Submissions from 2010
Hardware Implementation of the Self Assessment Manikin, Warren Creemers and Philip Hingston
Phreatophytic Vegetation Response to Climatic and Abstraction-Induced Groundwater Drawdown: Examples of Long-Term Spatial and Temporal Variability in Community Response, Raymond Froend and Beate Sommer
Light reductions drive macroinvertebrate changes in Amphibolis griffithii seagrass habitat, Adam Gartner, Paul S. Lavery, Kathryn McMahon, Anne Brearley, and Helen Barwick
Fireguard - A Secure Browser with Reduced Forensic Footprint, Don Griffiths and Peter James
Risk mitigation and culture: an examination of the utility of cultural cognition theory in determining operational security cultures in a healthcare environment, Melvyn Griffiths
An investigation into online teaching and the delivery of computer science topics : practice, content and environmental factors, Yuwanuch Gulatee
The 2010 IDN Homograph Attack Mitigation Survey, Peter Hannay and Christopher Bolan
Differentiation of benthic marine primary producers using stable isotopes and fatty acids: Implications to food web studies, Christine E. Hanson, Glenn A. Hyndes, and Shao Fang Wang
A New Design for a Turing Test for Bots, Philip Hingston
Evolving Group Strategies for IPD, Philip Hingston
RedTNet: A network model for strategy games, Philip Hingston, Mike Preuss, and Daniel Spierling
A Distributed and Cooperative User Authentication Framework, C.G. Hocking, Steven Furnell, Nathan Clarke, and P L Reynolds
The conservation status of freshwater crayfish: the basis for concern, listing and recovery processes, and community involvement, Pierre Horwitz
Analysis of Hu's Moment Invariants on Image Scaling and Rotation, Zhihu Huang and Jinsong Leng
An Online Ballistics Imaging System for Firearm Identification, Zhihu Huang and Jinsong Leng
A Novel Binarization Algorithm for Ballistics Imaging Systems, Zhihu Huang and Jinsong Leng
New technologies: dissonance, influence and radical behaviours, William E. Hutchinson
Influence Operations and Behavioural Change, William Hutchinson and Matthew Warren
Assessing image-based authentication techniques in a web-based environment, M. Z. Jali, Steven M. Furnell, and P. S. Dowland
How do you make information security user friendly?, Andrew Jones
Digital forensics and the issues of identity, Andrew Jones and Thomas Martin
Remote access forensics for VNC and RDP on Windows platform, Paresh Kerai
Predator-Baiting Experiments for the Conservation of Rock-Wallabies in Western Australia: 25-Year Review with Recent Advances, J E. Kinnear, C J. Krebs, Craig Pentland, P Orell, Christopher Holme, and Reino Karvinen
Patterns Relevant to the Temporal Data-Context of an Alarm of Interest, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li
Computational Intelligence for Functional Testing, Chiou Peng Lam
Personal exposure of children to formaldehyde in Perth, Western Australia, Victoria S. Lazenby
Adaptive T-S type Rough-Fuzzy Inference Systems (ARFIS) for Mobile Robot Navigation, Chang Su Lee
Quantitative determination of glucoraphanin in Brassica vegetables by micellar electrokinetic capillary chromatography, Iris Lee, Mary C. Boyce, and Michael Breadmore
A Novel Subspace Outlier Detection Approach in High Dimensional Data Sets, Jinsong Leng
Mining Outliers in Correlated Subspaces for High Dimensional Data Sets, Jinsong Leng and Tzung-Pei Hong
Analyzing Texture Features of Ballistic Projectile Images for Firearm Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li
Optical Imaging and Analysis of Firing-pin Marks for Ballistics Identification, Jinsong Leng, Zhihu Huang, and Dongguang Li
A Wrapper-Based Feature Selection for Analysis of Large Data Sets, Jinsong Leng, Craig Valli, and Leisa Armstrong
Android forensics: Simplifying cell phone examinations, Jeff Lessard and Gary Kessler
A novel ballistics imaging system for firearm identification, Dongguang Li
