Submissions from 2011
Establishment of Endomycorrhizal Fungi on Micropropagated Teak (Tectona grandis L.f.), Maria I. Ramirez Caro, Ian Bennett, and Nick Malajczuk
Analysis of Key Installation Protection using Computerized Red Teaming, Tirtha Ranjeet, Philip Hingston, Chiou Peng Lam, and Martin Masek
The effects of diversity maintenance on coevolution for an intransitive numbers problem, Tirtha Ranjeet, Martin Masek, Philip Hingston, and Chiou Peng Lam
SMS Linguistic Profiling Authentication on Mobile Device, Hataichamok Saevanee, Nathan Clarke, and Steven Furnell
Capturing Intangible Cultural Impacts from Tourism on Aboriginal Land in Australia's Kimberley, Pascal Scherrer and Kim Doohan
Visitor management practices and operational sustainability: Expedition cruising in the Kimberley, Australia, Pascal Scherrer, Amanda J. Smith, and Ross K. Dowling
The application of data mining techniques to interrogate Western Australian water catchment data sets, Ajdin Sehovic
Air Cargo Security, Norman Shanks
Hold Baggage Screening, Norman Shanks
Feedback control for exergames, Jeff Sinclair
Subtidal macroalgal richness, diversity and turnover, at multiple spatial scales, along the southwestern Australian coastline, David Smale, G Kendrick, and Thomas Wernberg
Resilience of Phreatophytic Vegetation to Groundwater Drawdown: Is Recovery Possible Under a Drying Climate?, Bea Sommer and Raymond Froend
Security Training, Narayanan Srinivasan
Inconsistent benefits of a freshwater protected area for artisanal fisheries and biodiversity in a South-east Asian wetland, Chongdee Srinoparatwatana and Glenn Hyndes
Ecotypic variation and plasticity of morphological and physiological traits of Eucalyptus loxophleba ssp. lissophloia along a climate gradient in south-west Australia, Vanessa Stylianou
Enhancing Agile Methods for Multicultural Software Project Teams, Anuradha Sutharshan and Paul Stanislaw Maj
Analysis of Data Remaining on Second Hand ADSL Routers, Patryk Szewczyk
Usability of Internet Security Software: Have They Got it Right?, Patryk Szewczyk
A 2011 investigation into remnant data on second hand memory cards sold in Australia, Patryk Szewczyk and Krishnun Sansurooah
Information dissemination for farming communities in Thailand, Khumphicha Tantisantisom
Gradients in the number of species at reef-seagrass ecotones explained by gradients in abundance, Fernando Tuya, Mathew Vanderklift, Thomas Wernberg, and Mads Thomsen
Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia, Craig Valli, Andrew Woodward, and P Hannay
The Role and Value of Riparian Vegetation for Mine Pit Lakes, Eddie J.B. Van Etten
Sand mining restoration on the Swan coastal plain using topsoil : Learning from monitoring of previous rehabilitation attempts, Eddie J.B. Van Etten, Clinton D. McCullough, and Mark A. Lund
Setting Restoration Goals for Restoring Pit Lakes as Aquatic Ecosystems - A Case Study from Southwest Australia, Eddie J.B. Van Etten, Clinton D. McCullough, and Mark A. Lund
A low cost adaptive graphical user interface for the visually handicapped with multiple conditions, David Veal and Stanislaw Maj
Spatial patterns in herbivory on a coral reef are influenced by structural complexity but not by algal traits, Adriana Verges, Mathew Vanderklift, C Doropoulos, and Glenn Hyndes
Inoculations with Arbuscular mycorrhizal fungi increase vegetable yields and decrease phoxim concentrations in carrot and green onion and their soils, Fa Yuan Wang, Rui Jian Tong, Zhao Yong Shi, Xiao Feng Xu, and Xinhua He
Impacts of climate change in a global hotspot for temperate marine biodiversity and ocean warming, Thomas Wemberg, Bayden Russel, Pippa Moore, Scott Ling, Daniel Smale, Alex Campbell, Melinda Coleman, Peter Steinberg, and Gary Kendrick
Information leakage through second hand USB flash drives within the United Kingdom, Chaerani Widya, Nathan Clarke, and Christopher Bolan
