Submissions from 2011
A Threat to Cyber Resilience : A Malware Rebirthing Botnet, Murray Brand, Craig Valli, and Andrew Woodward
AE2 Commander: Simulation and serious games in the online cultural heritage space, Mark Brogan and Martin Masek
RIM Professionals Australasia Technology Survey 2010-Part 1, Mark Brogan and David Roberts
Security risk management: A psychometric map of expert knowledge structure, David Brooks
Security risk management in the Asia Pacific region: What are security professional using?, David Brooks and Hamish Cotton
Organisational security: From expert knowledge construct to a body of knowledge, David J. Brooks
Quantitative approaches in climate change ecology, Christopher J. Brown, David S. Schoeman, William J. Sydeman, Keith Brander, Lauren B. Buckley, Michael Burrows, Carlos M. Duarte, Pippa J. Moore, John M. Pandolfi, Elvira Poloczanska, William Venables, and Anthony J. Richardson
The pace of shifting climate in marine and terrestrial ecosystems, Michael Burrows, David Schoeman, Lauren Buckley, Pippa Moore, Elvira Poloczanska, Keith Brander, Chris Brown, John Bruno, Carlos Duarte, Benjamin Halpern, Johanna Holding, Carrie Kappel, Wolfgang Kiessling, Mary O'Connor, John Pandolfi, Camille Parmesan, Franklin Schwing, William Sydeman, and Anthony Richardson
Children's Exposure to Metals: A Community-Initiated Study, Anna Carita Callan, Matthew Winters, Caroline Barton, Mary C. Boyce, and Andrea Lee Hinwood
Recent developments in privacy and healthcare: Different paths for RFID in Europe and North America?, Joseph Cannataci
Shall we play a game?, Craig Caulfield
Teaching software engineering project management-A novel approach for software engineering programs, Craig Caulfield, David Veal, and Stanislaw Maj
An investigation into the use of neural networks for the prediction of the stock exchange of Thailand, Suchira Chaigusin
Looking at Clouds from Both Sides: The Advantages and Disadvantages of Placing Personal Narratives in the Cloud, Lizzie Coles-Kemp, Joseph Reddington, and Patricia H. Williams
Student voices: Re-conceptualising and re-positioning Australian library and information science education for the twenty-first century, Barbara Combes, Jo Hanisch, Mary Carroll, and Hilary Hughes
Website Accessibility in Australia and the Australian Government's national transition strategy, Vivienne Conway
Website Accessibility in Western Australian Public Libraries, Vivienne Conway
E-governance of the Forest: Management by Multivalence, David Cook
Finance, fear, and family: issues of trust and the common ground with terrorist funding, David Cook and Timothy Smith
The Battle for Money Transfers: The allure of PayPal and Western Union over Familial remittance networks, David Cook and Timothy Smith
Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users, David Cook, Patryk Szewczyk, and Krishnun Sansurooah
Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens, David Cook, Patryk Szewczyk, and Krishnun Sansurooah
Mapping the organizational relations within physical security’s body of knowledge: a management heuristic of sound theory and best practice, Michael Coole and David Brooks
Not art, not science, but artistry: Why Professional Artistry should matter to the intelligence community, Jeffrey D. Corkill
User perceptions of end user license agreements in the smartphone environment, Hamish Cotton and Christopher Bolan
An analysis and comparison of predominant word sense disambiguation algorithms, David J. Craggs
Responding to Emerging Challenges: Multilateral Environmental Agreements and Highly Pathogenic Avian Influenza H5N1, Ruth Cromie, Nick Davidson, Colin Galbraith, Ward Hagemeijer, Pierre Horwitz, Rebecca Lee, Taej Mundkur, and David Stroud
Incorporating Genetic Algorithm into Rough Feature Selection for High Dimensional Biomedical Data, Vinh Q. Dang, Chio- Peng Lam, and Chang Su Lee
Survival and Population Size of the Frog Heleioporus Albopunctatus in a Highly Modified, Agricultural Landscape, Robert Davis and J Roberts
Diversity and composition of ectomycorrhizal community on seedling roots: the role of host preference and soil origin, Qiong Ding, Yu Liang, Pierre Legendre, Xin-hua He, Ke-quan Pei, Xiao-jun Du, and Ke-ping Ma
A strategy to articulate the facility management knowledge categories within the built environment, Robert Doleman and David Brooks