A novel binarization algorithm for ballistics firearm identification, Dongguang Li
Color seal segmentation and identification, Dongguang Li
Behaviour profiling on mobile devices, Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland
Cross-Cultural Education: Learning Methodology and Behaviour Analysis for Asian Students in IT Field of Australian Universities, Jie Lu, Kum Chin, Juan Yao, Jun Xu, and Jitian Xiao
State Model Diagrams - A Universal, Model Driven Method for Network System Configuration and Management, Stanislaw Maj
An Evaluation of Firewall Configuration Methods, Stanislaw Maj, Woratat Makasiranondh, and David Veal
State Model Diagrams - A Universal Runtime Network Management Tool, Stanislaw Maj, Woratat Makasiranondh, and David Veal
An Evaluation of State Model Diagrams for Secure Network Configuration and Management, Stanislaw Maj and David Veal
Evaluating Layer 3 Device Tunnelling and Access Control List Security Bandwidths Using B-node Theory, Stanislaw Maj and David Veal
Parsimony Analysis - A Novel Method of Structured Knowledge Representation for Teaching Computer Science, Stanislaw Maj and David Veal
Using State Model Diagrams to Manage Secure Layer 2 Switches, Stanislaw Maj and David Veal
A Preliminary Evaluation of the new Cisco Network Security Course, Stanislaw Maj, David Veal, and Lotfi Yassa
An integrated multimedia based platform for teaching network security, Woratat Makasiranondh, Stanislaw Maj, and David Veal
Critical infrastructure protection risk modelling with games technology, Martin Masek, Adrian Boeing, and William Bailey
Vulnerability of organic acid tolerant wetland biota to the effects of inorganic acidification, Clinton D. McCullough and Pierre Horwitz
Factors affecting the sustainability of computer information systems: embedding new technology into a hospital environment, Donald Mcdermid, Linda Kristjanson, and Nigel Spry
An information security governance encounter for Australian primary care health providers, Donald Mcdermid, Rachel Mahncke, and Patricia Williams
Estimation of prenatal exposure to glyphosate using maternal exposure assessment techniques, Heather L. McQueen
The growing need for on-scene triage of mobile devices, Richard P. Mislan, Eoghan Casey, and Gary C. Kessler
An intelligence model for terrorist incident prevention for Australian police: A systemic investigation, Simon O’Rourke
Breaches in Medical Information Security: The Problem of Reporting, Neha Patel and Patricia Williams
Defining appropriate options for post-closure land use of the Tamala Park Landfill in Western Australia, Marie Lourdes Raphael
Information technology capability within small-medium enterprises, Aurelio Ravarini
Employee Engagement with a Corporate Physical Activity Program: the Global Corporate Challenge, Pascal Scherrer, Lynnaire Sheridan, Ruth Sibson, Maria Ryan, and Nadine Henley
Interrogation of Water Catchment Data Sets Using Data Mining Techniques, Ajdin Sehovic, Leisa Armstrong, and Dean Diepeveen
Testing an exergame for effectiveness and attractiveness, Jeffrey Ronald Sinclair, Philip Hingston, Martin Masek, and Kazunori Nosaka
Assemblage turnover and taxonomic sufficiency of subtidal macroalgae at multiplespatial scales, Dan A. Smale, Gary A. Kendrick, and Thomas Wernberg
An Evaluation of Agile Software Methodology Techniques, Anuradha Sutharshan and Stanislaw Maj
An Efficient Method for Collecting Large Samples of Live Copepods Free from Detritus, Carl J Svensson, Glenn Hyndes, and Paul Lavery
The ADSL Router Forensics Process, Patryk Szewczyk
Ignorant Experts: Computer and Network Security Support From Internet Service Providers, Patryk Szewczyk and Craig Valli
An Analysis of Information Security Awareness within Home and Work Environments, Shuhaili Talib, Nathan Clarke, and Steven Furnell
The Western Australian charter boat industry: Working towards long-term sustainability, Carli Telfer