Why Australia's e-health system will be a vulnerable national asset, Patricia A. Williams
Help or hindrance: The practicality of applying security standards in healthcare, Patricia A H Williams
Is the Biggest Threat to Medical Information Simply a Lack of Understanding?, Patricia A.H. Williams
Arbuscular mycorrhizal fungi can alter some root characters and physiological status in trifoliate orange (Poncirus trifoliata L. Raf.) seedlings, Qiang-Sheng Wu, Ying-Ning Zou, Xin-Hua He, and Peng Luo
Differences of hyphal and soil phosphatase activities in drought-stressed mycorrhizal trifoliate orange (Poncirus trifoliata) seedlings, Qiang-Sheng Wu, Ying-Ning N Zou, and Xinhua He
Studies on Pareto-based multi-objective Competitive Coevolutionary Dynamics, F Zeng, J Decraene, M Low, W Cai, and Philip Hingston
R-tfidf, A variety of tf-idf Term Weighting Strategy in Document Categorization, Dengya Zhu and Jitian Xiao
Submissions from 2010
The Internet as Ideological Battleground, Anne Aly
Information Operations Matters: Best practices, Leigh Armistead
An eAgriculture-based Decision Support Framework for Information Dissemination, Leisa Armstrong, Dean Diepeveen, and Khumphicha Tantisantisom
A model for the measurement and presentation of participation awareness in online groupware systems, Greg Baatard
Using Traffic Analysis to Identify Tor Usage - A Proposed Study, John Barker, Peter Hannay, and Christopher Bolan
Rooting theories of plant community ecology in microbial interactions, James D. Bever, Ian A. Dickie, Evalina Facelli, Jose M. Facelli, John Klironomos, Mari Moora, Matthias C. Rillig, William D. Stock, Mark Tibbett, and Martin Zobel
Analysis avoidance techniques of malicious software, Murray Brand
National security: A propositional study to develop resilience indicators as an aid to personnel vetting, David Brooks, Jeff Corkill, Julie-Ann Pooley, Lynne Cohen, Cath Ferguson, and Craig Harms
The significance of learning style with respect to achievement in first year programming students, Vivian Campbell and Michael Johnstone
An implementation of a garment-fitting simulation system using laser scanned 3D body data, Changsuk Cho, Jun-Young Park, Adrian Boeing, and Philip Hingston
Carbon and nitrogen translocation in response to shading of the seagrass Posidonia sinuosa, Catherine J. Collier, Patricia Prado, and Paul Lavery
Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems, Michael P. Coole
Hardware Implementation of the Self Assessment Manikin, Warren Creemers and Philip Hingston
Phreatophytic Vegetation Response to Climatic and Abstraction-Induced Groundwater Drawdown: Examples of Long-Term Spatial and Temporal Variability in Community Response, Raymond Froend and Beate Sommer
Light reductions drive macroinvertebrate changes in Amphibolis griffithii seagrass habitat, Adam Gartner, Paul S. Lavery, Kathryn McMahon, Anne Brearley, and Helen Barwick
Fireguard - A Secure Browser with Reduced Forensic Footprint, Don Griffiths and Peter James
Risk mitigation and culture: an examination of the utility of cultural cognition theory in determining operational security cultures in a healthcare environment, Melvyn Griffiths
An investigation into online teaching and the delivery of computer science topics : practice, content and environmental factors, Yuwanuch Gulatee
The 2010 IDN Homograph Attack Mitigation Survey, Peter Hannay and Christopher Bolan
Differentiation of benthic marine primary producers using stable isotopes and fatty acids: Implications to food web studies, Christine E. Hanson, Glenn A. Hyndes, and Shao Fang Wang
A New Design for a Turing Test for Bots, Philip Hingston
Evolving Group Strategies for IPD, Philip Hingston
RedTNet: A network model for strategy games, Philip Hingston, Mike Preuss, and Daniel Spierling
A Distributed and Cooperative User Authentication Framework, C.G. Hocking, Steven Furnell, Nathan Clarke, and P L Reynolds
