Follow

Submissions from 2006

Link

Structural analysis of the log files of the ICQ client version 2003b, Kim Morfitt

PDF

A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients, Kim Morfitt and Craig Valli

Link

Achieving Automated Intrusion Response: A Prototype Implementation, Maria Papadaki and Steven Furnell

PDF

Pollen characteristics of grevillea species determined by in vitro germination, Rebecca Parsons

Link

Nearshore sea temperature variability off Rottnest Island (Western Australia) derived from satellite data, Alan Pearce, Fabienne Faskel, and Glenn Hyndes

PDF

The Hillarys Transect (1): Seasonal and cross-shelf variability of physical and chemical water properties off Perth, Western Australia, 1996-98, Alan Pearce, Mervyn Lynch, and Christine Hanson

Link

Atmospheric nitrogen deposition in world biodiversity hotspots: the need for a greater global perspective in assessing N deposition impacts, Gareth H Phoenix, W Kevin Hicks, Steve Cinderby, Johan Kuylenstierna, William Stock, Frank Dentener, Ken Giller, Amy Austin, Rod Lefroy, Ben Gimeno, Mike Ashmore, and Philip Ineson

Link

Designing and explaining programs with a literate pseudocode, Geoffrey Roy

Link

An assessment of threats of the Physical and MAC Address Layers in WiMAX/802.16, Krishnun Sansurooah

Link

Taxonomy of computer forensics methodologies and procedures for digital evidence seizure, Krishnun Sansurooah

Link

The Courage of their Convictions: Creating Cultural Landscapes in 1930s Western Australia, Joanna Sassoon

Link

Managing visitor impacts in the Australian Alps: a case study in informal track development and track recovery, Pascal Scherrer and Andrew Growcock

Link

Managing Visitor Impacts Along Australia's Remote Kimberley Coast - The Forgotten Dimension of Balancing Country, Pascal Scherrer, Amanda J. Smith, and Ross Dowling

Link

Mediated identification, David Thomas Shaw

Link

A Digital forensic practitioner's guide to giving evidence in a court of law, Shayne Sherman

Link

Hunt warm, rest cool: Bioenergetic efficiency underlying diel vertical migration of a benthic shark, David Sims, Victoria Wearmouth, Emily Southall, Jackie Hill, Philippa Moore, Kate Rawlinson, Neil Hutchinson, Georgina Budd, David Righton, Julian Metcalfe, J Nash, and David Morritt

Link

Trends in the Development of Security Technology, Clifton Smith

PDF

Drying and re-wetting of organic wetland sediments: Biogeochemistry and implications for wetland management, Beate Sommer

PDF

Genetic diversity and gene flow in fragmented populations of the rare shrub, Calothamnus sp. Whicher, Sean Stankowski

Link

Effects of water availability, nitrogen supply and atmospheric CO2 concentrations on plant nitrogen natural abundance values, William Stock and John Evans

PDF

Soil community structure and litter decomposition under irrigated Eucalyptus Globulus in South Western Australia, Derek J. Swarts

PDF

An attitude and perception study of wireless network usage in home environments, Patryk Szewczyk

Link

Personal Firewalls - Testing Robustness, Patryk Szewczyk and Craig Valli

Preceptions of Problem Solving through a Pair Programming Technique, Julian Terry, Patricia Williams, and Rachel Mahncke

Link

Spatio-temporal distribution patterns of the invasive macroalga Sargassum muticum within a Danish Sargassum-bed, Mads Thomsen, Thomas Wernberg, Peter Staehr, and Morten Pedersen

PDF

Spatial patterns and response to wave exposure of shallow water algal assemblages across the Canarian Archipelago: A multi-scaled approach, Fernando Tuya and Ricardo J Haroun

Link

Is there a link between the type of habitat and the patterns of abundance of holothurians in shallow rocky reefs?, Fernando Tuya, Jose Hernandez, and Sabrina Clemente

Link

Spatio-temporal variability in a key herbivore, the long-spined black sea urchin (Diadema antillarum, Echinodermata: Echinoidea) in the Canary Islands, Fernando Tuya, Leonor Ortega-Borges, Armando Rosario-Pinilla, and Ricardo J Haroun

