Follow

Submissions from 2008

Link

Malware, viruses and log visualisation, Iain Swanson

Link

Virtual Environments Support Insider Security Violations, Iain Swanson and Patricia Williams

Link

Malware Detection and Removal: An Examination of Personal Anti-Virus Software, Patryk Szewczyk and Murray Brand

Link

The impact of U3 devices on forensic analysis, Ravi Tank and Patricia Williams

Link

Decision support systems to support international students: Potential for practice?, Khumphicha Tantisantisom and Judith Clayden

Link

Introducing a new technology to enhance community sustainability: An investigation of the possibilities of sun spots, Suppachart Tantisureeporn and Leisa J. Armstrong

Link

Annual changes in abundance of non-indigenous marine benthos on a very large spatial scale, Mads S. Thomsen, Thomas Wernberg, Peter Staehr, Brian Silliman, Alf Josefson, Dorte Krause-Jensen, and Nils Riisgaard-Petersen

Link

The 2007 IEEE CEC simulated car racing competition, Julian Togelius, Simon Lucas, Ho Duc Thang, Jonathan M. Garibaldi, Tomoharu Nakashima, Chin Hiong Tan, Itamar Elhanany, Shay Berant, Philip Hingston, Robert M. MacCallum, Thomas Haferlach, Aravind Gowrisankar, and Pete Burrow

Link

Network security isn’t all fun and games: An analysis of information transmitted while playing Team Fortress 2, Brett Turner and Andrew Woodward

Link

Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation, Brett Turner and Andrew Woodward

Link

Testing the 'abundant centre' hypothesis on endemic reef fishes in south-western Australia, Fernando Tuya, Thomas Wernberg, and Mads S. Thomsen

Link

The spatial arrangement of reefs alters the ecological patterns of fauna between interspersed algal habitats, Fernando Tuya, Thomas Wernberg, and Mads S. Thomsen

Link

A new species of soldier crab, Myctyris occidentalis (Crustacea: Decapoda: Brachyura: Mictyridae) from Western Australia, with congener comparisons, Joyleen Unno

Link

The Western Australian soldier crab, Mictyris Occidentalis Unno 2008 (Brachyura: Decapoda:Mictyridae): The importance of behaviour in design of sampling methods, Joyleen Unno

Link

Ichnological Studies of the Western Australian Soldier Crab Myctyris Occidentalis Unno 2008: Correlations of Field and Aquarium Observations, Joyleen Unno and V. Semeniuk

PDF

Food Resources of Carnaby’s Black-Cockatoo (Calyptorhynchus latirostris) in the Gnangara Sustainability Strategy study area, Leonie E. Valentine and William Stock

Link

The Malware Analysis Body of Knowledge (MABOK), Craig Valli and Murray William Brand

PDF

A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans, Craig Valli and Andrew Jones

Link

The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues, Craig Valli and Andrew Woodward

Link

Detached kelps from distant sources are a food subsidy for sea urchins, Mathew Vanderklift and Thomas Wernberg

Link

Ecological Engineering by a Mega-Grazer: White Rhino Impacts on a South African Savanna, Matthew S Waldram, William J Bond, and William Stock

Link

How was Mulka’s Cave, an Aboriginal rock art site near Hyden, in south-central Western Australia, used by the people who decorated its walls, when the present entrance was much smaller?, Esmee Webb and Alana Rossi

Link

Physical disturbance and subtidal habitat structure on open rocky coasts: Effects of wave exposure, extent and intensity, Thomas Wernberg and Sean Connell

Link

Short-term temporal dynamics of algal species in a subtidal kelp bed in relation to changes in environmental conditions and canopy biomass, Thomas Wernberg and Nisse Goldberg

Link

Population structure of turbinid gastropods on wave-exposed subtidal reefs: Effects of density, body size and algae on grazing behaviour, Thomas Wernberg, Melissa White, and Mathew Vanderklift

Link

A Practical Application of CMM to Medical Security Capability, Patricia Williams

Link

Can an Adapted Clinical Governance Model be used to Improve Medical Information Security?, Patricia Williams

Link

How addressing implementation issues can assist in medical information security governance, Patricia Williams

Link

In a "trusting" environment, everyone is responsible for information security, Patricia Williams