The conservation status of freshwater crayfish: the basis for concern, listing and recovery processes, and community involvement, Pierre Horwitz
Analysis of Hu's Moment Invariants on Image Scaling and Rotation, Zhihu Huang and Jinsong Leng
An Online Ballistics Imaging System for Firearm Identification, Zhihu Huang and Jinsong Leng
A Novel Binarization Algorithm for Ballistics Imaging Systems, Zhihu Huang and Jinsong Leng
New technologies: dissonance, influence and radical behaviours, William E. Hutchinson
Influence Operations and Behavioural Change, William Hutchinson and Matthew Warren
Assessing image-based authentication techniques in a web-based environment, M. Z. Jali, Steven M. Furnell, and P. S. Dowland
How do you make information security user friendly?, Andrew Jones
Digital forensics and the issues of identity, Andrew Jones and Thomas Martin
Remote access forensics for VNC and RDP on Windows platform, Paresh Kerai
Predator-Baiting Experiments for the Conservation of Rock-Wallabies in Western Australia: 25-Year Review with Recent Advances, J E. Kinnear, C J. Krebs, Craig Pentland, P Orell, Christopher Holme, and Reino Karvinen
Patterns Relevant to the Temporal Data-Context of an Alarm of Interest, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li
Computational Intelligence for Functional Testing, Chiou Peng Lam
Personal exposure of children to formaldehyde in Perth, Western Australia, Victoria S. Lazenby
Adaptive T-S type Rough-Fuzzy Inference Systems (ARFIS) for Mobile Robot Navigation, Chang Su Lee
Quantitative determination of glucoraphanin in Brassica vegetables by micellar electrokinetic capillary chromatography, Iris Lee, Mary C. Boyce, and Michael Breadmore
A Novel Subspace Outlier Detection Approach in High Dimensional Data Sets, Jinsong Leng
Mining Outliers in Correlated Subspaces for High Dimensional Data Sets, Jinsong Leng and Tzung-Pei Hong
Analyzing Texture Features of Ballistic Projectile Images for Firearm Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li
Optical Imaging and Analysis of Firing-pin Marks for Ballistics Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li
A Wrapper-Based Feature Selection for Analysis of Large Data Sets, Jinsong Leng, Craig Valli, and Leisa Armstrong
Android forensics: Simplifying cell phone examinations, Jeff Lessard and Gary Kessler
A novel ballistics imaging system for firearm identification, Dongguang Li
A novel binarization algorithm for ballistics firearm identification, Dongguang Li
Color seal segmentation and identification, Dongguang Li
Behaviour profiling on mobile devices, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland
Cross-Cultural Education: Learning Methodology and Behaviour Analysis for Asian Students in IT Field of Australian Universities, Jie Lu, Kum Chin, Juan Yao, Jun Xu, and Jitian Xiao
State Model Diagrams - A Universal, Model Driven Method for Network System Configuration and Management, Stanislaw Maj
An Evaluation of Firewall Configuration Methods, Stanislaw Maj, Woratat Makasiranondh, and David Veal
State Model Diagrams - A Universal Runtime Network Management Tool, Stanislaw Maj, Woratat Makasiranondh, and David Veal
An Evaluation of State Model Diagrams for Secure Network Configuration and Management, Stanislaw Maj and David Veal
Evaluating Layer 3 Device Tunnelling and Access Control List Security Bandwidths Using B-node Theory, Stanislaw Maj and David Veal
Parsimony Analysis - A Novel Method of Structured Knowledge Representation for Teaching Computer Science, Stanislaw Maj and David Veal
Using State Model Diagrams to Manage Secure Layer 2 Switches, Stanislaw Maj and David Veal
A Preliminary Evaluation of the new Cisco Network Security Course, Stanislaw Maj, David Veal, and Lotfi Yassa
An integrated multimedia based platform for teaching network security, Woratat Makasiranondh, Stanislaw Maj, and David Veal