Follow

Submissions from 2011

Link

Habitat surrounding patch reefs influences the diet and nutrition of the western rock lobster, Lachlan Macarthur, D L Phillips, Glenn Hyndes, Christine Hanson, and Mathew Vanderklift

Link

Australian primary care health check: who is accountable for information security?, Rachel J. Mahncke and Patricia A H Williams

PDF

Student opinions on their development of non-technical skills in IT education, W Makasiranondh, S Maj, and D Veal

PDF

An investigation into internetworking education, Woratat Makasiranondh

PDF

A pedagogical rich interactive on-line learning platform for Network Technology students in Thailand, Woratat Makasiranondh, Stanislaw Maj, and David Veal

An Overview of Browser Vulnerability Attacks, Countermeasures and Detection Tools, Masood Mansoori and Ray Hunt

Link

An Evaluation of Data Erasing Tools, Thomas Martin and Andrew Jones

PDF

Managing Multidisciplinary Student Design Teams, Martin Masek, Joo Jung, and Barnard Clarkson

Link

Trusted interoperability and the patient safety issues of parasitic health care software, Vincent B. McCauley and Patricia A H Williams

PDF

Ecological Restoration of Novel Lake Districts: New Approaches for New Landscapes, Clinton D. McCullough and Eddie J. Van Etten

Link

Bioremediation of Acidic and Metalliferous Drainage (AMD) through organic carbon amendment by municipal sewage and green waste, Clinton Mccullough and Mark Lund

PDF

Limiting factors for crayfish and finfish in acidic coal pit lake, Clinton McCullough and Mark Lund

PDF

Recovery from the impact of light reduction on the seagrass Amphibolis griffithii, insights for dredging management, Kathryn McMahon, Paul Lavery, and Michael Mulligan

Link

Linking Land and Sea: Different Pathways for Marine Subsidies, Kajsa Mellbrand, Paul S. Lavery, Glenn A. Hyndes, and Peter A. Hamback

Link

Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats, Nurul Nuha Abdul Molok, Atif Ahmad, and Shanton Chang

PDF

Model-based Investigations of Acidity Sources and Sinks of a Pit Lake in Western Australia, Mike Mueller, katja Eulitz, Clinton McCullough, and Mark Lund

Link

Nitrogen Deposition Effects on Mediterranean-type Ecosystems: An Ecological Assessment, Raul Ochoa-Hueso, Edith Allen, Cristina Branquinho, Cristina Cruz, Teresa Dias, Mark Fenn, Esteban Manrique, M. Perez-Corona, Lucy Sheppard, and William Stock

Link

Empowering protest through social media, Simon O'Rourke

Link

Spatial and Temporal Visualisation Techniques for Crash Analysis, Charlotte S. Plug, Jianhong Xia, and Craig Caulfield

Link

Can current packet analysis software detect BitTorrent activity or extract files from BTP and μTP traffic streams?, William Pung and Andrew Woodward

Link

Critical infrastructure Protection: An Ethical Choice, Graeme Pye, Matthew Warren, and William Hutchinson

Effective Scheduling Algorithm for On-Demand XML Data Broadcasts in Wireless Environments, Yongrui Qin, Hua Wang, and Jitian Xiao

Link

Sourcing Organic Materials for Pit Lake Bioremediation in Remote Mining Regions, Naresh D. Radhakrishnan, Clinton D. Mccullough, Mark A. Lund, and Michelle L. Newport

Link

How does storage affect the quality and quantity of organic carbon in sewage for use in the bioremediation of acidic mine waters?, Naresh K. Radhakrishnan, Clinton D. Mccullough, and Mark A. Lund

Link

Bacterial sulfate reduction based ecotechnology for remediation of acidic pit lakes, Naresh Radhakrishnan, Clinton Mccullough, and Mark Lund

PDF

Potential of sewage and green waste for acidic pit lake bioremediation, Naresh Radhakrishnan, Clinton McCullough, and Mark Lund

PDF

Evaluating the factors limiting algal biomass in acidic pit lakes of the Collie lake district, Western Australia, Naresh Radhakrishnan, Clinton McCullough, Mark Lund, and Santiago Larranaga Arrizabalaga

PDF

Metal exposure in non-occupationally exposed pregnant women of Western Australia and contribution of environmental sources, Malarvili Ramalingam

PDF

Establishment of Endomycorrhizal Fungi on Micropropagated Teak (Tectona grandis L.f.), Maria I. Ramirez Caro, Ian Bennett, and Nick Malajczuk

PDF

Analysis of Key Installation Protection using Computerized Red Teaming, Tirtha Ranjeet, Philip Hingston, Chiou Peng Lam, and Martin Masek

