and Identity collisions in Chile, Robyn Torok
Security awareness by online banking users in Western Australian of phishing attacks, Nattakant Utakrit
An Investigation into the effect of stochastic annual rainfall on crop yields in South Western Australia, Yunous Vagh
The application of a visual data mining framework to determine soil, climate and land-use relationships, Yunous Vagh
A Data Mining Perspective of the Dual Effect of Rainfall and Temperature on Wheat Yield, Yunous Vagh and Jitian Xiao
Mining temperature profile data for shire-level crop yield prediction, Yunous Vagh and Jitian Xiao
Importance of topography and topsoil selection and storage in successfully rehabilitating post-closure sand mines featuring pit lakes, Eddie Van Etten, Clinton Mccullough, and Mark Lund
Diversity among Macroalgae-Consuming Fishes on Coral Reefs: A Transcontinental Comparison, Adriana Verges, Scott Bennett, and David R. Bellwood
Validation of portable digital voltammeter, pdv6000+ instrument for detection of lead in rain water samples in Esperance, Western Australia, Magdelena Wajrak and P McCafferty
Developing an empirical model of canopy water flux describing the common response of transpiration to solar radiation and VPD across five contrasting woodlands and forests, Rhys Whitley, Daniel Taylor, Catriona Macinnis-Ng, Melanie Zeppel, Isa Yunusa, Anthony O'Grady, Raymond Froend, Belinda Medlyn, and Derek Eamus
Ecohealth: Connecting Ecology, Health and Sustainability, Bruce Wilcox, Alonso Aguirre, and Pierre Horwitz
The Development of a National Approach to CDA: Successes, Challenges and Lessons Learned from Australia, Patricia Williams, Sarah Gaunt, Grahame Grieve, Vincent McCauley, and Hugh Leslie
Sound Foundations: Leveraging International Standards for Australia's National Ehealth System, Patricia Williams and Vincent McCauley
Noise Tolerance for Real-time Evolutionary Learning of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, and Lyndon While
Real-Time Evolutionary Learning of Cooperative Predator-Prey Strategies, Mark Wittkamp, Luigi Barone, Philip Hingston, and Lyndon While
Spatial distribution of glomalin-related soil protein and its relationships with root mycorrhization, soil aggregates, carbohydrates, activity of protease and β-glucosidase in the rhizosphere of Citrus unshiu, Qiangsheng Wu, Xinhua He, YingNing Zou, KaiPing He, YaHong Sun, and MingQin Cao
Arbuscular mycorrhizas alter root system architecture of Citrus tangerine through regulating metabolism of endogenous polyamines, Q S Wu, Xinhua He, Y. N. Zou, C Y Liu, Jie XIAO, and Yan Li
A new latex price forecasting model to reduce the risk of rubber overpopulation in Thailand, Jitian Xiao and Panida Subsorn
The Blk Pathway Functions As A Tumor Suppressor In Chronic Myeloid Leukemia Stem Cells, Haojian Zhang, Cong Peng, Yiguo Hu, Huawei Li, Zhi Sheng, Yaoyu Chen, Con Sullivan, Jan Cerny, Lloyd Hutchinson, Anne Higgings, Patricia Miron, Xueqing Zhang, Michael A. Brehm, Dongguang Li, Michael R. Green, and Shaoguang Li
Scd1 plays a tumor-suppressive role in survival of leukemia stem cells and the development of chronic myeloid leukemia, H Zhang, H Li, N Ho, Dongguang Li, and Shaoguang Li
Decomposition of Abies faxoniana litter varies with freeze-thaw stages and altitudes in subalpine/alpine forests of southwest China, J Zhu, Xinhua He, F Wu, Wanquin Yang, and B Tan
Submissions from 2011
Antioxidant and Antimicrobial Attributes of Different Solvent Extracts from Leaves and Flowers of Akk [Calotropis Procera (Ait.) Ait. F.)], Naveed Ahmad, Farooq Anwar, Sohail Hameed, and Mary C. Boyce
An investigation into darknets and the content available via anonymous peer-to-peer file sharing, Symon Aked
Guidelines for the digital forensic processing of Smartphones, Khawla Abdulla Alghafli, Andrew Jones, and Thomas Martin
Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk, Kim Andersson and Patryk Szewczyk
A risk index model for security incident prioritisation, Nor Badrul Anuar, Steven Furnell, Maria Papadakil, and Nathan Clarke
Effective ICTs in Agricultural Value Chains to Improve Food Security: An International Perspective, Leisa Armstrong, Dean Diepeveen, and Niketa Gandhi
Case studies: A security science research methodology, Bill Bailey
