Follow

Submissions from 2009

Link

Evolution underground: A molecular phylogenetic investigation of Australian burrowing freshwater crayfish (Decapoda: Parastacidae) with particular focus on Engaeus Erichson, Mark B. Schultz, Sarah A. Smith, Pierre Horwitz, Alastair MM Richardson, Keith A. Crandall, and Christopher M. Austin

Link

Wine tourism as a development initiative in rural Canary Island communities, Lynnaire Sheridan, Abel Alonso, and Pascal Scherrer

Link

Oil mallees provide foraging habitat for the Western Pygmy Possum (Cercartetus concinnus) in the wheatbelt of Western Australia, Marie Short, Francis Patrick Smith, and Eddie Van Etten

Link

Exergame development using the dual flow model, Jeffrey Sinclair, Philip Hingston, and Martin Masek

Link

Using a Virtual Body to Aid in Exergaming System Development, Jeffrey Ronald Sinclair, Philip Hingston, Martin Masek, and Kazunori Nosaka

Link

Satellite-derived SST Data as a Proxy for Water Temperature in Nearshore Benthic Ecology, Daniel A. Smale and Thomas Wernberg

Link

Impacts on Aboriginal Spirituality and Culture from Tourism in the Coastal Waterways of the Kimberley Region, North West Australia, Amanda J. Smith, Pascal Scherrer, and Ross Dowling

Link

Macroinvertebrate Cycles of Decline and Recovery in Swan Coastal Plain (Western Australia) Wetlands Affected by Drought Induced Acidification, Beate Sommer and Pierre Horwitz

Link

Current Issues in Aviation Security, Narayanan Srinivasan and Shreeman Prabhakaran

Link

Physiological responses of Ecklonia radiata (Laminariales) to a latitudinal gradient in ocean temperature, Peter A. Staehr and Thomas Wernberg

Link

Browsing and fire interact to suppress tree density in an African Savanna, A. Carla Staver, William J Bond, William Stock, Sue J van Rensberg, and Matthew S Waldram

Price Forecasting in the Public Agricultural Rubber Industry in Thailand: A Preliminary Investigation, Panida Subsorn and Jitian Xiao

ADSL Router Forensics: Methods of Acquisition, Patryk Szewczyk

Link

ADSL Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk

PDF

Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective, Patryk Szewczyk and Craig Valli

Link

Improving an organisations existing information technology policy to increase security, Shane Talbot and Andrew Woodward

PDF

Structural characteristics of banksia woodland along an ecohydrological gradient, Western Australia, Rebecca Thomas

Link

Automatic detection of child pornography, Glen Thompson

Link

Broad-scale patterns of abundance of non-indigenous soft-bottom invertebrates in Denmark, Mads Thomsen, Thomas Wernberg, Brian R. Silliman, and Alf B. Josephson

Link

Evidence for impacts of non-indigenous macroalgae: a meta-analysis of experimental field studies, Mads Thomsen, Thomas Wernberg, Fernando Tuya, and Brian Reed Silliman

Link

Phytogeography of the Lusitanian Macaronesia: biogeographic affinities in species richness and assemblage composition, Fernando Tuya and Ricardo J. Haroun

Link

Colonization of gastropods on subtidal reefs depends on density in adjacent habitats, not on disturbance regime, Fernando Tuya, Thomas Wernberg, and Mads Thomsen

Link

Habitat structure affect abundances of labrid fishes across temperate reefs in south-western Australia, Fernando Tuya, Thomas Wernberg, and Mads Thomsen

Link

The habitats of the Western Australian soldier crab Myctyris accidentalis Unno 2008 (Brachyra: Myctyridae) across its biogeographical range, Joyleen Unno and Vic Semeniuk

Link

Education and Training, Craig Valli

Link

Laboratory Location, Craig Valli

Link

Management of Evidence Storage, Craig Valli

Link

Management of the Collection of Evidence, Craig Valli

Link

Quality Assurance, Craig Valli

PDF

SCADA Forensics with Snort IDS, Craig Valli

Link

Scoping the Requirement for the Laboratory, Craig Valli

Link

Selecting the Staff, Craig Valli

Link

The future of Digital Forensics and Its Role in Criminal Investigations, Craig Valli