Link

The effects of diversity maintenance on coevolution for an intransitive numbers problem, Tirtha Ranjeet, Martin Masek, Philip Hingston, and Chiou Peng Lam

Link

SMS Linguistic Profiling Authentication on Mobile Device, Hataichamok Saevanee, Nathan Clarke, and Steven Furnell

Link

Capturing Intangible Cultural Impacts from Tourism on Aboriginal Land in Australia's Kimberley, Pascal Scherrer and Kim Doohan

Link

Visitor management practices and operational sustainability: Expedition cruising in the Kimberley, Australia, Pascal Scherrer, Amanda J. Smith, and Ross K. Dowling

PDF

The application of data mining techniques to interrogate Western Australian water catchment data sets, Ajdin Sehovic

Link

Air Cargo Security, Norman Shanks

Link

Hold Baggage Screening, Norman Shanks

PDF

Feedback control for exergames, Jeff Sinclair

PDF

Subtidal macroalgal richness, diversity and turnover, at multiple spatial scales, along the southwestern Australian coastline, David Smale, G Kendrick, and Thomas Wernberg

PDF

Resilience of Phreatophytic Vegetation to Groundwater Drawdown: Is Recovery Possible Under a Drying Climate?, Bea Sommer and Raymond Froend

Link

Security Training, Narayanan Srinivasan

Link

Inconsistent benefits of a freshwater protected area for artisanal fisheries and biodiversity in a South-east Asian wetland, Chongdee Srinoparatwatana and Glenn Hyndes

PDF

Ecotypic variation and plasticity of morphological and physiological traits of Eucalyptus loxophleba ssp. lissophloia along a climate gradient in south-west Australia, Vanessa Stylianou

Link

Enhancing Agile Methods for Multicultural Software Project Teams, Anuradha Sutharshan and Paul Stanislaw Maj

PDF

Analysis of Data Remaining on Second Hand ADSL Routers, Patryk Szewczyk

Link

Usability of Internet Security Software: Have They Got it Right?, Patryk Szewczyk

Link

A 2011 investigation into remnant data on second hand memory cards sold in Australia, Patryk Szewczyk and Krishnun Sansurooah

PDF

Information dissemination for farming communities in Thailand, Khumphicha Tantisantisom

PDF

Gradients in the number of species at reef-seagrass ecotones explained by gradients in abundance, Fernando Tuya, Mathew Vanderklift, Thomas Wernberg, and Mads Thomsen

Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia, Craig Valli, Andrew Woodward, and P Hannay

Link

The Role and Value of Riparian Vegetation for Mine Pit Lakes, Eddie J.B. Van Etten

Link

Sand mining restoration on the Swan coastal plain using topsoil : Learning from monitoring of previous rehabilitation attempts, Eddie J.B. Van Etten, Clinton D. McCullough, and Mark A. Lund

Link

Setting Restoration Goals for Restoring Pit Lakes as Aquatic Ecosystems - A Case Study from Southwest Australia, Eddie J.B. Van Etten, Clinton D. McCullough, and Mark A. Lund

PDF

A low cost adaptive graphical user interface for the visually handicapped with multiple conditions, David Veal and Stanislaw Maj

PDF

Spatial patterns in herbivory on a coral reef are influenced by structural complexity but not by algal traits, Adriana Verges, Mathew Vanderklift, C Doropoulos, and Glenn Hyndes

PDF

Inoculations with Arbuscular mycorrhizal fungi increase vegetable yields and decrease phoxim concentrations in carrot and green onion and their soils, Fa Yuan Wang, Rui Jian Tong, Zhao Yong Shi, Xiao Feng Xu, and Xinhua He

Link

Impacts of climate change in a global hotspot for temperate marine biodiversity and ocean warming, Thomas Wemberg, Bayden Russel, Pippa Moore, Scott Ling, Daniel Smale, Alex Campbell, Melinda Coleman, Peter Steinberg, and Gary Kendrick

Link

Information leakage through second hand USB flash drives within the United Kingdom, Chaerani Widya, Nathan Clarke, and Christopher Bolan

Link

Why Australia's e-health system will be a vulnerable national asset, Patricia A. Williams

Link

Help or hindrance: The practicality of applying security standards in healthcare, Patricia A H Williams

Link

Is the Biggest Threat to Medical Information Simply a Lack of Understanding?, Patricia A.H. Williams

Link

Arbuscular mycorrhizal fungi can alter some root characters and physiological status in trifoliate orange (Poncirus trifoliata L. Raf.) seedlings, Qiang-Sheng Wu, Ying-Ning Zou, Xin-Hua He, and Peng Luo

Link

Differences of hyphal and soil phosphatase activities in drought-stressed mycorrhizal trifoliate orange (Poncirus trifoliata) seedlings, Qiang-Sheng Wu, Ying-Ning N Zou, and Xinhua He

