Submissions from 2009
SCADA Security - Slowly Circling a Disaster Area, Craig Valli and Andrew Woodward
Intensity of herbivory on kelp by fish and sea urchins differs between inshore and offshore reefs, Mathew Vanderklift, Paul Lavery, and Kris Waddington
Inter-annual rainfall variability in arid Australia: greater than elsewhere?, Eddie Van Etten
Response of fringing vegetation to flooding and discharge of hypersaline water at Lake Austin, Western Australia, Eddie Van Etten and Simone Vellekoop
Dynamic patterns for low vision internet working students, David Veal, Stanislaw Maj, and Woratat Makasiranondh
Infield Detection of Arsenic Using Portable Digital Voltameter, PDV6000, Magdalena Wajrak
Utilisation and Validation of a Rapid, On-Site Capability for Metal Analysis, Magdalena Wajrak and Peter McCafferty
Authentic Assessment - “ Mission Possible or Mission Impossible?, Magdalena Wajrak and Timothy Perkins
The Science of Conservation Biology, Grant Wardell-Johnson and Pierre Horwitz
Spatial variation in juvenile and adult Ecklonia radiata (Laminariales) sporophytes, Thomas Wernberg
Metabolomic investigation of a new rat model of autosomal recessive polycystic kidney disease, Hayley White
Capturing Culture in Medical Information Security Research, Patricia Williams
What does security culture look like for small organizations?, Patricia Williams
Historical nitrogen content of bryophyte tissue as an indicator of increased nitrogen deposition in the Cape Metropolitan Area, South Africa, Daniel Wilson, William Stock, and Terry Hedderson
Children's exposure to lead and nickel in Esperance - A case study, Matthew Tristan Winters
Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?, Andrew Woodward
When you can't see the forest for the domains: why a two forest model should be used to achieve logical segregation between SCADA and corporate networks, Andrew Woodward and Brett Turner
A Match-based Approach to Optimize Conformance Test Sequence Generation using Mp-method, Jitian Xiao
Caching Dynamic Web Documents using Similarity Profiles, Jitian Xiao
Submissions from 2008
Acari (mite) assemblages under plantations of bluegum, Eucalyptus globulus, in southwestern Australia, Honi Adolphson and Adrianne Kinnear
An overview of mobile embedded memory and forensics methodology, Haitham Al-Hajri
iPhone forensics methodology and tools, Haitham Al-Hajri and Krishnun Sansurooah
Importance of tasting rooms for Canary Islands' wineries, Abel D. Alonso, Lynnaire Sheridan, and Pascal Scherrer
Wine tourism in the Canary Islands: An exploratory study, Abel Duarte Alonso, Lynnaire Sheridan, and Pascal Scherrer
Digital forensics and the legal system: A dilemma of our times, James Tetteh Ami-Narh and Patricia Williams
Bibliorakali: The Australian Water Rat, Hydromys Chrysogaster Geoffroy, 1804 (Muridae: Hydromyinae), a subject-specific bibliography, Christie Atkinson, Mark Lund, and Keith Morris
GroupShare - Designing an awareness rich online groupware system, G Baatard
Participation awareness in a groupware environment: Presentation issues, Gregory Baatard
Linear transformation methods for multivariate geostatistical simulation, Ellen Bandarian
Morphology Independent Dynamic Locomotion Control for Virtual Characters, Adrian Boeing
Survey and future trends of efficient cryptographic function implementations on GPGPUs, Adrian Boeing
ImprovCV: Open component based automotive vision, Adrian Boeing and Thomas Braunl
Protecting critical infrastructure with games technology, Adrian Boeing, Martin Masek, and William Bailey
A Review of the Electronic Product Code Standards for RFID Technology, Christopher Bolan
RFID communications - Who is listening?, Christopher Bolan
Student learning and evaluation in analytical chemistry using a problem-oriented approach and portfolio assessment, Mary C. Boyce and Kuki Singh
You've got mail: Accountability and end user attitudes to email management, Mark Brogan and Susan Vreugdenburg
Public street CCTV: a psychometric study of social risk, David Brooks
Defining the science of private security through knowledge categorisation, David J. Brooks
Teaching strategies in large class programming courses, J Brown and G Baatard
Integrated Forensics Capabilities into Web Applications: Teaching Students the Why and How, Justin Brown and Gregory Baatard
Deployment of Keystroke Analysis on a Smartphone, A Buchoux and Nathan Clarke
Identification of hairy, smooth and hybrid marron (Decapoda: Parastacidae) in the Margaret River: Morphology and allozymes, John JS Bunn, Annette Koenders, Christopher M. Austin, and Pierre Horwitz
Learning Java with Sun SPOTS, Craig Caulfield, S Paul Maj, and David Veal
Soft Computing In The Forecasting Of The Stock Exchange Of Thailand, Suchira Chaigusin, Chaiyaporn Chirathamjaree, and Judith Clayden
The Use of Neural Networks in the Prediction of the Stock Exchange of Thailand (SET) Index, Suchira Chaigusin, Chaiyaporn Chirathamjaree, and Judith Clayden
Physiological characteristics of the seagrass Posidonia sinuosa along a depth-related gradient of light availability, Catherine Collier, Paul Lavery, Peter Ralph, and Ray Masini
Evaluation a critical point on the path to intelligence, Jeffrey Corkill
Professional Intelligence Judgement Artistry, Jeffrey Corkill
Nutrient concentration ratios and co-limitation in South African grasslands, Joseph M Craine, Carl Morrow, and William Stock