Link

Is There an Ideal Forensic Process?, Patricia Williams

Link

Can Intrusion Detection Implementation be Adapted to End-User Capabilities?, Patricia Williams and Renji Mathew

Link

Trust me. I am a Doctor. Your Records Are Safe..., Patricia Williams and Craig Valli

Link

Nutrient requirements of in vitro cultured Halophila ovalis and Posidoniq coriacea: nitrogen source, Julia G. Wilson and Ian J. Bennett

PDF

Using NEAT for Continuous Adaptation and Teamwork Formation in Pacman, Markus Wittkamp, Luigi Barone, and Philip Hingston

What Artefacts do Current BitTorrent Clients Leave Behind? , Andrew Woodward

Link

Forensic implications of using the firewire memory exploit with Microsoft Windows XP, Andrew Woodward and Peter Hannay

Link

Issues common to Australian critical infrastructure providers scada networks discovered through computer and network vulnerability analysis, Andrew Woodward and Craig Valli

Link

Mining evolving web sessions and clustering dynamic web documents for similarity-aware web content management, Jitian Xiao

PDF

A Type of Variation of Hamilton Path Problem with Applications, Jitian Xiao and Jun Wang

Link

A Preliminary Investigation of Decision Tree Models for Classification Accuracy Rates and Extracting Interpretable Rules in the Credit Scoring Task: A Case of the German Data Set, Jozef Zurada and Chiou Peng Lam

Submissions from 2007

Link

The Effect of Light Intensity on Seed Production and Quality in a Number of Australian Wild Oat (Avena fatua L.) Lines, Steve W. Adkins and Leisa Armstrong

Link

The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al Hajri and Patricia Williams

Link

Introduction to mobile phone flasher devices and considerations for their use in mobile phone forensics, Marwan Al-Zarouni

Link

A proof-of-concept project for utilizing U3 technology in incident response, Marwan Al-Zarouni and Haitham Al Hajri

Link

Taxonomy of iPhone activation and SIM unlocking methods, Marwan Al-Zarouni and Haitham Al Hajri

Link

The need for a security/privacy model for the health sector in Ghana, James Tetteh Ami-Narh and Patricia Williams

Link

Education and training for records professionals, Karen Anderson

Link

Global Archive and Record-keeping research agendas: Encouraging participation and getting over the hurdles, Karen Anderson

Link

The Application of Data Mining Techniques to Characterize Agricultural Soil Profiles, Leisa Armstrong, D Diepeveen, and R Maddern

Data mining can empower grower's crop decision making, L. Armstrong, Y. Vaugh, and D. Diepeveen

Link

Teaching PHP with security in mind, Greg Baatard

Capturing and Utilising Participation Awareness Data in a Groupware Environment, Gregory Baatard

Identifying Criteria which Influence the Effectiveness of Public Profiles in Online Learning Environments, Gregory Baatard

Reportal - Assessing an Online Collaborative Document Authoring Environment, Gregory Baatard

Link

Light-emitting diode-compatible probes for indirect detection of anions in CE, Peter Balding, Mary Boyce, MC Breadmore, and M Macka

Link

Managing digital forensic knowledge an applied approach, David P. Biros, Mark Weiser, and John Whitfield

Link

A single channel attack on 915MHz radio frequency identification systems, Christopher Bolan

Link

KILL features of RFID tags in a medical environment: Boon or burden?, Christopher Bolan

Link

Radio Frequency Identification: a review of low cost tag security proposals, Christopher Bolan

Link

Determination of additives and organic contaminants in food by CE and CEC, Mary Boyce

PDF

Use of the WFG Toolkit and PISA for Comparison of MOEAs, Lucas Bradstreet, Luigi Barone, Lyndon While, Simon Huband, and Philip Hingston

Link

Forensic Analysis Avoidance Techniques of Malware, Murray Brand

PDF

Population structure and management of the humpback whale (Megaptera novaeangliae) in Western Australia : investigation of the genetic status and structure of stock D/Antarctic area group IV, Muriel M. Brasseur

Knowledge networking for innovation: Social network analysis (SNA) and heuristics for knowledge diffusion, Mark Brogan

PDF

Network engineering for C-Commerce innovation: the role of trust, Mark Brogan and Leisa Armstrong

