Follow

Submissions from 2010

Link

Cross-cultural learning challenges and teaching strategies for first-year Asian students in Australian universities, Jitian Xiao, Jie Lu, Kum Chin, Jun Xu, and Juan Yao

PDF

Autonomous Bee Colony Optimization for Multi-objective Function, F Zeng, James Decraene, Malcolm Low, Philip Hingston, C Wentong, Z Suiping, and M Chandramohan

Submissions from 2009

Link

The challenge of preserving rural industries and traditions in ultraperipheral Europe: Evidence from the Canary Islands, Abel D. Alonso, Pascal Scherrer, and Lynnaire Sheridan

Link

Media hegemony, activism and identity: Muslim women re-presenting Muslim women, Anne Aly

Link

The terrorists' audience: A model of internet radicalisation, Anne Aly

Link

An Intervention to Increase Positive Attitudes and Address Misconceptions About Australian Muslims: A Call for Education and Open Mindedness, Anne Aly, Anne Pedersen, Lisa Hartley, and Craig McGarty

An evaluation of Methodologies for eAgriculture in an Australian Context, Leisa J. Armstrong and Dean A. Diepeveen

An information-based decision support framework for eAgriculture, Leisa J. Armstrong and Dean A. Diepeveen

Link

Feeding ecology of green turtles (Chelonia mydas) from Shoalwater Bay, Australia, Karen Arthur, Kathryn Mcmahon, Col Limpus, and William Dennison

Link

Risk culture influences in internet safety and security, S Atkinson, S M. Furnell, and A.D. Phippen

Consensual Security Risk Assessment: Overcoming Bias, Conflicting Interests and Parochialism, Benjamin Beard and David Brooks

Link

Peat fires and air quality: Volatile organic compounds and particulates, David J. Blake, Andrea L. Hinwood, and Pierre Horwitz

Link

Freegate: A defence against the pending censorship of Australia?, C Bolan and P Hannay

Link

A spoofing attack against an EPC class one RFID system, Christopher Bolan

Link

From desktop to mobile: Examining the security experience, Reinhardt A. Botha, Steven Furnell, and Nathan Clarke

Link

Clipping Mercury's Wings: The Challenge of Email Archiving, Mark Brogan

RMAA Technology Survey 2008: From mainstream to bleeding edge-technology in the RIM workspace, Mark Brogan and David Roberts

Defeating biometric fingerprint systems: An applied testing methodology, David Brooks

Link

Intruder Alarm Systems: Is the Security Industry Installing and Maintaining Alarm Systems in Compliance to Australian Standard AS2201?, David Brooks

Link

Key concepts in security risk management: A psychometric concept map to approach to understanding, David Brooks

Link

What is security: Definition through knowledge categorisation, David Brooks

Link

Water stress vulnerability of four Banksia species in contrasting ecohydrological habitats on the Gnangara Mound, Western Australia [journal article], Caroline Canham, Raymond Froend, and William Stock

PDF

Health and the nature of urban green spaces, May Elizabeth Carter

Link

Tourism research to tourism practice: The need for adaptive institutions in Western Australia's Ningaloo region, Kelly Chapman, Pierre Horwitz, Pascal Scherrer, and Jeremy Northcote

Link

The Alox5 gene is a novel therapeutic target in cancer stem cells of chronic myeloid leukemia, Yaoyu Chen, Dongguang Li, and Shaoguang Li

Cross-cultural learning and teaching in Australian universities, Kum Leng Chin, Jie Lu, Jun Xu, Jitian Xiao, and Juan Yao

Link

Shade-induced response and recovery of the seagrass Posidonia sinuosa, Catherine Collier, Paul Lavery, Peter J Ralph, and Ray J Masini

Link

Digital natives or digital refugees? Why we have failed Gen Y?, Barbara Combes

Generation Y: Are they really digital natives or more like digital refugees?, Barbara Combes

Security Decay: An Entropic Approach to Definition and Understanding, M COOLE and David Brooks

Intelligence Support to Law Enforcement: Untangling the Gordian Knot, Jeffrey Corkill

Professional Intelligence Judgement Artistry: Some early observations, Jeffrey Corkill

