Follow

Submissions from 2008

Link

An overview of mobile embedded memory and forensics methodology, Haitham Al-Hajri

Link

iPhone forensics methodology and tools, Haitham Al-Hajri and Krishnun Sansurooah

Link

Importance of tasting rooms for Canary Islands' wineries, Abel D. Alonso, Lynnaire Sheridan, and Pascal Scherrer

Link

Wine tourism in the Canary Islands: An exploratory study, Abel Duarte Alonso, Lynnaire Sheridan, and Pascal Scherrer

Link

Digital forensics and the legal system: A dilemma of our times, James Tetteh Ami-Narh and Patricia Williams

Link

Bibliorakali: The Australian Water Rat, Hydromys Chrysogaster Geoffroy, 1804 (Muridae: Hydromyinae), a subject-specific bibliography, Christie Atkinson, Mark Lund, and Keith Morris

Link

GroupShare - Designing an awareness rich online groupware system, G Baatard

Participation awareness in a groupware environment: Presentation issues, Gregory Baatard

PDF

Linear transformation methods for multivariate geostatistical simulation, Ellen Bandarian

PDF

Morphology Independent Dynamic Locomotion Control for Virtual Characters, Adrian Boeing

Link

Survey and future trends of efficient cryptographic function implementations on GPGPUs, Adrian Boeing

Link

ImprovCV: Open component based automotive vision, Adrian Boeing and Thomas Braunl

Link

Protecting critical infrastructure with games technology, Adrian Boeing, Martin Masek, and William Bailey

Link

A Review of the Electronic Product Code Standards for RFID Technology, Christopher Bolan

Link

RFID communications - Who is listening?, Christopher Bolan

Link

Student learning and evaluation in analytical chemistry using a problem-oriented approach and portfolio assessment, Mary C. Boyce and Kuki Singh

PDF

You've got mail: Accountability and end user attitudes to email management, Mark Brogan and Susan Vreugdenburg

Public street CCTV: a psychometric study of social risk, David Brooks

Link

Defining the science of private security through knowledge categorisation, David J. Brooks

Link

Teaching strategies in large class programming courses, J Brown and G Baatard

Integrated Forensics Capabilities into Web Applications: Teaching Students the Why and How, Justin Brown and Gregory Baatard

Link

Deployment of Keystroke Analysis on a Smartphone, A Buchoux and Nathan Clarke

Identification of hairy, smooth and hybrid marron (Decapoda: Parastacidae) in the Margaret River: Morphology and allozymes, John JS Bunn, Annette Koenders, Christopher M. Austin, and Pierre Horwitz

Learning Java with Sun SPOTS, Craig Caulfield, S Paul Maj, and David Veal

PDF

Soft Computing In The Forecasting Of The Stock Exchange Of Thailand, Suchira Chaigusin, Chaiyaporn Chirathamjaree, and Judith Clayden

PDF

The Use of Neural Networks in the Prediction of the Stock Exchange of Thailand (SET) Index, Suchira Chaigusin, Chaiyaporn Chirathamjaree, and Judith Clayden

PDF

Physiological characteristics of the seagrass Posidonia sinuosa along a depth-related gradient of light availability, Catherine Collier, Paul Lavery, Peter Ralph, and Ray Masini

Link

Evaluation a critical point on the path to intelligence, Jeffrey Corkill

Professional Intelligence Judgement Artistry, Jeffrey Corkill

Link

Nutrient concentration ratios and co-limitation in South African grasslands, Joseph M Craine, Carl Morrow, and William Stock

PDF

Drought traits of Eucalyptus gomphocephala in Yalgorup National Park, Paul L. Drake

PDF

An exploration of the perceptions domestic groundwater users hold in relation to Perth's groundwater resources, Beverley Drayton-Witty

Link

Malware Analysis Framework from Static to Dynamic Analysis, Fadi El-moussa and Andrew Jones

PDF

Mutation Analysis for the Evaluation of AD Models, Usman Farooq and Chiou Peng Lam

PDF

Towards Automated Test Sequence Generation, Usman Farooq, Chiou Peng Lam, and Huaizhong Li

Link

Testing parallelization paradigms for MOEAs, Sadeesha Gamhewa and Philip Hingston