PDF

Changes in demersal wild fish aggregations beneath a sea-cage fish farm after the cessation of farming, Fernando Tuya, Pablo Sanchez-Jerez, Tim Dempster, Arturo Boyra, and R Haroun

Link

Assessment of the effectiveness of two marine reserves in the Canary Islands (eastern Atlantic), F. Tuya, C. Garcia-Diez, F. Espino, and R. J. Haroun

Link

Tags at war: A review of the United States Department of Defence RFID tag data standard, Nadezda Urosevic and Christopher Bolan

PDF

An investigation into the use of information and communication technology (ICT) by senior educators in Thailand, Nattavee Utakrit

PDF

A Preliminary Investigation into Malware Propagation on Australian ISP Networks using the mwcollect Malware Collector daemon, Craig Valli

PDF

Establishing a vendor neutral skills based framework for digital forensics curriculum development and competence assessment, Craig Valli

PDF

SQL Injection - Threats to Medical Systems: The Issues and Countermeasures, Craig Valli

PDF

The Insider Threat to Medical Records: Has the network Age Changed anything?, Craig Valli

Use of bootable Linux CDs for the delivery of educational course content, Craig Valli

Link

Differences in trophic position among sympatric sea urchin species, Mathew Vanderklift, Gary Kendrick, and Albertus Smit

Link

Belguim's intelligence community: new challenges and opportunities, Maarten Vanhorenbeeck

PDF

A comparison of logging and fire disturbance on biophysical attributes of the Northern jarrah forest, Alexander W. Watson

Link

Telemedicine and the digital door doctor, Darren Webb and Patricia Williams

Link

Scale of impact determines early post-disturbance assemblage structure in subtidal Fucus beds in the Baltic Sea (Bornholm, Denmark), Thomas Wernberg

Link

Export of detached macroalgae from reefs to adjacent seagrass beds, Thomas Wernberg, Mathew Vanderklift, Jason How, and Paul Lavery

PDF

A Faster Algorithm for Calculating Hypervolume, Lyndon While, Philip Hingston, Luigi Barone, and Simon Huband

Link

The Derivation of a Conceptual Model for IT Security Outsourcing, David Wilde, Matthew Warren, and William Hutchinson

Link

Outsourcing system security: A theoretical perspective, W D Wilde, M J. Warren, and W Hutchinson

Link

Forensics analysis of the contents of Nokia mobile phones, Brendan Williamson, Paul Apeldoorn, Ben Cheam, and Meaghan Mcdonald

Link

Apprasing information security rituals in primary care medical practice, Patricia Williams

Link

Making Research Real: Is Action Research a Suitable Methodology for Medical Information Security Investigations?, Patricia Williams

Link

Security immunization using basic countermeasures, Patricia Williams

Link

The role of standards in medical information security: an opportunity for improvement, Patricia Williams

Examination performance: Improvement through critical thinking, Patricia Williams and Rachel Mahncke

Link

Primary care information security: a case study for practical assistance, Patricia Williams and Rachel Mahncke

Link

Shared Electronic Health Records: A changing landscape for security in medical practice, Patricia Williams and Rachel Mahncke

PDF

An investigation into a community information database system in the northeast of Thailand: Community empowerment through community learning centres, Chumnong Wongchachom

Data Security and wireless networks - mutually exclusive?, Andrew Woodward

Link

LIARS: Laptop Inspector and Recovery System, Andrew Woodward

PDF

A Comparison of Heuristics for Scheduling Spatial Clusters to Reduce I/O Cost in Spatial Join Processing, Jitian Xiao

PDF

Agent-based Similarity-aware Web Document Pre-fetching, Jitian Xiao

PDF

Clustering Spatial Data for Join Operations Using Match-based Partition, Jitian Xiao

Link

Reformulation of the Generation of Conformance Testing Sequences to the Asymmetric Travelling Salesman Problem, Jitian Xiao, Chiou Peng Lam, Huaizhong Li, and Jun Wang

PDF

Leading hackers down the garden path, Suen Yek

Submissions from 2005

PDF

Taxonomy of WRT54G(S) Hardware and Custom Firmware, Marwan Al-Zarouni

PDF

A discussion on developing online learning communities for student information professionals, Karen Anderson