Link

Global patterns of foliar nitrogen isotopes and their relationships with climate, mycorrhizal fungi, foliar nutrient concentrations, and nitrogen availability, Joseph Craine, Andrew Elmore, Marcos Aidar, Mercedes Bustamante, Todd Dawson, Erik Hobbie, Ansgar Kahmen, Michelle Mack, Kendra McLauchaln, Anders Michelsen, Gabriela Nardoto, Linda Pardo, Josep Penuelas, Peter Reich, Edward Schuur, William Stock, Pamela Templer, Ross Virginia, Jeffrey Welker, and Ian Wright

Link

Grazing and landscape controls on nitrogen availability across 330 South African savanna sites, Joseph M Craine, Fiona Ballantyne, Michael Peel, Nick Zambatis, Carl Morrow, and William Stock

Link

Allochthonous brown algae are the primary food source for consumers in a temperate, coastal environment, Karen Crawley, Glenn Hyndes, Mathew Vanderklift, Peter Nichols, and Andrew Revill

Link

The function of security in reducing women's fear of crime in open public spaces: A case study of serial sex attacks at a western australian university, Christopher J. Cubbage and Clifton Smith

PDF

Fuel characteristics and dynamics in shrublands of the transitional rainfall zone, Western Australia, Sarah Dalgleish

PDF

Investigating data mining techniques for extracting information from Alzheimer's disease data, Vinh Quoc Dang

Applying Data Mining Techniques in the Selection of Plant Traits, Dean A. Diepeveen and Leisa J. Armstrong

Link

Dietary preferences of two seagrass inhabiting gastropods: Allocthanous vs autochthanous resources, Christopher Doropoulos, Glenn Hyndes, Paul Lavery, and Fernando Tuya

Selecting Areas for Land Use Change in a Catchment, Neil Dunstan, Leisa J. Armstrong, and Dean A. A. Diepeveen

Link

Effects of Multiple Disturbances in Seagrass Meadows: Shading Decreases Resilience to Grazing, Johan S Eklöf, Kathryn Mcmahon, and Paul Lavery

PDF

A Max-Min Multiobjective Technique to Optimize Model Based Test Suite, Usman Farooq and Chiou P. Lam

PDF

Evolving the Quality of a Model-Based Test Suite, Usman Farooq and Chiou P. Lam

PDF

Pines and the ecology of Carnaby‘s Black-Cockatoos (Calyptorhynchus latirostris) in the Gnangara sustainability strategy area, Hugh Finn, William Stock, and Leonie Valentine

Link

Pines and the ecology of Carnaby‘s Black-Cockatoos (Calyptorhynchus latirostris) in the Gnangara Sustainability Strategy study area, Hugh Finn, William Stock, and Leonie Valentine

Link

Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives, Michael Freeman and Andrew Woodward

Link

Smartpot: Creating a 1st generation smartphone honeypot, Michael Freeman and Andrew Woodward

Link

Mobile security: A pocket guide, Steven Furnell

Link

Scare Tactics - A viable weapon in the security war?, Steven Furnell, Maria Papadaki, and Kerry-Lynn Thomson

Link

From culture to disobedience: Recognising the varying user acceptance of IT security, Steven Furnell and Kerry-Lynn Thomson

Link

Recognising and addressing 'security fatigue', Steven Furnell and Kerry-Lynn Thomson

Is it possible to use passive spectral characteristics of wireless network client devices for forensic identification purposes?, Luke Golygowski and Andrew Woodward

Fun & Games: an Introduction to Console Forensics, Peter Hannay

Link

Satellite navigation forensics techniques, Peter Hannay

Firewire Forensics in Modern Operating Systems, Peter Hannay and Andrew Woodward

Link

Selective uptake of prokaryotic picoplankton by a marine sponge (Callyspongia sp.) within an oligotrophic coastal system, Christine Hanson, Martin Mclaughlin, Glenn Hyndes, and Joanna Strzelecki

PDF

Consequences of climate-driven biodiversity changes for ecosystem functioning of North European rocky shores, Stephen Hawkins, Heather Sugden, Nova Mieszkowska, Philippa Moore, Elvira Poloczanska, Rebecca Leaper, Roger Herbert, Martin Genner, Paula Moschella, Richard Thompson, Stuart Jenkins, Alan Southward, and Michael Burrows