Drought traits of Eucalyptus gomphocephala in Yalgorup National Park, Paul L. Drake
An exploration of the perceptions domestic groundwater users hold in relation to Perth's groundwater resources, Beverley Drayton-Witty
Malware Analysis Framework from Static to Dynamic Analysis, Fadi El-moussa and Andrew Jones
Mutation Analysis for the Evaluation of AD Models, Usman Farooq and Chiou Peng Lam
Towards Automated Test Sequence Generation, Usman Farooq, Chiou Peng Lam, and Huaizhong Li
Testing parallelization paradigms for MOEAs, Sadeesha Gamhewa and Philip Hingston
Water centrality for water and society, Ute Goeft
Human evolution — Where from here?, David W. Goodall
Aviation infrastructure protection: Threats, contingency plans and the importance of networks, Melvyn Griffiths
Case analysis of information security risk perceptions, Alexis Guillot
Factors that influence successful online teaching and learning programs in technical computer science subjects, Yuwanuch Gulatee, Justin Brown, and Barbara Combes
Virtual Learning Spaces in Technical Computer Science Subjects: A New Teaching and Learning Paradigm, Yuwanuch Gulatee and Barbara Combes
Discussion on Sustainability of Arid Land Afforestation with Hardpan Blasting from Soil Chemical Assessment, Hiroyuki Hamano, N Saito, S Kato, H Kitahara, N Takahashi, Koichi Yamada, and Toshinori Kojima
Forensic acquisition and analysis of the TomTom one satellite navigation unit, Peter Hannay
Cold Boot Memory Acquisition: An Investigation Into Memory Freezing and Data Retention Claims, Peter Hannay and Andrew Woodward
Evaluating the Usability Impacts of Security Interface Adjustments in Word 2007, M Helala, S. M Furnell, and M Papadaki
Human exposure to metals in groundwater affected by acid sulfate soil disturbance, Andrea Hinwood, Pierre Horwitz, and Ruth Rogan
Assessing urinary levoglucosan and methoxyphenols as biomarkers for use in woodsmoke exposure studies, Andrea L. Hinwood, Masooma Trout, John Murby, Caroline Barton, and Bob Symons
Old company records: The effect of custodial history on the arrangement and description of selected archival collections of business records, Donna Leanne Holmes
Hydrological change escalates risk of ecosystem stress in Australia's threatened biodiversity hotspot, Pierre Horwitz, Don Bradshaw, Stephen Hopper, Peter Davies, Raymond Froend, and Felicity Bradshaw
Media, government and manipulation: the cases of the two Gulf Wars, William Hutchinson
Propaganda dilemmas for environmental security, William Hutchinson
The Ethics of Information Operations, William Hutchinson
Preventing the Acquisition of Data from Virtual Machine based Secure PortableExecution Environments, Peter James
Secure Portable Execution Environments: A Review of Available Technologies, Peter James
Enacting design science with action research: An illustrative case study in methodology development, Michael Johnstone and J. R. Venable
The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, and Iain Sutherland
Analysis of Information Remaining on Hand Held Devices for Sale on the Second Hand Market, Andrew Jones, Craig Valli, and Iain Sutherland
Catching the Malicious Insider, Andy Jones
Dealing with the malicious insider, Andy Jones and Carl Colwill
Modern Society as Risk Society: Implications of Modernity on Private Security, David Jurcic
Establishment of ecological functions in transplanted meadows of the seagrass Posidonia australis, Rebekah E. Kenna
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners, Gary Kessler
The Power of Simple Hands-On Cyberforensics Exercises: A Guide for Faculty, Gary Kessler and J Hoag
Extending the Multidisciplinary Learning Experience in Digital Forensics Using Mock Trials, Gary Kessler, R Simpson, and J Fry
Perceptions Of Successful Students: Lessons In The First Year Experience, Adrianne Kinnear, Heather Sparrow, Mary Boyce, and Sharon Middleton
A Data-Driven Approach for Finding the Threshold Relevant to the Temporal Data Context of an Alarm of Interest, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li
Analysis of Alarm Sequences in a Chemical Plant, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li
The Use of Red Teaming in The Corporate Environment: A Study of Security Management, Vulnerabilities and Defence, G Lane and David Brooks
A framework of adaptive T-S type Rough-Fuzzy Inference Systems (ARFIS), Chang Su Lee, Anthony Zaknich, and Thomas Braunl
Temporal Difference Learning and Simulated Annealing for Optimal Control: A Case Study, Jinsong Leng, M Sathyaraj Beulah, and Lakhmi Jain
Simulation and Reinforcement Learning with Soccer Agents, Jinsong Leng, Lakhmi Jain, and Colin Fyfe
A Role-based Framework for Multi-agent Teaming, Jinsong Leng, Jiuyong Li, and Lakhmi Jain
DGL global strategies in DNA microarray gene expression analysis and data mining for human blood cancers, Dongguang Li
Digital holographic image processing for the positive firearm identificaiton, Dongguang Li
Surface structures on cleaved silicon by cleavage luminescence detection, Dongguang Li
DNA microarray technology and data analysis in cancer research, Shaoguang Li and Dongguang Li
Movements of the western rock lobster (Panulirus cygnus) within shallow coastal waters using acoustic telemetry, Lachlan D. MacArthur, R Babcock, and Glenn A. Hyndes
Nocturnally active western rock lobsters, Panulirus cygnus, forage close to shallow coastal reefs, Lachlan D. MacArthur, Glenn A. Hyndes, R. Babcock, and Mathew Vanderklift