Link

Teaching about electronic records in an online learning environment, Karen Anderson

Link

Shaping the landscape: Fire–grazer interactions in an African Savanna, S Archibald, W J. Bond, William Stock, and D H. Fairbanks

The Role of an Online Community to Support Overweight Adolescents: A Survey of Australian Healthcare Professionals. Research in Progress, Leisa Armstrong and Rachel J. Mahncke

PDF

A salt on the land: The osmolyte production and physiological responses of selected Myrtaceae species exposed to salt and water stress, Janelle Atkinson

Link

Application of a novel phytotoxicity assay for the detection of herbicides in Hervey Bay and the Great Sandy Straits, Susan Bengston-Nash, Kathryn Mcmahon, Geoff Eaglesham, and Joachin Muller

RFID-Evaluation of Tag Security Schemes, Christopher Bolan

The Growth of 802.11b and 802.11g Networks in the Perth CBD, Western Australia, Christopher Bolan

The introduction of RFID Security into computer security courses, Christopher Bolan

The Effect of Contractors on Project Success: What the Literature Doesn't Say, Sue Bolton and Donald Mcdermid

Stable isotope composition of faeces as an indicator of seasonal diet selection in wild herbivores in southern Africa, Susan Botha and William Stock

Network Analysis Methods and Tools for Sme C-Commerce, Mark Brogan

C-Commerce Innovation: Unravelling the effects of knowledge ties on embedded network structure, Mark Brogan and Leisa Armstrong

Link

Is CCTV a social benefit? Is psychometric study of perceived social risk, David Brooks

PDF

An exploration of student performance, utilization, and attitude to the use of a controlled content sequencing web based learning environment, Justin A. Brown

PDF

Towards persistent resource identification with the uniform resource name, Luke Brown

PDF

The systematics of the reducta complex of the burrowing freshwater crayfish Engaewa Riek, Quinton Burnham

Link

Why 'A forest conscienceness'?, Michael C. Calver, Heidi Bigler-Cole, Geoffery Bolton, John Dargavel, Andrea Gaynor, Pierre Horwitz, Jenny Mills, and G Wardell-Johnson

PDF

AD2US: An Automated Approach to Generating Usage Scenarios from UML Activity Diagrams, Robert Chandler, Chiou Peng Lam, and Huaizhong Li

A Finite State Grammar Based Decoding Method, Chaiyaporn Chirathamjaree

A method for the inference of non-recursive finite-state grammars, Chaiyaporn Chirathamjaree

Link

An Apporach to Integrate Heterogeneous Data Sources, Chaiyaporn Chirathamjaree

An Inference Method for Non-Recursive Context-Free Grammars, Chaiyaporn Chirathamjaree

Link

The use of formal grammars in isolated word recognition, Chaiyaporn Chirathamjaree

PDF

Method for Real-Time Non-Intrusive Video-Based Eye-Gaze Tracking, Joanne Church

Link

Authentication of users on mobile telephones - A survey of attitudes and practices, Nathan Clarke and Steven Furnell

User Authentication for Mobile Devices: A Composite Approach, Nathan Clarke and Steven Furnell

The ultimate support package: educated library technicians in schools, Judith Clayden

Multiple Intelligences in Secondary Schools, Brenda Clover

Link

Storybook: Creating a personalised learning environment for children isolated by severe learning disabilities, Michael Collins and Joanne Church

PDF

StoryBook: Extending a personalised interactive learning environment to children with severe learning disabilities, Michael Collins and Sundrakanthi Singh

Link

Computers, ICTs and Online Curriculum: A Role for the Teacher Librarian, Barbara Combes

PDF

From smorgasbord to satisfying meal: An holistic approach to information literacy and lifelong learning, Barbara Combes

Link

The copy-and-paste culture of the Net Generation: Strategies for dealing with plagiarism, Barbara Combes

Influence of phenolics on micropropogation of Eucalyptus Marginata, Anetta Cutler-Staniek, Ian Bennett, and Mary Boyce

PDF

Seeking information superiority: Strategies for business in the commercial application of information operations, Martin Dart

Link

A range extension for Lerista lineopunctulata and a second record of Lerista lineata, near Yalgorup, Western Australia, Robert Davis and M. Bamford