Follow

Submissions from 2005

PDF

The underestimation of threats to patients data in clinical practice, Patricia Williams

Link

Where are the policies for PDA usage in the Australian healthcare environment?, Patricia A. H. Williams

Link

Using online courseware for information literacy skills development in a multinational program, Patricia Williams and Julie Johnson

A new breed of risk: Electronic medical records security, Patricia Williams and Rachel Mahncke

Investigating student interaction: A forum analysis, Patricia Williams and Rachel Mahncke

Link

The blurring of on-campus and off-campus education: A position paper, Patricia Williams and Rachel Mahncke

Link

Elicitation and customisation of generic skills in a security major, Patricia Williams and Andrew Woodward

Under Pressure: Does Osmotic Potential of the Culture Medium Affect Growth of Seagrasses?, Julia Wilson and Ian Bennett

Link

Information Gathering using Google, Lih Wern Wong

PDF

Potential Bluetooth vulnerabilities in smartphones, Lih Wern Wong

PDF

Using in-depth interviewing to evaluate deep learning in students who use online curriculum: a literature review, Maria Woodhouse

PDF

Recommendations for wireless network security policy: An analysis and classification of current and emerging threats and solutions for different organisations, Andrew Woodward

Link

The effectiveness of commercial erasure programs on BitTorrent activity, Andrew Woodward

WPA/WPA2: Placebo or Panacea?, Andrew Woodward

Link

The effect of salt stress and abscisic acid on proline production, chlorophyll content and growth of in vitro propagated shoots of Eucalyptus camaldulensis, Andrew Woodward and Ian Bennett

PDF

Similarity-aware Web Content Management and Document Pre-fetching, Jitian Xiao and Michael Collins

PDF

Using Adaptive Agents to Automatically Generate Test Scenarios from the UML Activity Diagrams, Dong Xu, Huaizhong Li, and Chiou Peng Lam

PDF

Blackhat fingerprinting of the wired and wireless honeynet, Suen Yek

Honeypots, honeynets and honeywalls - finding the right honey for luring the attacker, Suen Yek

PDF

How to build a faraday on the cheap for wireless security testing, Suen Yek

Link

The ethics of teaching deception in information security, Suen Yek

Link

Wily attackers seek wireless networks in Perth, Western Australia for easy targets, Suen Yek

PDF

A study of the effects of Probait on Chuditch, Dasyurus Geoffroii, within the Julimar Conservation Park with notes on the general ecology, Melissa York

PDF

Nitrate reductase activity in macroalgae and its vertical distribution in macroalgal epiphytes of seagrasses, Erica Young, Paul Lavery, Beverley Van Elven, Mat Dring, and John A Berges

Submissions from 2004

Securing web services with XML digital signatures, Sabbir Ahmed and Leisa Armstrong

Link

A tale of two cities: Approaches to counter terrorism, Edwin Leigh Armistead and Jeff Malone

Link

An approach to generate the thin-threads from the UML diagrams, Xiaoqing Bai, Peng Lam, and Huaizhong Li

Testing for component-based software, Xiaoqing Bai, Peng Lam, and Huaizhong Li

PDF

The role of farm dams as refugia for aquatic invertebrates in a salinised landscape, south Western Australia, Jean-Michel Benier

Link

The influence of ammonium nitrate, pH and indole butyric acid on root induction and survival in soil of micropropagated Eucalyptus globulus, I J. Bennett, D A J McDavid, and J A McComb

PDF

Openness in the face of systemic constraints on science, public participation, and the Western Australian Regional Forest Agreement, Martin Brueckner

PDF

Investigation of the replacement of Margaret River hairy marron Cherax tenuimanus (Smith) by smooth marron C. cainii Austin, John J. Bunn

Link

Sociology in software engineering, Craig Caulfield, Gurpreet Kohli, and S. Paul Maj

PDF

Outcomes of a participatory approach to interpretive planning in the Shark Bay World Heritage area, Western Australia, Kelly J. Chapman

Mulga (Acacia Aneura) death adjacent to haul roads in the Northern Goldfields, Western Australia, Muriel Davies and Eddie Van Etten