Link

The not so smart, smart grid - potential security risks associated with the deployment of smart grid technologies, Craig Valli

Link

Understanding the role of the Digital Forensic Laboratory Manager, Craig Valli

PDF

Visualisation of Honeypot Data Using Graphviz and Afterglow, Craig Valli

PDF

SCADA Security - Slowly Circling a Disaster Area, Craig Valli and Andrew Woodward

PDF

Intensity of herbivory on kelp by fish and sea urchins differs between inshore and offshore reefs, Mathew Vanderklift, Paul Lavery, and Kris Waddington

Link

Inter-annual rainfall variability in arid Australia: greater than elsewhere?, Eddie Van Etten

Link

Response of fringing vegetation to flooding and discharge of hypersaline water at Lake Austin, Western Australia, Eddie Van Etten and Simone Vellekoop

Link

Dynamic patterns for low vision internet working students, David Veal, Stanislaw Maj, and Woratat Makasiranondh

Link

Infield Detection of Arsenic Using Portable Digital Voltameter, PDV6000, Magdalena Wajrak

Utilisation and Validation of a Rapid, On-Site Capability for Metal Analysis, Magdalena Wajrak and Peter McCafferty

Authentic Assessment - “ Mission Possible or Mission Impossible?, Magdalena Wajrak and Timothy Perkins

Link

The Science of Conservation Biology, Grant Wardell-Johnson and Pierre Horwitz

Link

Spatial variation in juvenile and adult Ecklonia radiata (Laminariales) sporophytes, Thomas Wernberg

PDF

Metabolomic investigation of a new rat model of autosomal recessive polycystic kidney disease, Hayley White

Capturing Culture in Medical Information Security Research, Patricia Williams

Link

What does security culture look like for small organizations?, Patricia Williams

Link

Historical nitrogen content of bryophyte tissue as an indicator of increased nitrogen deposition in the Cape Metropolitan Area, South Africa, Daniel Wilson, William Stock, and Terry Hedderson

PDF

Children's exposure to lead and nickel in Esperance - A case study, Matthew Tristan Winters

Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?, Andrew Woodward

Link

When you can't see the forest for the domains: why a two forest model should be used to achieve logical segregation between SCADA and corporate networks, Andrew Woodward and Brett Turner

PDF

A Match-based Approach to Optimize Conformance Test Sequence Generation using Mp-method, Jitian Xiao

Caching Dynamic Web Documents using Similarity Profiles, Jitian Xiao

PDF

An approach to behaviour-based intrusion detection system : implementation of a role-based network access control system and a proposal for three detection strategies, Wei Zheng

Submissions from 2008

Link

Acari (mite) assemblages under plantations of bluegum, Eucalyptus globulus, in southwestern Australia, Honi Adolphson and Adrianne Kinnear

Link

An overview of mobile embedded memory and forensics methodology, Haitham Al-Hajri

Link

iPhone forensics methodology and tools, Haitham Al-Hajri and Krishnun Sansurooah

Link

Importance of tasting rooms for Canary Islands' wineries, Abel D. Alonso, Lynnaire Sheridan, and Pascal Scherrer

Link

Wine tourism in the Canary Islands: An exploratory study, Abel Duarte Alonso, Lynnaire Sheridan, and Pascal Scherrer

Link

Digital forensics and the legal system: A dilemma of our times, James Tetteh Ami-Narh and Patricia Williams

Link

Bibliorakali: The Australian Water Rat, Hydromys Chrysogaster Geoffroy, 1804 (Muridae: Hydromyinae), a subject-specific bibliography, Christie Atkinson, Mark Lund, and Keith Morris

Link

GroupShare - Designing an awareness rich online groupware system, G Baatard

Participation awareness in a groupware environment: Presentation issues, Gregory Baatard