Using traffic analysis to identify The Second Generation Onion Router, John Barker, Peter Hannay, and Patryk Szewczyk
Enhancing automated red teaming with Monte Carlo Tree Search, Daniel Beard
Seeing the full picture: The case for extending security ceremony analysis, Giampaolo Bella and Lizzie Coles-Kemp
Assessing the relationship between fire and grazing on soil characteristics and mite communities in a semi-arid savanna of northern Australia, Stephen Beyer, Adrianne Kinnear, Lindsay Hutley, Keith McGuinness, and Karen Gibb
Cooperative Multi-robot Navigation and Mapping of Unknown Terrain, Adrian Boeing, Thomas Braunl, Robert Reid, Aidan Morgan, and Kevin Vinsen
A proposal for utilising active jamming for the defence of RFID systems against attack, Christopher Bolan
Can we learn how systems work? , Fabio Boschetti, Pierre Yves-Hardy, Nicola Grigg, and Pierre Horwitz
Organisational Resilience: Understanding and identifying the essential concepts, Bruce Braes and David Brooks
Forensic Recovery and Analysis of the Artefacts of Crimeware Toolkits, Murray Brand
A Threat to Cyber Resilience : A Malware Rebirthing Botnet, Murray Brand, Craig Valli, and Andrew Woodward
AE2 Commander: Simulation and serious games in the online cultural heritage space, Mark Brogan and Martin Masek
RIM Professionals Australasia Technology Survey 2010-Part 1, Mark Brogan and David Roberts
Security risk management: A psychometric map of expert knowledge structure, David Brooks
Security risk management in the Asia Pacific region: What are security professional using?, David Brooks and Hamish Cotton
Organisational security: From expert knowledge construct to a body of knowledge, David J. Brooks
Quantitative approaches in climate change ecology, Christopher J. Brown, David S. Schoeman, William J. Sydeman, Keith Brander, Lauren B. Buckley, Michael Burrows, Carlos M. Duarte, Pippa J. Moore, John M. Pandolfi, Elvira Poloczanska, William Venables, and Anthony J. Richardson
The pace of shifting climate in marine and terrestrial ecosystems, Michael Burrows, David Schoeman, Lauren Buckley, Pippa Moore, Elvira Poloczanska, Keith Brander, Chris Brown, John Bruno, Carlos Duarte, Benjamin Halpern, Johanna Holding, Carrie Kappel, Wolfgang Kiessling, Mary O'Connor, John Pandolfi, Camille Parmesan, Franklin Schwing, William Sydeman, and Anthony Richardson
Children's Exposure to Metals: A Community-Initiated Study, Anna Carita Callan, Matthew Winters, Caroline Barton, Mary C. Boyce, and Andrea Lee Hinwood
Recent developments in privacy and healthcare: Different paths for RFID in Europe and North America?, Joseph Cannataci
Shall we play a game?, Craig Caulfield
Teaching software engineering project management-A novel approach for software engineering programs, Craig Caulfield, David Veal, and Stanislaw Maj
An investigation into the use of neural networks for the prediction of the stock exchange of Thailand, Suchira Chaigusin
Looking at Clouds from Both Sides: The Advantages and Disadvantages of Placing Personal Narratives in the Cloud, Lizzie Coles-Kemp, Joseph Reddington, and Patricia H. Williams
Student voices: Re-conceptualising and re-positioning Australian library and information science education for the twenty-first century, Barbara Combes, Jo Hanisch, Mary Carroll, and Hilary Hughes
Website Accessibility in Australia and the Australian Government's national transition strategy, Vivienne Conway
Website Accessibility in Western Australian Public Libraries, Vivienne Conway
E-governance of the Forest: Management by Multivalence, David Cook
Finance, fear, and family: issues of trust and the common ground with terrorist funding, David Cook and Timothy Smith
The Battle for Money Transfers: The allure of PayPal and Western Union over Familial remittance networks, David Cook and Timothy Smith
Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users, David Cook, Patryk Szewczyk, and Krishnun Sansurooah
Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens, David Cook, Patryk Szewczyk, and Krishnun Sansurooah
Mapping the organizational relations within physical security’s body of knowledge: a management heuristic of sound theory and best practice, Michael Coole and David Brooks