Link

Culture jamming: from activism to hactivism, Kay Hearn, Rachel Mahncke, and Patricia Williams

Link

A Turing Test for Computer Game Bots, Philip Hingston

PDF

Iterated Prisoner's Dilemma for Species, Philip Hingston

Link

Wetland Invertebrate Richness and Endemism on the Swan Coastal Plain, Western Australia, Pierre Horwitz, Ruth Rogan, Stuart Halse, Jenny Davis, and Beate Sommer

Link

Cultural conservation biology, Pierre Horwitz and Grant Wardell-Johnson

Link

Cyber influence, William Hutchinson

Security as an element in environmental assessment and decision making, William Hutchinson and Matthew Warren

Link

Assessing the usability of personal internet security tools, T Ibrahim, S M. Furnell, M Papadaki, and N L. Clarke

Link

Evaluating web-based user authentication using graphical techniques, MZ Jali, S M. Furnell, and PS Dowland

Link

Use of a secure portable application device as a component of network centric operations, Peter James

Link

Security requirements engineering-the reluctant oxymoron, Michael N. Johnstone

Link

An introduction to digital forensics, Andrew Jones

Link

A summary of thoughts, issues and problems, Andrew Jones

Link

Conclusions and Final Thoughts, Andrew Jones

Link

Developing a Career in Digital Forensic Management, Andrew Jones

Link

Developing the Business Plan, Andrew Jones

Link

Establishing and Managing a Digital Forensics Laboratory, Andrew Jones

Link

High technology crimes: case summaries, Andrew Jones

Link

Networking, liaison and sources of information, Andrew Jones

Link

Responding to crimes requiring computer forensic investigation, Andrew Jones

Link

The computer forensics unit strategic, tactical, and annual plans, Andrew Jones

Link

The future of digital forensics in the criminal justice system, Andrew Jones

Link

Types of forensic investigation, Andrew Jones

Why are we not getting better at Data Disposal?, Andrew Jones

Link

Workload management and the outsourcing option, Andrew Jones

Link

The 2009 analysis of information remaining on USB storage devices offered for sale on the second hand market, Andrew Jones, Craig Valli, and G Dabibi

Link

The 2008 analysis of information remaining on disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, Iain Sutherland, and Gareth Davies

Link

Lessons not learned on data disposal, Andy Jones

Link

Journalism research and democracy: Moving out of the Western orbit, Beate Josephi

Link

Application of latent moderated structuring (LMS) to rank the effects of intervening variables on the IT and firm performance relationship, Abbas Keramati, Glenn Dardick, Navid Majir, and Behdad Banan

Link

Bluetooth Hacking: A Case Study, Gary C. Kessler and Dennis Browning

Using Event-Intervals to Analyze Alarm Sequences in a Chemical Plant, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li

Link

Effects of different mobilities of leaf and woody litters on litter carbon dynamics in arid ecosystems in Western Australia, Shungo Kumada, Takuya Kawanishi, Yoshishige Hayashi, Hiroyuki Hamano, Satoko Kawarasaki, Shin-ichi Aikawa, Nobuhide Takahashi, Yasuyuki Egashira, Hiroyuki Tanouchi, T Kojima, Adrianne Kinnear, and K Yamada

PDF

Interactive effects of timing, intensity and duration of experimental shading on Amphibolis griffithii, Paul Lavery, Kathryn Mcmahon, Michael Mulligan, and Andrew Tennyson

Link

Advances in Fetal Heart Rate Monitoring using Smart Phones, Chang Su Lee, Martin Masek, Chiou Peng Lam, and Keng Tiong Tan

Link

Towards higher accuracy and better noise tolerance for fetal heart rate monitoring using doppler ultrasound, Chang Su Lee, Martin Masek, Chiou Peng Lam, and Keng Tiong Tan

Link

Ballistics firearm identification by digital holography, Dong-guang Li

PDF

Ballistics image processing and analysis for firearm identification, Dongguang Li

Link

DNA microarray expression analysis and data mining for blood cancer, Dongguang Li

Link

Firearm identification system for Australian police services, Dongguang Li

An Anomaly-based Intrusion Detection Architecture to Secure Wireless Network, SY Lim and Andrew Jones

Terror attacks: Understanding social risk views between Singaporean lay and security practitioners, Yam Hoo Loo and David Brooks