Submissions from 2005
Issues relating to the Forensic Analysis of PDA and Telephony (PDAT) Enabled Devices, Craig Valli
A UK and Australian Study of Hard Disk Disposal, Craig Valli and Andrew Jones
An Investigation into the Efficiency of Forensic Erasure Tools for Hard Disk Mechanisms, Craig Valli and Paul Patak
An Investigation into Long Range Detection of Passive UHF RFID Tags, Craig Valli, Andrew Woodward, Ken Wild, and Reino Karvinen
Contrasting influence of sea urchins on attached and drift macroalgae, Mathew Vanderklift and Gary Kendrick
Cisco Based Curricula in University Units, David Veal, Gurpreet Kohli, and Stanislaw Maj
A New Visual Communication System for Deaf-Blind Tertiary Education Students, David Veal and Stanislaw Maj
A framework for a bandwidth based network performance model for CS students, D Veal, G Kohli, S P. Maj, and J Cooper
Beyond disciplinary boundaries: Leptospirosis as a model of incorporating transdisciplinary approaches to understand infectious disease emergence, Joe Vinetz, Bruce Wilcox, Alonso Aguirre, Lisa X. Gollin, Alan R. Katz, Roger S. Fujioka, Kepa Maly, Pierre Horwitz, and Healani Chang
The Determination of the Best Separation Conditions for a Mixture of Preservatives of Varying Polarity Using HPLC: an ACELL Experiment, Magdalena Wajrak and Mary Boyce
A Bipartite Graph Approach to Generate Optimal Test Sequences for Protocol Conformance Testing using the Wp-method, Jun Wang, Jitian Xiao, Chiou Peng Lam, and Huaizhong Li
A Systems Approach to Security, Matthew Warren and William Hutchinson
A conceptual Model Security for IT Security Outsourcing, Matthew Warren, David Wilde, Sneza Dojkovski, and William Hutchinson
Diversity in information and communication technologies: The cost of lost opportunities, Susan Gail Webb
Holdfast aggregation in relation to morphology, age, attachment and drag for the kelp Ecklonia radiata, Thomas Wernberg
Modification of the physical environment by an Ecklonia radiata (Laminariales) canopy and implications for associated foliose algae, Thomas Wernberg, Gary Kendrick, and Ben Toohey
The effect of wave exposure on the morphology of Ecklonia radiata, Thomas Wernberg and Mads Thomsen
Heuristics for Optimising the Calculation of Hypervolume for Multi-objective Optimisation Problems, Lyndon While, Lucas Bradstreet, Luigi Barone, and Philip Hingston
Awareness invoking positive change: Reflections on lecturing practice in Computer and Information Science, Patricia Williams
Information security awareness of medical practitioners, Patricia Williams
Physician secure thyself, Patricia Williams
The underestimation of threats to patients data in clinical practice, Patricia Williams
Where are the policies for PDA usage in the Australian healthcare environment?, Patricia A. H. Williams
Using online courseware for information literacy skills development in a multinational program, Patricia Williams and Julie Johnson
A new breed of risk: Electronic medical records security, Patricia Williams and Rachel Mahncke
Investigating student interaction: A forum analysis, Patricia Williams and Rachel Mahncke
The blurring of on-campus and off-campus education: A position paper, Patricia Williams and Rachel Mahncke
Elicitation and customisation of generic skills in a security major, Patricia Williams and Andrew Woodward
Under Pressure: Does Osmotic Potential of the Culture Medium Affect Growth of Seagrasses?, Julia Wilson and Ian Bennett
Information Gathering using Google, Lih Wern Wong
Potential Bluetooth vulnerabilities in smartphones, Lih Wern Wong
Using in-depth interviewing to evaluate deep learning in students who use online curriculum: a literature review, Maria Woodhouse
The effectiveness of commercial erasure programs on BitTorrent activity, Andrew Woodward
WPA/WPA2: Placebo or Panacea?, Andrew Woodward
The effect of salt stress and abscisic acid on proline production, chlorophyll content and growth of in vitro propagated shoots of Eucalyptus camaldulensis, Andrew Woodward and Ian Bennett
Similarity-aware Web Content Management and Document Pre-fetching, Jitian Xiao and Michael Collins
Using Adaptive Agents to Automatically Generate Test Scenarios from the UML Activity Diagrams, Dong Xu, Huaizhong Li, and Chiou Peng Lam
Blackhat fingerprinting of the wired and wireless honeynet, Suen Yek
Honeypots, honeynets and honeywalls - finding the right honey for luring the attacker, Suen Yek
How to build a faraday on the cheap for wireless security testing, Suen Yek
The ethics of teaching deception in information security, Suen Yek
Wily attackers seek wireless networks in Perth, Western Australia for easy targets, Suen Yek
Nitrate reductase activity in macroalgae and its vertical distribution in macroalgal epiphytes of seagrasses, Erica Young, Paul Lavery, Beverley Van Elven, Mat Dring, and John A Berges
Submissions from 2004
Securing web services with XML digital signatures, Sabbir Ahmed and Leisa Armstrong
A tale of two cities: Approaches to counter terrorism, Edwin Leigh Armistead and Jeff Malone
An approach to generate the thin-threads from the UML diagrams, Xiaoqing Bai, Peng Lam, and Huaizhong Li
Testing for component-based software, Xiaoqing Bai, Peng Lam, and Huaizhong Li
The role of farm dams as refugia for aquatic invertebrates in a salinised landscape, south Western Australia, Jean-Michel Benier
The influence of ammonium nitrate, pH and indole butyric acid on root induction and survival in soil of micropropagated Eucalyptus globulus, I J. Bennett, D A J McDavid, and J A McComb
