Research Services Division

Deakin Research

2009 School of Information Technology Research Output

Note: The 2012, 2013, 2014 publications have not been audited.

Jump to: Publications | Grants and Consultancies | HDR completions

Publications

Li, Wenyuan*, Ong, Kok-Leong and Ng, Wee Keong* (2009) Spectral analysis of complex data : data mining enhancements using the spectral characteristics of data, VDM Verlag, Saarbruken, Germany [A1]
DRO entry for this publication

Warren, Ian, Palmer, Darren, King, Tanya, Hobbs, Michael and Segrave, Stephen (2009) Second life and networked educational simulations : development potential and a model code of practice, Deakin University, Geelong, Vic. [A6]
DRO entry for this publication

Hassanien, Aboul-Ella*, Abawajy, Jemal H., Abraham, Ajith* and Hagras, Hani* (2009) Pervasive computing : innovations in intelligent multimedia and applications, in Hassanien, Aboul-Ella; Abawajy, Jemal H.; Abraham, Ajith and Hagras, Hani (eds), Springer, Dordrecht, The Netherlands [A7]
DRO entry for this publication

Al-Jaljouli, Raja and Abawajy, Jemal (2009) Agents based e-commerce and securing exchanged information, in Hassanien, A.-E.; Abawajy, J. H.; Abraham, A. and Hagras, H. (eds), Pervasive computing : innovations in intelligent multimedia and applications, pp. 383-404, Springer, Dordrecht, Germany [B1]
DRO entry for this publication

Al-Neyadi, Fahed and Abawajy, Jemal H. (2009) Context-based e-health system access control mechanism, in Park, Jong Hyuck; Zhan, Justin; Lee, Changhoon; Wang, Guilin; Kim, Tai-hoon and Yeo, Sang-Soo (eds), Advances in information security and its application, pp. 68-77, Springer, Berlin, Germany [B1]
DRO entry for this publication

Antoniou, Giannakis*, Batten, Lynn and Parampalli, Udaya* (2009) An anonymity revocation technology for anonymous communication, in Papadopoulos, George A.; Wojtkowski, Gregory; Wojtkowski, Wita; Wrycza, Stanislaw and Zupancic, Joze (eds), Information systems development : towards a service provision society, pp. 329-337, Springer, New York, N.Y. [B1]
DRO entry for this publication

Antoniou, Giannakis*, Batten, Lynn, Narayan, Shivaramakrishnan* and Parampalli, Udaya* (2009) A privacy preserving e-payment scheme, in Papadopoulos, G.A. and Badica, C. (eds), Intelligent Distributed Computing III, pp. 197-202, Springer-Verlag, Berlin, Germany [B1]
DRO entry for this publication

Wood-Bradley, G. and Blashki, K. (2009) A new framework for interactive entertainment technologies, in Pagani, M. (eds), Encyclopedia of Multimedia Technology and Networking, pp. 1061-1065, IGI Global, Hershey, PA [B1.1]
DRO entry for this publication

Bagirov, Adil* and Beliakov, Gleb (2009) Global optimization: cutting angle method, in Floudas, C. A. and Pardalos, P. M. (eds), Encyclopedia of optimization, pp. 1304-1311, Springer, New York, N.Y. [B2]
DRO entry for this publication

Doss, Robin and Schott, Wolfgang* (2009) Cooperative relaying in wireless sensor networks, in Misra, Sudip; Misra, Subhas Chandra and Woungang, Isaac (eds), Guide to wireless sensor networks, pp. 159-181, Springer, New York, N. Y. [BN]
DRO entry for this publication

Li, Gang and Doss, Robin (2009) Energy-efficient medium access control in wireless sensor networks, in Misra, Sudip; Misra, Subhas Chandra and Woungang, Isaac (eds), Guide to wireless sensor networks, pp. 419-438, Springer, New York, N. Y. [BN]
DRO entry for this publication

Abawajy, J. H. (2009) Human-computer interaction in ubiquitous computing environments, International journal of pervasive computing and communications, vol. 5, no. 1, pp. 31-77, Emerald Group Publishing, Bingley, England [C1]
ERA journal ID: 32100 – Scopus EID: 2-s2.0-84867535384
DRO entry for this publication

Abawajy, J. H. (2009) An efficient adaptive scheduling policy for high-performance computing, Future generation computer systems, vol. 25, no. 3, pp. 364-370, Elsevier BV, Amsterdam, The Netherlands [C1]
ERA journal ID: 17858 – Scopus EID: 2-s2.0-55949121451
Citation counts: Scopus - 20, Thomson - 12
DRO entry for this publication