Theory, classroom practice and ICT: Exploring the connections, Christopher Brook and Barnard Clarkson

Link

Evolution of a database security course: Using non-enterprise teaching tools, Justin Brown

Teaching XML and XSLT in an Introduction to Markup Languages: Course and Content Design, Justin Brown

Link

The Western Australian regional forest agreement: Economic rationalism and the normalisation of political closure, Martin Brueckner

PDF

The effect of irrigation on soil water availability and the plant water relations of three species growing on revegetated bauxite residue disposal areas, Sharyn Burgess

PDF

Retrospective analysis of epiphyte assemblages in relation to seagrass loss in a eutrophic coastal embayment, ML Cambridge, JR How, Paul Lavery, and MA Vanderklift

Link

Dealing with Concurrent Regions during Scenario Generation from Activity Diagrams, Robert Chandler, Chiou Peng Lam, and Huaizhong Li

Mediation-based Data Integration System, Chaiyaporn Chirathamjaree

PDF

The Use of Context-free Grammars in Isolated Word Recognition, Chaiyaporn Chirathamjaree

Link

Advanced User Authentication for Mobile Devices, NL Clarke and Steven Furnell

Link

Authenticating mobile phone users using keystroke analysis, NL Clarke and Steven Furnell

PDF

Morphological, growth and meadow characteristics of the seagrass Posidonia sinuosa along a depth-related gradient of light availability, CJ Collier, Paul Lavery, RJ Masini, and PJ Ralph

Link

The importance of human factors when assessing outsourcing security risks, Carl Colwill and Andy Jones

Link

The search for information and the Net Generation, Barbara Combes

Link

Information Dichotomy Article Schools Version, Barbara Combes and Robyn Valli

Link

The future of learning objects in educational programs, Barbara Combes and Robyn Valli

Negative interactions: The influence of predators and herbivores on prey and ecological systems, S Connell and Mathew Vanderklift

Link

The role of different types of detached macrophytes in the food and habitat choice of a surf-zone inhabiting amphipod, Karen R. Crawley and Glenn A. Hyndes

Link

Variation among diets in discrimination of delta13C and delta15N in the amphipod Allorchestes compressa, Karen R. Crawley, Glenn A. Hyndes, and Mathew A. Vanderklift

PDF

The use of detached kelp (Ecklonia radiata) by seagrass-associated mesograzers in temperate South-Western Australia, Christopher Doropoulos

Link

Transformation Methodology for UML 2.0 Activity Diagram into Colored Petri Nets, Usman Farooq, Chiou Peng Lam, and Huaizhong Li

PDF

Improving decision making : The case for internal intelligence functions, Charlene Kaye Farr

Link

Assessing nitrogen fixation in mixed- and single-species plantations of Eucalyptus globulus and Acacia mearnsii, DI Forrester, M Schortemeyer, William Stock, J. Bauhus, PK Khanna, and AL Cowie

Link

Anisohydric but Isohydrodynamic: Seasonally Constant Plant Water Potential Gradient Explained by a Stomatal Control Mechanism Incorporating Variable Plant Hydraulic Conductance, Peter Franks, Paul Drake, and Raymond Froend

Link

An Assessment of Website Password Practices, Steven Furnell

Link

Making Security Usable: Are Things Improving?, Steven Furnell

Link

Assessing the Security Perceptions of Personal Internet Users, Steven Furnell, P Bryant, and AD Phippen

PDF

A study of the parallelisation of multiobjective evolutionary algorithms in a cluster environment, Sadeesha Gamhewa

Link

Excerpta Botanica - a valuable bibliographical source for vegetation science, David Goodall

Link

Information Security Surveys: A Review of the Methodologies, the Critics and a Pragmatic Approach to their Purposes and Usage, Alexis Guillot and Susan Kennedy

Technological Barriers to Successful eLearning in Computer Science, Yuwanuch Gulatee and Barbara Combes

PDF

The contribution of heavy industry and commercial activity at Canning Vale to the loads of nitrogen and phosphorus released in the Bannister Creek catchment area, Sandra Hall

Link

Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment, Peter Hannay and Peter James

Link

A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase I proof of concept, Peter Hannay, Andrew Woodward, and Nicholas Cope

Link

Network security – Is IP telephony helping the cause?, Paul Hansen and Andrew Woodward