Link

Operational sex ratio and mating behaviour of the myobatrachid frog Neobatrachus kunapalari, Robert Davis and J Dale Roberts

PDF

Environmental correlates and associations of tuart (Eucalyptus gomphocephala) decline, Todd A. Edwards

PDF

Beach-Cast Wrack as a Determinant of Macroinvertebrate Assemblages and Trophic Subsidy to Sandy Beach Ecosystems, Rebecca Ince

PDF

Influences on the uptake of covenant mechanisms for nature conservation on private lands in Australia, Thomas I. Kabii

Link

An automatic analysis system for firearm identification based on ballistics projectile, Jun Kong, Dongguang Li, and Chunnong Zhao

Link

Analytical Test on Effectiveness of MCDF Operations, Jun Kong, Baoxue Zhang, and Wanwu Guo

System approach to information operations, Tuija Kuusisto, Rauno Kuusisto, and Leigh Armistead

Link

Using action research to embed systmen thinking concepts in postgraduate IT teaching, Donald C. McDermid and Anita A. Bose

Smart card based messaging systems, D. T. Shaw and S. P. Maj

Inducing intentional errors in concatenated databases, D. T. Shaw, A. Shaw, and S. P. Maj

Link

Reefs as contributors to diversity of epiphytic macroalgae assemblages in seagrass meadows, B. Van Elven, P. S. Lavery, and G. A. Kendrick

A guide to tropical seagrasses of the Indo-West Pacific, Michelle Waycott, Kathryn Mcmahon, Jane Mellors, Ainsley Calladine, and Diana Kleine

Growth in the deployment and security of 802.11b wireless local area networks in Perth, WA, Sue Webb

PDF

In vitro propagation of some Western Australian seagrasses, Julia Wilson

PDF

The use of proline to determine salt tolerance in eucalyptus species and clones, Andrew J. Woodward

Submissions from 2003

The Information Strategy and the United States Government from 2004 onwards, Edwin Leigh Armistead

The United States Government in the Information Age: Adapting Information Operations to a Changing World, Edwin Leigh Armistead

A tale of two cities: Approaches to Counter-Terrorism and Critical Infrastructure Protection in Washington DC and Canberra, Edwin Leigh Armistead and John Malone

A UML-Based Risk Analysis Approach for Software Testing, Xiaoqing Bai, Chiou Peng Lam, and Huaizhong Li

Link

A Multi-Lingual Web-Based Survey Form Machine Translation Mechanism, Richard Boddington, Judith Clayden, Michael Collins, and Samuel Pride

Link

Tailoring the separation selectivity of metal complexes and organometallic compounds resolved by capillary electrophoresis using auxiliary separation processes, Mary Boyce and Paul Haddad

Link

Determination of flavour components in natural vanilla extracts and synthetic flavourings by mixed micellar electrokinetic capillary chromatography, Mary Boyce, Paul Haddad, and Tomislav Sostaric

Case Study in Construction of a Vertical Portal: The Cape Range Ningaloo Project, Mark Brogan and Gurpreet Kohli

ISO 17799 and Australian Healthcare Organisations, W J Brooks, Matthew Warren, and William Hutchinson

Indentification and Integration of Information Security Topics In a Web Application Programming Course, Justin Brown

Link

The case for conditional rules and actions in learning management systems: Towards intelligent learning management systems, Justin Brown

Virtual Universities and E-Learning adoption: one size does not fit all, Justin Brown

A formalisation of an information infrastructure security risk analysis approach, T B Busuttil, Matthew Warren, and William Hutchinson

Link

A New Approach to Integrate Heterogeneous Databases: The Mediated Data Integration Architecture, Chaiyaporn Chirathamjaree

The Use of Finite State Grammars in Isolated Word Recognition, Chaiyaporn Chirathamjaree

Link

Using ICT to Create a Dynamic Online Learning Environment, Barbara Combes and George Sekulla