PDF

Linear transformation methods for multivariate geostatistical simulation, Ellen Bandarian

PDF

Morphology Independent Dynamic Locomotion Control for Virtual Characters, Adrian Boeing

Link

Survey and future trends of efficient cryptographic function implementations on GPGPUs, Adrian Boeing

Link

ImprovCV: Open component based automotive vision, Adrian Boeing and Thomas Braunl

Link

Protecting critical infrastructure with games technology, Adrian Boeing, Martin Masek, and William Bailey

Link

A Review of the Electronic Product Code Standards for RFID Technology, Christopher Bolan

Link

RFID communications - Who is listening?, Christopher Bolan

Link

Student learning and evaluation in analytical chemistry using a problem-oriented approach and portfolio assessment, Mary C. Boyce and Kuki Singh

PDF

You've got mail: Accountability and end user attitudes to email management, Mark Brogan and Susan Vreugdenburg

Public street CCTV: a psychometric study of social risk, David Brooks

Link

Defining the science of private security through knowledge categorisation, David J. Brooks

Link

Teaching strategies in large class programming courses, J Brown and G Baatard

Integrated Forensics Capabilities into Web Applications: Teaching Students the Why and How, Justin Brown and Gregory Baatard

Link

Deployment of Keystroke Analysis on a Smartphone, A Buchoux and Nathan Clarke

Identification of hairy, smooth and hybrid marron (Decapoda: Parastacidae) in the Margaret River: Morphology and allozymes, John JS Bunn, Annette Koenders, Christopher M. Austin, and Pierre Horwitz

Learning Java with Sun SPOTS, Craig Caulfield, S Paul Maj, and David Veal

PDF

Soft Computing In The Forecasting Of The Stock Exchange Of Thailand, Suchira Chaigusin, Chaiyaporn Chirathamjaree, and Judith Clayden

PDF

The Use of Neural Networks in the Prediction of the Stock Exchange of Thailand (SET) Index, Suchira Chaigusin, Chaiyaporn Chirathamjaree, and Judith Clayden

PDF

Physiological characteristics of the seagrass Posidonia sinuosa along a depth-related gradient of light availability, Catherine Collier, Paul Lavery, Peter Ralph, and Ray Masini

Link

Evaluation a critical point on the path to intelligence, Jeffrey Corkill

Professional Intelligence Judgement Artistry, Jeffrey Corkill

Link

Nutrient concentration ratios and co-limitation in South African grasslands, Joseph M Craine, Carl Morrow, and William Stock

PDF

Drought traits of Eucalyptus gomphocephala in Yalgorup National Park, Paul L. Drake

PDF

An exploration of the perceptions domestic groundwater users hold in relation to Perth's groundwater resources, Beverley Drayton-Witty

Link

Malware Analysis Framework from Static to Dynamic Analysis, Fadi El-moussa and Andrew Jones

PDF

Mutation Analysis for the Evaluation of AD Models, Usman Farooq and Chiou Peng Lam

PDF

Towards Automated Test Sequence Generation, Usman Farooq, Chiou Peng Lam, and Huaizhong Li

Link

Testing parallelization paradigms for MOEAs, Sadeesha Gamhewa and Philip Hingston

PDF

Water centrality for water and society, Ute Goeft

Link

Human evolution — Where from here?, David W. Goodall

Aviation infrastructure protection: Threats, contingency plans and the importance of networks, Melvyn Griffiths

PDF

Case analysis of information security risk perceptions, Alexis Guillot

Link

Factors that influence successful online teaching and learning programs in technical computer science subjects, Yuwanuch Gulatee, Justin Brown, and Barbara Combes

Virtual Learning Spaces in Technical Computer Science Subjects: A New Teaching and Learning Paradigm, Yuwanuch Gulatee and Barbara Combes

Link

Discussion on Sustainability of Arid Land Afforestation with Hardpan Blasting from Soil Chemical Assessment, Hiroyuki Hamano, N Saito, S Kato, H Kitahara, N Takahashi, Koichi Yamada, and Toshinori Kojima