Ecological performance and possible origin of a ubiquitous but under-studied gastropod, Mad S. Thomsen, Thomas Wernberg, Fernando Tuya, and Brian Silliman
Proximity to rocky reefs alters the balance between positive and negative effects on seagrass fauna, Fernando Tuya, Mathew Vanderklift, Glenn Hyndes, Thomas Wernberg, Mads Thomsen, and Christine Hanson
Application of a Data Mining Framework for the Identification of Agricultural Production Areas in WA, Yunous Vagh, Leisa Armstrong, and Dean Diepeveen
Developing VoIP Router honeypots, Craig Valli and Mohammed Al Lawati
Geotagging Where Cyberspace Comes to Your Place, Craig Valli and Peter Hannay
Stable isotopes reveal a consistent consumer-diet relationship across hundreds of kilometres, Mathew A. Vanderklift and Thomas Wernberg
Fire in Rangelands and its Role in Management, Eddie Van Etten
A Graphical User Interface for the Visually Impaired - an Evaluation, David Veal and Stanislaw Maj
Origin, diversification and classification of the Australasian genus Dracophyllum (Richeeae, Ericaceae), Steven J. Wagstaff, Murray I. Dawson, Stephanus Venter, Jerome Munzinger, Darren M. Crayn, Dorothy A. Steane, and Kristina Lemson
Investigating the surface of solid gold electrode to improve the sensitivity of anodic stripping voltammetry for arsenic detection, Magdalena Wajrak
Investigation of electrochemically deposited arsenic on the surface of solid gold electrodes using SIMS, SEM and synchrotron soft X-rays, Magdalena Wajrak, Rob Hart, and Kathryn Prince
Turban Snails as Habitat for Foliose Algae: Contrasting Geographical Patterns in Species Richness, Thomas Wernberg, Fernando Tuya, Mads Thomsen, and Gary Kendrick
Contribution of temporal and spatial components to morphological variation in the kelp Ecklonia (Laminariales), Thomas Wernberg and Mathew Vanderklift
An ill-defined problem : effective biomedical informatics curriculum?, Patricia Williams
Improving Medical Information Security using Contextualization Models, Patricia Williams
Medical Information Security: Is it all too hard?, Patricia Williams
Exogenous Putrescine, Not Spermine or Spermidine, Enhances Root Mycorrhizal Development and Plant Growth of Trifoliate Orange (Poncirus trifoliata) seedlings, Qiangsheng Wu, Ying-Ning Zou, and Xinhua He
Construction of Similarity Profile of Dynamic Web Documents for Similarity-aware Web Content Management, Jitian Xiao
Cross-cultural learning challenges and teaching strategies for first-year Asian students in Australian universities, Jitian Xiao, Jie Lu, Kum Chin, Jun Xu, and Juan Yao
Autonomous Bee Colony Optimization for Multi-objective Function, F Zeng, James Decraene, Malcolm Low, Philip Hingston, C Wentong, Z Suiping, and M Chandramohan
Submissions from 2009
The challenge of preserving rural industries and traditions in ultraperipheral Europe: Evidence from the Canary Islands, Abel D. Alonso, Pascal Scherrer, and Lynnaire Sheridan
Media hegemony, activism and identity: Muslim women re-presenting Muslim women, Anne Aly
The terrorists' audience: A model of internet radicalisation, Anne Aly
An Intervention to Increase Positive Attitudes and Address Misconceptions About Australian Muslims: A Call for Education and Open Mindedness, Anne Aly, Anne Pedersen, Lisa Hartley, and Craig McGarty
An evaluation of Methodologies for eAgriculture in an Australian Context, Leisa J. Armstrong and Dean A. Diepeveen
An information-based decision support framework for eAgriculture, Leisa J. Armstrong and Dean A. Diepeveen
Feeding ecology of green turtles (Chelonia mydas) from Shoalwater Bay, Australia, Karen Arthur, Kathryn Mcmahon, Col Limpus, and William Dennison
Risk culture influences in internet safety and security, S Atkinson, S M. Furnell, and A.D. Phippen
Consensual Security Risk Assessment: Overcoming Bias, Conflicting Interests and Parochialism, Benjamin Beard and David Brooks