PDF

Foraging Ecology And Habitat Selection Of The Western Yellow Robin (Eopsaltria Griseogularis) In A Wandoo Woodland, Western Australia : Conservation Ecology Of A Declining Species, Jarrad A. Cousin

Link

Vehicle induced seismic effects at a gravitational wave observatory, David Coward, David G Blair, Ron Burman, and Chunnong Zhao

Dynamic Simulation of Plants, Warren Creemers and Maurice Danaher

TOACS: Evolution of an On-line Education Environment 1995-2001, James Maning Cross, Patrick James Garnett, and Anthony Craig Watson

A mobile security application using GPRS, Maurice Danaher

An AI approach to assist young structural designers, Maurice Danaher

A storage free approach to landscape generation, Maurice Danaher

Developing knowledge-based systems with Kappa-PC, Maurice Danaher

E-Marketing to the pocket, Maurice Danaher

Surveillance - Transmitting Video to Handheld Devices, Maurice Danaher

Towards object detection images, Maurice Danaher

Real Time Terrain Simulation, Maurice Danaher and Warren Creemers

Link

What happens when you add salt: predicting impacts of secondary salinisation on shallow aquatic ecosystems using an alternative states model, Jennifer A. Davis, Megan McGuire, Stuart Halse, David Hamilton, Pierre Horwitz, Clive Barstow, Raymond H. Froend, Michael Lyons, and Lien Sim

Link

Functional capacities of marsupial hearts: size and mitochondrial parameters indicate higher aerobic capabilities than generally seen in placental mammals, T J Dawson, K N Webster, B Mifsud, E Raad, E Lee, and A D. Needham

Link

Simulation of bulk absorption thermal lensing in transmissive optics of gravitational waves detectors, Jerome Degallaix, Chunnong Zhao, L Ju, and David G Blair

Link

Vendor based network engineering education: An international comparison, Jambukeswaran Dharukeshwari and Stanislaw Maj

Link

Quail eggs, modelling clay eggs, imprints and small mammals in Australian woodland, Graham Fulton and Hugh A Ford

Link

Black swan and western tiger snake: A conflict avoidance encounter, Graham Fulton and Mercedes Smith

Application of nonlinear analysis in magnetic experimental data processing, Wanwu Guo

Link

A principle-tactics based approach for guiding student project management, Wanwu Guo

Evaluation of Web-based knowledge delivery systems using T-PUMA model, Wanwu Guo and James Millar

Link

A Neural System Prototype for Data Processing Using Modified Conjugate Directional Filtering (MCDF), Wanwu Guo and Anthony Craig Watson

Image Pattern Recognition Using Modified Conjugate Directional Filtering (MCDF), Wanwu Guo and Anthony Craig Watson

Link

Medical Image Processing Using Modified Conjugate Directional Filtering, Wanwu Guo and Anthony Craig Watson

PDF

Determining the effectiveness of deceptive honeynets, Nirbhay Gupta

Link

An Intervention Trial on Short Term Exposure to Inorganic Arsenic in Drinking Water, Andrea Hinwood, Nick de Klerk, Malcolm Sim, Judy Hankin, and Jim Gerostamoulos

Link

Risk factors for increased urinary inorganic arsenic concentrations from low arsenic concentrations in drinking water, Andrea Hinwood, Malcolm R Sim, Damien Jolley, Nick de Klerk, Elisa Bastone, Jim Gerostamoulos, and Olaf O Drummer

Link

Fire and organic substrates: soil structure, water quality and biodiversity in far southwest Western Australia, Pierre Horwitz, Simon Judd, and Beate Sommer

Link

Socio-ecological relationships and their consequences in coping with environmental changes in south-western Australia, Pierre Horwitz, Ruth Rogan, Keith Bradby, and Margaret Robertson

PDF

Security management education online, Peter J. Hosie, Clifton L. Smith, and Joseph Luca

Link

Integrating information security and intelligence courses, W Hutchinson

Modern Asymmetric Warfare and the Failure of the West, William Hutchinson

The Changing Nature of Information Security, William Hutchinson

The Impact of Groupthink on the Intelligence Function, William Hutchinson