Abawajy, Jemal H. (2009) Design and delivery of undergraduate IT security management course, Lecture notes in computer science, vol. 5576, pp. 402-411, Springer, Heidelberg, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-71049168862
DRO entry for this publication

Abawajy, J. H. (2009) Adaptive hierarchical scheduling policy for enterprise grid computing systems, Journal of network and computer applications, vol. 32, no. 3, pp. 770-779, Academic Press, London, England [C1]
ERA journal ID: 18032 – Scopus EID: 2-s2.0-59349089851
Citation counts: Scopus - 7, Thomson - 4
DRO entry for this publication

An, Jiyuan and Chen, Yi-Ping Phoebe (2009) Finding rule groups to classify high dimensional gene expression datasets, Computational Biology and Chemistry, vol. 33, no. 1, pp. 108-113, Elsevier Ltd, Oxford, England [C1]
ERA journal ID: 17808 – Scopus EID: 2-s2.0-57749192475
Citation counts: Scopus - 8, Thomson - 4
DRO entry for this publication

An, Jiyuan and Chen, Yi-Ping Phoebe (2009) Finding coverage using incremental attribute combinations, International journal of innovative computing, information and control, vol. 5, no. 5, pp. 1419-1428, ICIC International, Kumamoto, Japan [C1]
ERA journal ID: 3492 – Scopus EID: 2-s2.0-63849292067
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Beliakov, Gleb (2009) Construction of aggregation functions from data using linear programming, Fuzzy sets and systems, vol. 160, no. 1, pp. 65-75, Elsevier, Amsterdam, Netherlands [C1]
ERA journal ID: 159 – Scopus EID: 2-s2.0-54049153148
Citation counts: Scopus - 19, Thomson - 19
DRO entry for this publication

Beliakov, Gleb and Calvo, Tomasa* (2009) Construction of k-Lipschitz triangular norms and conorms from empirical data, IEEE transactions on fuzzy systems, vol. 17, no. 5, pp. 1217-1220, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 17872 – Scopus EID: 2-s2.0-70350070865
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Beliakov, Gleb (2009) Extended cutting angle method of global optimization, Pacific journal of optimization, vol. 4, no. 1, pp. 153-176, Yokohama Publishers, Yokohama, Japan [C1]
ERA journal ID: 32433 – Scopus EID: 2-s2.0-77949488749
Citation counts: Scopus - 4, Thomson - 4
DRO entry for this publication

Carminati, J., Karimian, H. R.*, van den Bergh, N.* and Vu, K. T.* (2009) Shear-free perfect fluids with a solenoidal magnetic curvature, Classical and quantum gravity, vol. 26, no. 19, pp. 1-14, Institute of Physics Publishing, London, England [C1]
ERA journal ID: 959 – Scopus EID: 2-s2.0-70349898090
Citation counts: Scopus - 5, Thomson - 5
DRO entry for this publication

Casey, John* and Zhou, Wanlei (2009) Reducing the bandwidth requirements of P2P keyword indexing, International journal of high performance computing and networking, vol. 6, no. 2, pp. 119-129, Inderscience Publishers, Olney, England [C1]
ERA journal ID: 39921 – Scopus EID: 2-s2.0-68249133893
DRO entry for this publication

Casey, John* and Zhou, Wanlei (2009) Adjacency cache : an efficient P2P web cache indexing and lookup system, International journal of computer systems science & engineering, vol. 24, no. 5, pp. 83-91, CRL Publishing Ltd, Leicester, England [C1]
ERA journal ID: 17806 – Scopus EID: Not tagged
DRO entry for this publication

Chen, Qingfeng and Chen, Yi-Ping Phoebe (2009) Discovery of structural and functional features in RNA pseudoknots, IEEE transactions on knowledge and data engineering, vol. 21, no. 7, pp. 974-984, IEEE, Piscataway, NJ [C1]
ERA journal ID: 17876 – Scopus EID: 2-s2.0-67749146987
Citation counts: Scopus - 9, Thomson - 6
DRO entry for this publication

Chonka, Ashley and Zhou, Wanlei (2009) Chaos theory based detection against network mimicking DDoS attacks, IEEE communications letters, vol. 13, no. 9, pp. 717-719, IEEE, Piscataway, NJ [C1]
ERA journal ID: 5068 – Scopus EID: 2-s2.0-70350422660
Citation counts: Scopus - 21, Thomson - 10
DRO entry for this publication

Dang, Xuan Hong*, Lee, Vincent C. S.*, Ng, Wee Keong* and Ong, Kok Leong (2009) Incremental and adaptive clustering stream data over sliding window, Lecture notes in computer science, vol. 5690, pp. 660-674, Springer, Heidelberg, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-70349320003
Citation counts: Scopus - 2
DRO entry for this publication