PDF

Water centrality for water and society, Ute Goeft

Link

Human evolution — Where from here?, David W. Goodall

Aviation infrastructure protection: Threats, contingency plans and the importance of networks, Melvyn Griffiths

PDF

Case analysis of information security risk perceptions, Alexis Guillot

Link

Factors that influence successful online teaching and learning programs in technical computer science subjects, Yuwanuch Gulatee, Justin Brown, and Barbara Combes

Virtual Learning Spaces in Technical Computer Science Subjects: A New Teaching and Learning Paradigm, Yuwanuch Gulatee and Barbara Combes

Link

Discussion on Sustainability of Arid Land Afforestation with Hardpan Blasting from Soil Chemical Assessment, Hiroyuki Hamano, N Saito, S Kato, H Kitahara, N Takahashi, Koichi Yamada, and Toshinori Kojima

Link

Forensic acquisition and analysis of the TomTom one satellite navigation unit, Peter Hannay

Cold Boot Memory Acquisition: An Investigation Into Memory Freezing and Data Retention Claims, Peter Hannay and Andrew Woodward

Link

Evaluating the Usability Impacts of Security Interface Adjustments in Word 2007, M Helala, S. M Furnell, and M Papadaki

Link

Human exposure to metals in groundwater affected by acid sulfate soil disturbance, Andrea Hinwood, Pierre Horwitz, and Ruth Rogan

Link

Assessing urinary levoglucosan and methoxyphenols as biomarkers for use in woodsmoke exposure studies, Andrea L. Hinwood, Masooma Trout, John Murby, Caroline Barton, and Bob Symons

PDF

Old company records: The effect of custodial history on the arrangement and description of selected archival collections of business records, Donna Leanne Holmes

Link

Hydrological change escalates risk of ecosystem stress in Australia's threatened biodiversity hotspot, Pierre Horwitz, Don Bradshaw, Stephen Hopper, Peter Davies, Raymond Froend, and Felicity Bradshaw

Link

Media, government and manipulation: the cases of the two Gulf Wars, William Hutchinson

Link

Propaganda dilemmas for environmental security, William Hutchinson

Link

The Ethics of Information Operations, William Hutchinson

Link

Preventing the Acquisition of Data from Virtual Machine based Secure PortableExecution Environments, Peter James

Link

Secure Portable Execution Environments: A Review of Available Technologies, Peter James

Enacting design science with action research: An illustrative case study in methodology development, Michael Johnstone and J. R. Venable

PDF

The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, and Iain Sutherland

PDF

Analysis of Information Remaining on Hand Held Devices for Sale on the Second Hand Market, Andrew Jones, Craig Valli, and Iain Sutherland

Link

Catching the Malicious Insider, Andy Jones

Link

Dealing with the malicious insider, Andy Jones and Carl Colwill

Modern Society as Risk Society: Implications of Modernity on Private Security, David Jurcic

PDF

Establishment of ecological functions in transplanted meadows of the seagrass Posidonia australis, Rebekah E. Kenna

Link

On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners, Gary Kessler

The Power of Simple Hands-On Cyberforensics Exercises: A Guide for Faculty, Gary Kessler and J Hoag

Extending the Multidisciplinary Learning Experience in Digital Forensics Using Mock Trials, Gary Kessler, R Simpson, and J Fry

Perceptions Of Successful Students: Lessons In The First Year Experience, Adrianne Kinnear, Heather Sparrow, Mary Boyce, and Sharon Middleton

Link

A Data-Driven Approach for Finding the Threshold Relevant to the Temporal Data Context of an Alarm of Interest, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li

Link

Analysis of Alarm Sequences in a Chemical Plant, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li

The Use of Red Teaming in The Corporate Environment: A Study of Security Management, Vulnerabilities and Defence, G Lane and David Brooks

A framework of adaptive T-S type Rough-Fuzzy Inference Systems (ARFIS), Chang Su Lee, Anthony Zaknich, and Thomas Braunl

Temporal Difference Learning and Simulated Annealing for Optimal Control: A Case Study, Jinsong Leng, M Sathyaraj Beulah, and Lakhmi Jain

Link

Simulation and Reinforcement Learning with Soccer Agents, Jinsong Leng, Lakhmi Jain, and Colin Fyfe

