Follow

Submissions from 2008

Cold Boot Memory Acquisition: An Investigation Into Memory Freezing and Data Retention Claims, Peter Hannay and Andrew Woodward

Link

Evaluating the Usability Impacts of Security Interface Adjustments in Word 2007, M Helala, S. M Furnell, and M Papadaki

Link

Human exposure to metals in groundwater affected by acid sulfate soil disturbance, Andrea Hinwood, Pierre Horwitz, and Ruth Rogan

Link

Assessing urinary levoglucosan and methoxyphenols as biomarkers for use in woodsmoke exposure studies, Andrea L. Hinwood, Masooma Trout, John Murby, Caroline Barton, and Bob Symons

PDF

Old company records: The effect of custodial history on the arrangement and description of selected archival collections of business records, Donna Leanne Holmes

Link

Hydrological change escalates risk of ecosystem stress in Australia's threatened biodiversity hotspot, Pierre Horwitz, Don Bradshaw, Stephen Hopper, Peter Davies, Raymond Froend, and Felicity Bradshaw

Link

Media, government and manipulation: the cases of the two Gulf Wars, William Hutchinson

Link

Propaganda dilemmas for environmental security, William Hutchinson

Link

The Ethics of Information Operations, William Hutchinson

Link

Preventing the Acquisition of Data from Virtual Machine based Secure PortableExecution Environments, Peter James

Link

Secure Portable Execution Environments: A Review of Available Technologies, Peter James

Enacting design science with action research: An illustrative case study in methodology development, Michael Johnstone and J. R. Venable

PDF

The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market, Andrew Jones, Craig Valli, Glenn Dardick, and Iain Sutherland

PDF

Analysis of Information Remaining on Hand Held Devices for Sale on the Second Hand Market, Andrew Jones, Craig Valli, and Iain Sutherland

Link

Catching the Malicious Insider, Andy Jones

Link

Dealing with the malicious insider, Andy Jones and Carl Colwill

Modern Society as Risk Society: Implications of Modernity on Private Security, David Jurcic

PDF

Establishment of ecological functions in transplanted meadows of the seagrass Posidonia australis, Rebekah E. Kenna

Link

On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners, Gary Kessler

The Power of Simple Hands-On Cyberforensics Exercises: A Guide for Faculty, Gary Kessler and J Hoag

Extending the Multidisciplinary Learning Experience in Digital Forensics Using Mock Trials, Gary Kessler, R Simpson, and J Fry

Perceptions Of Successful Students: Lessons In The First Year Experience, Adrianne Kinnear, Heather Sparrow, Mary Boyce, and Sharon Middleton

Link

A Data-Driven Approach for Finding the Threshold Relevant to the Temporal Data Context of an Alarm of Interest, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li

Link

Analysis of Alarm Sequences in a Chemical Plant, Savo Kordic, Chiou Peng Lam, Jitian Xiao, and Huaizhong Li

The Use of Red Teaming in The Corporate Environment: A Study of Security Management, Vulnerabilities and Defence, G Lane and David Brooks

A framework of adaptive T-S type Rough-Fuzzy Inference Systems (ARFIS), Chang Su Lee, Anthony Zaknich, and Thomas Braunl

Temporal Difference Learning and Simulated Annealing for Optimal Control: A Case Study, Jinsong Leng, M Sathyaraj Beulah, and Lakhmi Jain

Link

Simulation and Reinforcement Learning with Soccer Agents, Jinsong Leng, Lakhmi Jain, and Colin Fyfe

A Role-based Framework for Multi-agent Teaming, Jinsong Leng, Jiuyong Li, and Lakhmi Jain

Link

DGL global strategies in DNA microarray gene expression analysis and data mining for human blood cancers, Dongguang Li

Link

Digital holographic image processing for the positive firearm identificaiton, Dongguang Li

Link

Surface structures on cleaved silicon by cleavage luminescence detection, Dongguang Li

DNA microarray technology and data analysis in cancer research, Shaoguang Li and Dongguang Li

Link

Movements of the western rock lobster (Panulirus cygnus) within shallow coastal waters using acoustic telemetry, Lachlan D. MacArthur, R Babcock, and Glenn A. Hyndes

Link

Nocturnally active western rock lobsters, Panulirus cygnus, forage close to shallow coastal reefs, Lachlan D. MacArthur, Glenn A. Hyndes, R. Babcock, and Mathew Vanderklift

PDF

Supporting Component Selection with a Suite of Classifiers, Valerie Maxville, Chiou Peng Lam, and J Armarego

Link

Field-Scale Demonstration of the Potential for Sewage to Remediate Acidic Mine Waters, Clinton Mccullough, Mark Lund, and Joel May