Not art, not science, but artistry: Why Professional Artistry should matter to the intelligence community, Jeffrey D. Corkill
User perceptions of end user license agreements in the smartphone environment, Hamish Cotton and Christopher Bolan
An analysis and comparison of predominant word sense disambiguation algorithms, David J. Craggs
Responding to Emerging Challenges: Multilateral Environmental Agreements and Highly Pathogenic Avian Influenza H5N1, Ruth Cromie, Nick Davidson, Colin Galbraith, Ward Hagemeijer, Pierre Horwitz, Rebecca Lee, Taej Mundkur, and David Stroud
Incorporating Genetic Algorithm into Rough Feature Selection for High Dimensional Biomedical Data, Vinh Q. Dang, Chio- Peng Lam, and Chang Su Lee
Survival and Population Size of the Frog Heleioporus Albopunctatus in a Highly Modified, Agricultural Landscape, Robert Davis and J Roberts
Diversity and composition of ectomycorrhizal community on seedling roots: the role of host preference and soil origin, Qiong Ding, Yu Liang, Pierre Legendre, Xin-hua He, Ke-quan Pei, Xiao-jun Du, and Ke-ping Ma
A strategy to articulate the facility management knowledge categories within the built environment, Robert Doleman and David Brooks
Systemic failures of fire protection equipment in Australian aged care nursing facilities, Robert Doleman and David Brooks
Is there a core set of skills for visual analysis across different imaging technologies?, Craig H.M. Donald
Individualised responses to vigilance demands and their management, Fiona M. Donald and Craig H.M. Donald
Linking hydraulic conductivity and photosynthesis to water-source partitioning in trees versus seedlings, Paul L. Drake, Ray H. Froend, and Peter J. Franks
Long-term pig manure application reduces the requirement of chemical phosphorus and potassium in two rice-wheat sites in subtropical China, YingHua Duan, M Xu, Xinhua He, Shuanglai Li, and X Sun
Risk-based intervention profiling in complex environments (impacted by time-restricted conditions), Joseph D. Ducie
High-dimensional Objective-based Data Farming, Zeng Fanchao, James Decraene, Malcolm Low, Wentong Cai, Suiping Zhou, and Philip F. Hingston
Model based test suite minimization using metaheuristics, Usman Farooq
Visualising Forensic Data: Investigation to Court, Kenneth Fowle and Damian Schofield
Estimation of CBR Value Using Dynamic Cone Penetrometer, K S. Gill, A K. Choudhary, and S K. Shukla
Factors Affecting the Distribution of Nutrients in the Tree Organs of Eucalyptus Camaldulensis in the Arid Lands of Western Australia, Hiroyuki Hamano, Noriko Saito, Yoshiko Tanaka, Shigeru Kato, Kiyotaka Tahara, Nobuhide Takahashi, Koichi Yamada, and Toshinori Kojima
Kindle Forensics: Acquisition and Analysis, Peter Hannay
GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering, Peter Hannay and Gregory Baatard
Red teaming with coevolution, Philip Hingston and Mike Preuss
A preliminary investigation of distributed and cooperative user authentication, C Hocking, Steven Furnell, Nathan Clarke, and P Reynolds
Authentication Aura - A Distributed Approach to User Authentication, C. G. Hocking, Steven Furnell, Nathan Clarke, and P. L. Reynolds
Access to Inland Waters for Tourism: Ecosystem Services and Trade-offs, Pierre Horwitz and M Carter
The relationship between water, health and global environmental change, as interpreted through five key Multilateral Environmental Agreements (MEAs), Pierre Horwitz, Lucilla Spini, Kathryn Campbell, R J Thomas, and Jo Mulongoy
A new seal verification for Chinese color seal, Zhihu Huang and Jinsong Leng
Assessing practical laboratory skills in undergraduate molecular biology courses, Lynne Hunt, Annette Koenders, and Vidar Gynnild
A longitudinal study of wi-fi access point security inthe Perth central business district, Emil Jacobson and Andrew Woodward
Quantifying the effect of graphical password guidelines for better security, Mohd Jali and Steven Furnell
Are Existing Security Models Suitable for Teleworking?, Peter James
A Secure Portable Application Device to Support Network Centric Warfare, Peter James
Modelling misuse cases as a means of capturing security requirements, Michael N. Johnstone
Security aspects of sensor-based defence systems, Michael N. Johnstone
Penetration of Zigbee-based wireless sensor networks, Michael N. Johnstone and Jeremy A. Jarvis