A Role-based Framework for Multi-agent Teaming, Jinsong Leng, Jiuyong Li, and Lakhmi Jain

Link

DGL global strategies in DNA microarray gene expression analysis and data mining for human blood cancers, Dongguang Li

Link

Digital holographic image processing for the positive firearm identificaiton, Dongguang Li

Link

Surface structures on cleaved silicon by cleavage luminescence detection, Dongguang Li

DNA microarray technology and data analysis in cancer research, Shaoguang Li and Dongguang Li

Link

Movements of the western rock lobster (Panulirus cygnus) within shallow coastal waters using acoustic telemetry, Lachlan D. MacArthur, R Babcock, and Glenn A. Hyndes

Link

Nocturnally active western rock lobsters, Panulirus cygnus, forage close to shallow coastal reefs, Lachlan D. MacArthur, Glenn A. Hyndes, R. Babcock, and Mathew Vanderklift

PDF

Supporting Component Selection with a Suite of Classifiers, Valerie Maxville, Chiou Peng Lam, and J Armarego

Link

Field-Scale Demonstration of the Potential for Sewage to Remediate Acidic Mine Waters, Clinton Mccullough, Mark Lund, and Joel May

PDF

Current Challenges Facing Information and Communications Technology: A Manifesto For Change, Donald McDermid

Design Concerns in Creating New Diagrams, Donald Mcdermid

Link

Australian Defense Force Policy and the use of WPA2 as a security option for deployment of 802.11 wireless devices in the field, Drew Mceniery and Andrew Woodward

PDF

The impact of implementation of VOIP in call centres : A Western Australia perspective, Syed Moniruzzoha

PDF

Local polysaccharide-producing soil cyanobacteria as potential soil conditioners in Nakhonsawan Province, Thailand, Sumitra Moopayak

State Model Diagrams and Learning Strategy for Computer Networks, Chompu Nuangjamnong, Yuwanuch Gulatee, Stanislaw Maj, and Barbara Combes

PDF

The OSI Network Management Model - Capacity and performance management, Chompu Nuangjamnong, Stanislaw P. Maj, and David Veal

Link

Resource redundancy - A staffing factor using SFIA, C Nuangjamnong, S P. Maj, and D Veal

Link

Data Recovery from PalmmsgV001, Satheesaan Pasupatheswaran

Link

Email 'Message-IDs' helpful for forensic analysis?, Satheesaan Pasupatheswaran

Link

The erosive effect of tourism at an Aboriginal rock art site on the western edge of the arid zone in south-western Australia, Alana Rossi and Esmee Webb

PDF

Abundance, distribution and habitat requirements of the tree-stem trapdoor spider, Aganippe castellum (Arachnida : Idiopidae) in the eastern West Australian wheatbelt, Monica G. Russell

Link

Interactions between bluefish Pomatomus saltatrix (L.) and coastal sea-cage farms in the Mediterranean Sea, Pablo Sanchez-Jerez, Damian Fernandez-Jover, Just Bayle-Sempere, Carlos Valle, Tim Dempster, Fernando Tuya, and Francis Juanes

Link

Maintaining momentum: The challenge of a workplace physical activity program to sustain motivation and activity, Pascal Scherrer, Nadine Henley, Lynnaire Sheridan, Ruth Sibson, and Marie Ryan

Link

Sea-level changes and palaeo-ranges: reconstruction of ancient shorelines and river drainages and the phylogeography of the Australian land crayfish Engaeus sericatus Clark (Decapoda: Parastacidae), Mark B. Schultz, Daniel A. Ierdiaconou, Sarah A. Smith, Pierre Horwitz, Alastair MM Richardson, Keith A. Crandall, and Christopher M. Austin

Link

Information seeking behaviour of Electronic Document and Records Management Systems (EDRMS) Users: Implications for Records Management Practices. Part 2, Pauline Singh, Jane E Klobas, and Karen Anderson

Link

Subverting national internet censorship-an investigation into existing tools and techniques, Jason Smart, Kyle Tedeschi, Daniel Meakins, Peter Hannay, and Christopher Bolan

PDF

Bots Trained to Play Like a Human are More Fun, Bhuman Soni and Philip Hingston

Link

Industrial espionage from residual data: Risks and countermeasures, Ian Sutherland and Andy Jones