Systemic failures of fire protection equipment in Australian aged care nursing facilities, Robert Doleman and David Brooks
Is there a core set of skills for visual analysis across different imaging technologies?, Craig H.M. Donald
Individualised responses to vigilance demands and their management, Fiona M. Donald and Craig H.M. Donald
Linking hydraulic conductivity and photosynthesis to water-source partitioning in trees versus seedlings, Paul L. Drake, Ray H. Froend, and Peter J. Franks
Long-term pig manure application reduces the requirement of chemical phosphorus and potassium in two rice-wheat sites in subtropical China, YingHua Duan, M Xu, Xinhua He, Shuanglai Li, and X Sun
Risk-based intervention profiling in complex environments (impacted by time-restricted conditions), Joseph D. Ducie
High-dimensional Objective-based Data Farming, Zeng Fanchao, James Decraene, Malcolm Low, Wentong Cai, Suiping Zhou, and Philip F. Hingston
Model based test suite minimization using metaheuristics, Usman Farooq
Visualising Forensic Data: Investigation to Court, Kenneth Fowle and Damian Schofield
Estimation of CBR Value Using Dynamic Cone Penetrometer, K S. Gill, A K. Choudhary, and S K. Shukla
Factors Affecting the Distribution of Nutrients in the Tree Organs of Eucalyptus Camaldulensis in the Arid Lands of Western Australia, Hiroyuki Hamano, Noriko Saito, Yoshiko Tanaka, Shigeru Kato, Kiyotaka Tahara, Nobuhide Takahashi, Koichi Yamada, and Toshinori Kojima
Kindle Forensics: Acquisition and Analysis, Peter Hannay
GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering, Peter Hannay and Gregory Baatard
Red teaming with coevolution, Philip Hingston and Mike Preuss
A preliminary investigation of distributed and cooperative user authentication, C Hocking, Steven Furnell, Nathan Clarke, and P Reynolds
Authentication Aura - A Distributed Approach to User Authentication, C. G. Hocking, Steven Furnell, Nathan Clarke, and P. L. Reynolds
Access to Inland Waters for Tourism: Ecosystem Services and Trade-offs, Pierre Horwitz and M Carter
The relationship between water, health and global environmental change, as interpreted through five key Multilateral Environmental Agreements (MEAs), Pierre Horwitz, Lucilla Spini, Kathryn Campbell, R J Thomas, and Jo Mulongoy
A new seal verification for Chinese color seal, Zhihu Huang and Jinsong Leng
Assessing practical laboratory skills in undergraduate molecular biology courses, Lynne Hunt, Annette Koenders, and Vidar Gynnild
A longitudinal study of wi-fi access point security inthe Perth central business district, Emil Jacobson and Andrew Woodward
Quantifying the effect of graphical password guidelines for better security, Mohd Jali and Steven Furnell
Are Existing Security Models Suitable for Teleworking?, Peter James
A Secure Portable Application Device to Support Network Centric Warfare, Peter James
Modelling misuse cases as a means of capturing security requirements, Michael N. Johnstone
Security aspects of sensor-based defence systems, Michael N. Johnstone
Penetration of Zigbee-based wireless sensor networks, Michael N. Johnstone and Jeremy A. Jarvis
Regulator Guidance and Legislation Relevant to Pit Lakes, Hugh Jones and Clinton Mccullough
Sequential anaerobic-aerobic treatment of azo dyes: Decolourisation and amine degradability, M. Jonstrup, Naresh K. Radhakrishnan, M. Murto, and B. Mattiasson
Information evaluation: How one group of intelligence analysts go about the task, John Joseph and Jeff Corkill
Mitigation of Spear Phishing Attacks: A Content-Based Authorship Identification Framework, Mahmoud Khonji, Y Iraqi, and Andrew Jones
Lexical URL Analysis for Discriminating Phishing and Legitimate E-Mail Messages, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones
Lexical URL analysis for discriminating phishing and legitimate websites, Mahmoud Khonji, Youssef Iraqi, and Andrew Jones
A study of feature subset evaluators and feature subset searching methods for phishing classification, Mahmoud Khonji, Andrew Jones, and Youssef Iraqi
Forces that structure plant communities: quantifying the importance of the mycorrhizal symbiosis, J. Klironomos, M. Zobel, M. Tibbett, William D. Stock, M.C. Rillig, J.L. Parrent, M. Moora, A.M. Koch, J.M. Facelli, E. Facelli, I.A. Dickie, and J.D. Bever