Dang, Xuan Hong*, Lee, Vincent*, Ng, Wee Keong*, Ciptadi, Arridhana* and Ong, Kok Leong (2009) An EM-based algorithm for clustering data streams in sliding windows, Lecture notes in computer science, vol. 5463, pp. 230-235, Springer, Heidelberg, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-67650162774
DRO entry for this publication

Deris, Mustafa Mat*, Abawajy, Jemal H., Taniar, David* and Mamat, Ali* (2009) Managing data using neighbour replication on a triangular-grid structure, International journal of high performance computing and networking, vol. 6, no. 1, pp. 56-65, Inderscience Publishers, Olney, England [C1]
ERA journal ID: 39921 – Scopus EID: 2-s2.0-67149094863
Citation counts: Scopus - 5
DRO entry for this publication

Dong, Yucheng*, Xu, Yinfeng* and Yu, Shui (2009) Linguistic multiperson decision making based on the use of multiple preference relations, Fuzzy sets and systems, vol. 160, no. 5, pp. 603-623, Elsevier BV, North-Holland, Amsterdam, Netherlands [C1]
ERA journal ID: 159 – Scopus EID: 2-s2.0-58149484043
Citation counts: Scopus - 42, Thomson - 40
DRO entry for this publication

Dong, Yucheng*, Xu, Yinfeng* and Yu, Shui (2009) Computing the numerical scale of the linguistic term set for the 2-tuple fuzzy linguistic representation model, I E E E transactions on fuzzy systems, vol. 17, no. 6, pp. 1366-1378, I E E E, Piscataway, NJ [C1]
ERA journal ID: 17872 – Scopus EID: 2-s2.0-72649098741
Citation counts: Scopus - 31, Thomson - 31
DRO entry for this publication

Doss, Robin, Li, Gang, Mak, Vicky, Yu, Shui and Chowdhury, Moshed (2009) Improving the qos for information discovery in autonomic wireless sensor networks, Pervasive and mobile computing, vol. 5, no. 4, pp. 334-349, Elsevier BV, Amsterdam, Netherlands [C1]
ERA journal ID: 32161 – Scopus EID: 2-s2.0-67349145919
Citation counts: Scopus - 5, Thomson - 5
DRO entry for this publication

Ernst, Andreas T.*, Mak, Vicky H. and Mason, Luke R. (2009) An exact method for the minimum cardinality problem in the treatment planning of intensity-modulated radiotherapy, I N F O R M S journal on computing, vol. 21, no. 4, pp. 562-574, Institute for Operations Research and the Management Sciences (I N F O R M S), Hanover, MD [C1]
ERA journal ID: 17919 – Scopus EID: 2-s2.0-70449469240
Citation counts: Scopus - 7, Thomson - 7
DRO entry for this publication

Gao, Longxiang and Li, Ming (2009) Virtual backbone content routing in wireless ad-hoc network, International journal of wireless and mobile networks, vol. 1, no. 2, pp. 30-47, Academy & Industry Research Collaboration Center, Dehli, India [C1]
ERA journal ID: 41713 – Scopus EID: Not tagged
DRO entry for this publication

Islam, Md Rafiqul, Zhou, Wanlei, Guo, Minyi* and Xiang, Yang* (2009) An innovative analyser for multi-classifier e-mail classification based on grey list analysis, Journal of network and computer applications, vol. 32, no. 2, pp. 357-366, Academic Press, London, England [C1]
ERA journal ID: 18032 – Scopus EID: 2-s2.0-59249098667
Citation counts: Scopus - 6, Thomson - 1
DRO entry for this publication

Islam, Md Rafiqul and Zhou, Wanlei (2009) Minimizing the limitations of GL analyser of fusion based email classification, Lecture notes in computer science, vol. 5574, pp. 761-774, Springer, Heidelberg, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-70349145863
DRO entry for this publication

Islam, Md Rafiqul and Chowdhury, Morshed U. (2009) Minimizing the drawbacks of grey-list analyser in synthesis based spam filtering, Journal of electronics and computer science, vol. 11, no. 1, pp. 89-96, IJECS, U.S.A. [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Islam, Rafiqul, Zhou, Wanlei, Xiang, Yang* and Mahmood, Abdun Naser* (2009) Spam filtering for network traffic security on a multi-core environment, Concurrency and computation : practice & experience, vol. 21, no. 10, pp. 1307-1320, John Wiley & Sons, Bognor Regis, England [C1]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-67650462895
Citation counts: Scopus - 11, Thomson - 7
DRO entry for this publication