PDF

Current Challenges Facing Information and Communications Technology: A Manifesto For Change, Donald McDermid

Design Concerns in Creating New Diagrams, Donald Mcdermid

Link

Australian Defense Force Policy and the use of WPA2 as a security option for deployment of 802.11 wireless devices in the field, Drew Mceniery and Andrew Woodward

PDF

The impact of implementation of VOIP in call centres : A Western Australia perspective, Syed Moniruzzoha

PDF

Local polysaccharide-producing soil cyanobacteria as potential soil conditioners in Nakhonsawan Province, Thailand, Sumitra Moopayak

State Model Diagrams and Learning Strategy for Computer Networks, Chompu Nuangjamnong, Yuwanuch Gulatee, Stanislaw Maj, and Barbara Combes

PDF

The OSI Network Management Model - Capacity and performance management, Chompu Nuangjamnong, Stanislaw P. Maj, and David Veal

Link

Resource redundancy - A staffing factor using SFIA, C Nuangjamnong, S P. Maj, and D Veal

Link

Data Recovery from PalmmsgV001, Satheesaan Pasupatheswaran

Link

Email 'Message-IDs' helpful for forensic analysis?, Satheesaan Pasupatheswaran

Link

The erosive effect of tourism at an Aboriginal rock art site on the western edge of the arid zone in south-western Australia, Alana Rossi and Esmee Webb

PDF

Abundance, distribution and habitat requirements of the tree-stem trapdoor spider, Aganippe castellum (Arachnida : Idiopidae) in the eastern West Australian wheatbelt, Monica G. Russell

Link

Interactions between bluefish Pomatomus saltatrix (L.) and coastal sea-cage farms in the Mediterranean Sea, Pablo Sanchez-Jerez, Damian Fernandez-Jover, Just Bayle-Sempere, Carlos Valle, Tim Dempster, Fernando Tuya, and Francis Juanes

Link

Maintaining momentum: The challenge of a workplace physical activity program to sustain motivation and activity, Pascal Scherrer, Nadine Henley, Lynnaire Sheridan, Ruth Sibson, and Marie Ryan

Link

Sea-level changes and palaeo-ranges: reconstruction of ancient shorelines and river drainages and the phylogeography of the Australian land crayfish Engaeus sericatus Clark (Decapoda: Parastacidae), Mark B. Schultz, Daniel A. Ierdiaconou, Sarah A. Smith, Pierre Horwitz, Alastair MM Richardson, Keith A. Crandall, and Christopher M. Austin

Link

Information seeking behaviour of Electronic Document and Records Management Systems (EDRMS) Users: Implications for Records Management Practices. Part 2, Pauline Singh, Jane E Klobas, and Karen Anderson

Link

Subverting national internet censorship-an investigation into existing tools and techniques, Jason Smart, Kyle Tedeschi, Daniel Meakins, Peter Hannay, and Christopher Bolan

PDF

Bots Trained to Play Like a Human are More Fun, Bhuman Soni and Philip Hingston

Link

Industrial espionage from residual data: Risks and countermeasures, Ian Sutherland and Andy Jones

Link

Malware, viruses and log visualisation, Iain Swanson

Link

Virtual Environments Support Insider Security Violations, Iain Swanson and Patricia Williams

Link

Malware Detection and Removal: An Examination of Personal Anti-Virus Software, Patryk Szewczyk and Murray Brand

Link

The impact of U3 devices on forensic analysis, Ravi Tank and Patricia Williams

Link

Decision support systems to support international students: Potential for practice?, Khumphicha Tantisantisom and Judith Clayden

Link

Introducing a new technology to enhance community sustainability: An investigation of the possibilities of sun spots, Suppachart Tantisureeporn and Leisa J. Armstrong

Link

Annual changes in abundance of non-indigenous marine benthos on a very large spatial scale, Mads S. Thomsen, Thomas Wernberg, Peter Staehr, Brian Silliman, Alf Josefson, Dorte Krause-Jensen, and Nils Riisgaard-Petersen

Link

The 2007 IEEE CEC simulated car racing competition, Julian Togelius, Simon Lucas, Ho Duc Thang, Jonathan M. Garibaldi, Tomoharu Nakashima, Chin Hiong Tan, Itamar Elhanany, Shay Berant, Philip Hingston, Robert M. MacCallum, Thomas Haferlach, Aravind Gowrisankar, and Pete Burrow

Link

Network security isn’t all fun and games: An analysis of information transmitted while playing Team Fortress 2, Brett Turner and Andrew Woodward

Link

Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation, Brett Turner and Andrew Woodward