Considering Complexity Theory in Understanding Information Management in Health Systems, Shirlee-ann Knight
Information Management in Health Systems: Considering an Organic Approach, Shirlee-ann Knight
The Combined Conceptual Life Cycle Model of Information Quality in User Perceptions of IQ On The Web, Shirlee-ann Knight
The combined conceptual life-cycle model of information quality: Part 1, an investigative framework, Shirlee-ann Knight
A Preliminary Introduction to the OTAM: Exploring Users’ Perceptions of their on-going Interaction with Adopted Technologies, Shirlee-ann Knight and Janice M. Burn
Alarm management: Mining for groups of co-occuring alarm tags, Savo Kordic
Assessing wetland ecosystem services and poverty interlinkages: A general framework and case study, Ritesh Kumar, Pierre Horwitz, G. Randy Milton, Sonali Sellamuttu, Sebastian Buckton, Nick Davidson, Ajit Pattnaik, Monica Zavagli, and Chris Baker
Risk assessment for mobile devices, Thomas Ledermuller and Nathan L. Clarke
A Rough-fuzzy Hybrid Approach on a Neuro-Fuzzy Classifier for High Dimensional Data, Chang Su Lee
Feature Reduction using a GA-Rough Hybrid Approach on Bio-medical data, Chang Su Lee
Rough-fuzzy Hybrid Approach for Identification of Bio-Markers and Classification on Alzheimer's Disease Data, ChangSu Lee, Chiou-Peng Lam, and Martin Masek
A rapid quantitative determination of phenolic acids in Brassica oleracea by capillary zone electrophoresis, Iris Lee, Mary Boyce, and Michael Breadmore
Reinforcement learning of competitive and cooperative skills in soccer agents, Jinsong Leng and Chee Lim
Outliers Detection with Correlated Subspaces for High Dimensional Datasets, Jinsong T. Leng and Zhihu Huang
An Exploration of 1st and 2nd Generation CPTED for End of Year School Leavers at Rottnest Island, John Letch, Ellice Mcglinn, Jonathan Bell, Emma Downing, and David Cook
Long-term combined application of manure and NPK fertilizers influenced nitrogen retention and stabilization of organic C in Loess soil, Bin Liang, Xueyun Yang, Xinhua He, Daniel Murphy, and Jianbin Zhou
Effects of 17-year Fertilization on Soil Microbial Biomass C and N and Soluble Organic C and N in Loessial Soil During Maize Growth, Bin Liang, Xueyun Yang, Xinhua He, and Jianbin Zhou
Behaviour Profiling for Transparent Authentication for Mobile Devices, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland
Misuse detection for mobile devices using behaviour profiling, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland
Engineering design of strategies for winning iterated prisoner's dilemma competitions, Jiawei Li, Philip Hingston, and Graham Kendall
Nitrite, Sodium Nitroprusside, Potassium Ferricyanide and Hydrogen Peroxide Release Dormancy of Amaranthus Retroflexus Seeds in a Nitric Oxide-Dependent Manner, Xuanyu Liu, Zhijun Deng, Hongyan Cheng, Xinhua He, and Songquan Song
Rapid Change of AM Fungal Community in a Rain-Fed Wheat Field With Short-Term Plastic Film Mulching Practice, Yongjun Liu, Lin Mao, Xinhua He, Gang Cheng, Xiaojun Ma, Lizhe An, and Huyuan Feng
Meeting Environmental Goals for Pit Lake Restoration - Factoring in the Biology, Mark A. Lund and Clint D. McCullough
How representative are pit lakes of regional natural water bodies? A case study from silica sand mining, Mark A. Lund and Clinton D. Mccullough
Habitat surrounding patch reefs influences the diet and nutrition of the western rock lobster, Lachlan Macarthur, D L Phillips, Glenn Hyndes, Christine Hanson, and Mathew Vanderklift
Australian primary care health check: who is accountable for information security?, Rachel J. Mahncke and Patricia A H Williams
Student opinions on their development of non-technical skills in IT education, W Makasiranondh, S Maj, and D Veal
An investigation into internetworking education, Woratat Makasiranondh
A pedagogical rich interactive on-line learning platform for Network Technology students in Thailand, Woratat Makasiranondh, Stanislaw Maj, and David Veal
An Overview of Browser Vulnerability Attacks, Countermeasures and Detection Tools, Masood Mansoori and Ray Hunt
An Evaluation of Data Erasing Tools, Thomas Martin and Andrew Jones
Managing Multidisciplinary Student Design Teams, Martin Masek, Joo Jung, and Barnard Clarkson
Trusted interoperability and the patient safety issues of parasitic health care software, Vincent B. McCauley and Patricia A H Williams