Openness in the face of systemic constraints on science, public participation, and the Western Australian Regional Forest Agreement, Martin Brueckner
Investigation of the replacement of Margaret River hairy marron Cherax tenuimanus (Smith) by smooth marron C. cainii Austin, John J. Bunn
Sociology in software engineering, Craig Caulfield, Gurpreet Kohli, and S. Paul Maj
Outcomes of a participatory approach to interpretive planning in the Shark Bay World Heritage area, Western Australia, Kelly J. Chapman
Mulga (Acacia Aneura) death adjacent to haul roads in the Northern Goldfields, Western Australia, Muriel Davies and Eddie Van Etten
Operational sex ratio and mating behaviour of the myobatrachid frog Neobatrachus kunapalari, Robert Davis and J Dale Roberts
Environmental correlates and associations of tuart (Eucalyptus gomphocephala) decline, Todd A. Edwards
Beach-Cast Wrack as a Determinant of Macroinvertebrate Assemblages and Trophic Subsidy to Sandy Beach Ecosystems, Rebecca Ince
Influences on the uptake of covenant mechanisms for nature conservation on private lands in Australia, Thomas I. Kabii
An automatic analysis system for firearm identification based on ballistics projectile, Jun Kong, Dongguang Li, and Chunnong Zhao
Analytical Test on Effectiveness of MCDF Operations, Jun Kong, Baoxue Zhang, and Wanwu Guo
System approach to information operations, Tuija Kuusisto, Rauno Kuusisto, and Leigh Armistead
Using action research to embed systmen thinking concepts in postgraduate IT teaching, Donald C. McDermid and Anita A. Bose
Smart card based messaging systems, D. T. Shaw and S. P. Maj
Inducing intentional errors in concatenated databases, D. T. Shaw, A. Shaw, and S. P. Maj
Reefs as contributors to diversity of epiphytic macroalgae assemblages in seagrass meadows, B. Van Elven, P. S. Lavery, and G. A. Kendrick
A guide to tropical seagrasses of the Indo-West Pacific, Michelle Waycott, Kathryn Mcmahon, Jane Mellors, Ainsley Calladine, and Diana Kleine
Growth in the deployment and security of 802.11b wireless local area networks in Perth, WA, Sue Webb
In vitro propagation of some Western Australian seagrasses, Julia Wilson
The use of proline to determine salt tolerance in eucalyptus species and clones, Andrew J. Woodward
Submissions from 2003
The Information Strategy and the United States Government from 2004 onwards, Edwin Leigh Armistead
The United States Government in the Information Age: Adapting Information Operations to a Changing World, Edwin Leigh Armistead
A tale of two cities: Approaches to Counter-Terrorism and Critical Infrastructure Protection in Washington DC and Canberra, Edwin Leigh Armistead and John Malone
A UML-Based Risk Analysis Approach for Software Testing, Xiaoqing Bai, Chiou Peng Lam, and Huaizhong Li
A Multi-Lingual Web-Based Survey Form Machine Translation Mechanism, Richard Boddington, Judith Clayden, Michael Collins, and Samuel Pride
Tailoring the separation selectivity of metal complexes and organometallic compounds resolved by capillary electrophoresis using auxiliary separation processes, Mary Boyce and Paul Haddad
Determination of flavour components in natural vanilla extracts and synthetic flavourings by mixed micellar electrokinetic capillary chromatography, Mary Boyce, Paul Haddad, and Tomislav Sostaric
Case Study in Construction of a Vertical Portal: The Cape Range Ningaloo Project, Mark Brogan and Gurpreet Kohli
ISO 17799 and Australian Healthcare Organisations, W J Brooks, Matthew Warren, and William Hutchinson
Indentification and Integration of Information Security Topics In a Web Application Programming Course, Justin Brown
The case for conditional rules and actions in learning management systems: Towards intelligent learning management systems, Justin Brown
Virtual Universities and E-Learning adoption: one size does not fit all, Justin Brown
A formalisation of an information infrastructure security risk analysis approach, T B Busuttil, Matthew Warren, and William Hutchinson
A New Approach to Integrate Heterogeneous Databases: The Mediated Data Integration Architecture, Chaiyaporn Chirathamjaree
The Use of Finite State Grammars in Isolated Word Recognition, Chaiyaporn Chirathamjaree
Using ICT to Create a Dynamic Online Learning Environment, Barbara Combes and George Sekulla
Vehicle induced seismic effects at a gravitational wave observatory, David Coward, David G Blair, Ron Burman, and Chunnong Zhao
Dynamic Simulation of Plants, Warren Creemers and Maurice Danaher
TOACS: Evolution of an On-line Education Environment 1995-2001, James Maning Cross, Patrick James Garnett, and Anthony Craig Watson
A mobile security application using GPRS, Maurice Danaher
An AI approach to assist young structural designers, Maurice Danaher
A storage free approach to landscape generation, Maurice Danaher
Developing knowledge-based systems with Kappa-PC, Maurice Danaher
E-Marketing to the pocket, Maurice Danaher
Surveillance - Transmitting Video to Handheld Devices, Maurice Danaher
Towards object detection images, Maurice Danaher
Real Time Terrain Simulation, Maurice Danaher and Warren Creemers
What happens when you add salt: predicting impacts of secondary salinisation on shallow aquatic ecosystems using an alternative states model, Jennifer A. Davis, Megan McGuire, Stuart Halse, David Hamilton, Pierre Horwitz, Clive Barstow, Raymond H. Froend, Michael Lyons, and Lien Sim