Link

Studies on Pareto-based multi-objective Competitive Coevolutionary Dynamics, F Zeng, J Decraene, M Low, W Cai, and Philip Hingston

Link

R-tfidf, A variety of tf-idf Term Weighting Strategy in Document Categorization, Dengya Zhu and Jitian Xiao

Submissions from 2010

Link

A study of audience responses to the media discourse about the 'Other': The Fear of Terrorism between Australian Muslims and the Broader Community, Anne Aly

Link

Fear, victimisation and identity: The community victimisation perspective and social inclusion of Australian Muslims, Anne Aly

Link

The Internet as Ideological Battleground, Anne Aly

Link

Information Operations Matters: Best practices, Leigh Armistead

Link

An eAgriculture-based Decision Support Framework for Information Dissemination, Leisa Armstrong, Dean Diepeveen, and Khumphicha Tantisantisom

PDF

A model for the measurement and presentation of participation awareness in online groupware systems, Greg Baatard

Link

Using Traffic Analysis to Identify Tor Usage - A Proposed Study, John Barker, Peter Hannay, and Christopher Bolan

Link

Rooting theories of plant community ecology in microbial interactions, James D. Bever, Ian A. Dickie, Evalina Facelli, Jose M. Facelli, John Klironomos, Mari Moora, Matthias C. Rillig, William D. Stock, Mark Tibbett, and Martin Zobel

PDF

Analysis avoidance techniques of malicious software, Murray Brand

Link

National security: A propositional study to develop resilience indicators as an aid to personnel vetting, David Brooks, Jeff Corkill, Julie-Ann Pooley, Lynne Cohen, Cath Ferguson, and Craig Harms

PDF

The significance of learning style with respect to achievement in first year programming students, Vivian Campbell and Michael Johnstone

Link

An implementation of a garment-fitting simulation system using laser scanned 3D body data, Changsuk Cho, Jun-Young Park, Adrian Boeing, and Philip Hingston

Link

Carbon and nitrogen translocation in response to shading of the seagrass Posidonia sinuosa, Catherine J. Collier, Patricia Prado, and Paul Lavery

PDF

Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems, Michael P. Coole

Link

Hardware Implementation of the Self Assessment Manikin, Warren Creemers and Philip Hingston

Link

Phreatophytic Vegetation Response to Climatic and Abstraction-Induced Groundwater Drawdown: Examples of Long-Term Spatial and Temporal Variability in Community Response, Raymond Froend and Beate Sommer

PDF

Light reductions drive macroinvertebrate changes in Amphibolis griffithii seagrass habitat, Adam Gartner, Paul S. Lavery, Kathryn McMahon, Anne Brearley, and Helen Barwick

Link

Fireguard - A Secure Browser with Reduced Forensic Footprint, Don Griffiths and Peter James

PDF

Risk mitigation and culture: an examination of the utility of cultural cognition theory in determining operational security cultures in a healthcare environment, Melvyn Griffiths

PDF

An investigation into online teaching and the delivery of computer science topics : practice, content and environmental factors, Yuwanuch Gulatee

Link

The 2010 IDN Homograph Attack Mitigation Survey, Peter Hannay and Christopher Bolan

Link

Differentiation of benthic marine primary producers using stable isotopes and fatty acids: Implications to food web studies, Christine E. Hanson, Glenn A. Hyndes, and Shao Fang Wang

PDF

A New Design for a Turing Test for Bots, Philip Hingston

PDF

Evolving Group Strategies for IPD, Philip Hingston

PDF

RedTNet: A network model for strategy games, Philip Hingston, Mike Preuss, and Daniel Spierling

PDF

A Distributed and Cooperative User Authentication Framework, C.G. Hocking, Steven Furnell, Nathan Clarke, and P L Reynolds

The conservation status of freshwater crayfish: the basis for concern, listing and recovery processes, and community involvement, Pierre Horwitz

PDF

Analysis of Hu's Moment Invariants on Image Scaling and Rotation, Zhihu Huang and Jinsong Leng

PDF

An Online Ballistics Imaging System for Firearm Identification, Zhihu Huang and Jinsong Leng

PDF

A Novel Binarization Algorithm for Ballistics Imaging Systems, Zhihu Huang and Jinsong Leng

Link

New technologies: dissonance, influence and radical behaviours, William E. Hutchinson

Link

Influence Operations and Behavioural Change, William Hutchinson and Matthew Warren

PDF

Do different levels of fishing pressure, through spatial management, influence communities and ecological interactions in seagrass meadows in South Western Australia?, Karina Inostroza

Link

Assessing image-based authentication techniques in a web-based environment, M. Z. Jali, Steven M. Furnell, and P. S. Dowland

PDF

How do you make information security user friendly?, Andrew Jones