Link

Testing the 'abundant centre' hypothesis on endemic reef fishes in south-western Australia, Fernando Tuya, Thomas Wernberg, and Mads S. Thomsen

Link

The spatial arrangement of reefs alters the ecological patterns of fauna between interspersed algal habitats, Fernando Tuya, Thomas Wernberg, and Mads S. Thomsen

Link

A new species of soldier crab, Myctyris occidentalis (Crustacea: Decapoda: Brachyura: Mictyridae) from Western Australia, with congener comparisons, Joyleen Unno

Link

The Western Australian soldier crab, Mictyris Occidentalis Unno 2008 (Brachyura: Decapoda:Mictyridae): The importance of behaviour in design of sampling methods, Joyleen Unno

Link

Ichnological Studies of the Western Australian Soldier Crab Myctyris Occidentalis Unno 2008: Correlations of Field and Aquarium Observations, Joyleen Unno and V. Semeniuk

PDF

Food Resources of Carnaby’s Black-Cockatoo (Calyptorhynchus latirostris) in the Gnangara Sustainability Strategy study area, Leonie E. Valentine and William Stock

Link

The Malware Analysis Body of Knowledge (MABOK), Craig Valli and Murray William Brand

PDF

A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans, Craig Valli and Andrew Jones

Link

The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues, Craig Valli and Andrew Woodward

Link

Detached kelps from distant sources are a food subsidy for sea urchins, Mathew Vanderklift and Thomas Wernberg

Link

Ecological Engineering by a Mega-Grazer: White Rhino Impacts on a South African Savanna, Matthew S Waldram, William J Bond, and William Stock

Link

How was Mulka’s Cave, an Aboriginal rock art site near Hyden, in south-central Western Australia, used by the people who decorated its walls, when the present entrance was much smaller?, Esmee Webb and Alana Rossi

Link

Physical disturbance and subtidal habitat structure on open rocky coasts: Effects of wave exposure, extent and intensity, Thomas Wernberg and Sean Connell

Link

Short-term temporal dynamics of algal species in a subtidal kelp bed in relation to changes in environmental conditions and canopy biomass, Thomas Wernberg and Nisse Goldberg

Link

Population structure of turbinid gastropods on wave-exposed subtidal reefs: Effects of density, body size and algae on grazing behaviour, Thomas Wernberg, Melissa White, and Mathew Vanderklift

Link

A Practical Application of CMM to Medical Security Capability, Patricia Williams

Link

Can an Adapted Clinical Governance Model be used to Improve Medical Information Security?, Patricia Williams

Link

How addressing implementation issues can assist in medical information security governance, Patricia Williams

Link

In a "trusting" environment, everyone is responsible for information security, Patricia Williams

Link

Is There an Ideal Forensic Process?, Patricia Williams

Link

Can Intrusion Detection Implementation be Adapted to End-User Capabilities?, Patricia Williams and Renji Mathew

Link

Trust me. I am a Doctor. Your Records Are Safe..., Patricia Williams and Craig Valli

Link

Nutrient requirements of in vitro cultured Halophila ovalis and Posidoniq coriacea: nitrogen source, Julia G. Wilson and Ian J. Bennett

PDF

Using NEAT for Continuous Adaptation and Teamwork Formation in Pacman, Markus Wittkamp, Luigi Barone, and Philip Hingston

What Artefacts do Current BitTorrent Clients Leave Behind? , Andrew Woodward

Link

Forensic implications of using the firewire memory exploit with Microsoft Windows XP, Andrew Woodward and Peter Hannay

Link

Issues common to Australian critical infrastructure providers scada networks discovered through computer and network vulnerability analysis, Andrew Woodward and Craig Valli

Link

Mining evolving web sessions and clustering dynamic web documents for similarity-aware web content management, Jitian Xiao

PDF

A Type of Variation of Hamilton Path Problem with Applications, Jitian Xiao and Jun Wang

Link

A Preliminary Investigation of Decision Tree Models for Classification Accuracy Rates and Extracting Interpretable Rules in the Credit Scoring Task: A Case of the German Data Set, Jozef Zurada and Chiou Peng Lam

Submissions from 2007

Link

The Effect of Light Intensity on Seed Production and Quality in a Number of Australian Wild Oat (Avena fatua L.) Lines, Steve W. Adkins and Leisa Armstrong

Link

The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al Hajri and Patricia Williams

Link

Introduction to mobile phone flasher devices and considerations for their use in mobile phone forensics, Marwan Al-Zarouni

Link

A proof-of-concept project for utilizing U3 technology in incident response, Marwan Al-Zarouni and Haitham Al Hajri