Javadi, Bahman*, Akbari, Mohammad K.* and Abawajy, Jemal H. (2009) Multi-cluster computing interconnection network performance modeling and analysis, Future generation computer systems, vol. 25, no. 7, pp. 737-746, Elsevier BV, Amsterdam, The Netherlands [C1]
ERA journal ID: 17858 – Scopus EID: 2-s2.0-67349083078
Citation counts: Scopus - 1
DRO entry for this publication

Jiang, Da*, Zhou, Shuigeng* and Chen, Yi-Ping Phoebe (2009) Compensatory Ability to Null Mutation in Metabolic Networks, Biotechnology and bioengineering, vol. 103, no. 2, pp. 361-369, John Wiley & Sons, Inc, Malden, Mass. [C1]
ERA journal ID: 3345 – Scopus EID: 2-s2.0-65549142111
Citation counts: Scopus - 6, Thomson - 4
DRO entry for this publication

Li, Bai and Batten, Lynn (2009) Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks, Journal of network and computer applications, vol. 32, no. 2, pp. 377-387, Academic Press, London, England [C1]
ERA journal ID: 18032 – Scopus EID: 2-s2.0-59249100315
Citation counts: Scopus - 7, Thomson - 1
DRO entry for this publication

Li, K., Zhou, W. and Yu, S. (2009) Effective metric for detecting distributed denial-of-service attacks based on information divergence, IET Communications, vol. 3, no. 12, pp. 1851-1860, Institution of Engineering and Technology, Herts, England [C1]
ERA journal ID: 4417 – Scopus EID: 2-s2.0-70450210296
Citation counts: Scopus - 4, Thomson - 2
DRO entry for this publication

Li, Ke and Zhou, Wanlei (2009) An abnormal-based approach to effectively detect DDOS attacks, Journal of the Chinese institute of engineers, vol. 32, no. 7, pp. 889-895, Chinese Institute of Engineers, Taipei City Taiwan, Republic of China [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Liu, Zhaobin*, Qu, Wenyu*, Li, Haitao*, Ruan, Min* and Zhou, Wanlei (2009) I/O scheduling and performance analysis on multi-core platforms, Concurrency computation practice and experience, vol. 21, no. 10, pp. 1405-1417, John Wiley & Sons Ltd, West Sussex, England [C1]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-67650456894
Citation counts: Scopus - 1
DRO entry for this publication

Maloney, Andrew and Goscinski, Andrzej (2009) A survey and review of the current state of rollback-recovery for cluster systems, Concurrency and computation : practice & experience, vol. 21, no. 12, pp. 1632-1666, John Wiley & Sons Ltd., West Sussex, England [C1]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-68849090178
Citation counts: Scopus - 6, Thomson - 3
DRO entry for this publication

Pan, Lei and Batten, Lynn (2009) Robust performance testing for digital forensic tools, Digital investigation, vol. 6, no. 1-2, pp. 71-81, Elsevier Advanced Technology, Kidlington, England [C1]
ERA journal ID: 39832 – Scopus EID: 2-s2.0-70249086259
Citation counts: Scopus - 2, Thomson - 2
DRO entry for this publication

Pérez, María S.*, Sánchez, Alberto*, Abawajy, Jemal H., Robles, Víctor* and Peña, José M.* (2009) An agent architecture for managing data resources in a grid environment, Future generation computer systems, vol. 25, no. 7, pp. 747-755, Elsevier BV, Amsterdam, The Netherlands [C1]
ERA journal ID: 17858 – Scopus EID: 2-s2.0-67349085828
Citation counts: Scopus - 4, Thomson - 2
DRO entry for this publication

Phua, Clifton*, Gayler, Ross*, Lee, Vincent* and Smith-Miles, Kate (2009) On the communal analysis suspicion scoring for identity crime in streaming credit applications, European journal of operational research, vol. 195, no. 2, pp. 595-612, Elsevier BV, Amsterdam, Netherlands [C1]
ERA journal ID: 148 – Scopus EID: 2-s2.0-56249143499
Citation counts: Scopus - 5
DRO entry for this publication

Qu, Wenyu*, Zhou, Wanlei and Kitsuregawa, Masaru* (2009) An parallel information retrieval method for e-commerce, International journal of computer systems science and engineering, vol. 24, no. 5, pp. 29-37, CRL Publishing Ltd, Leicester, England [C1]
ERA journal ID: 17806 – Scopus EID: Not tagged
DRO entry for this publication

Rong, Jia, Li, Gang and Law, Rob* (2009) A contrast analysis of online hotel web service purchasers and browsers, International journal of hospitality management, vol. 28, no. 3, pp. 466-478, Pergamon, Oxford, England [C1]
ERA journal ID: 19662 – Scopus EID: 2-s2.0-64049098886
Citation counts: Scopus - 22, Thomson - 19
DRO entry for this publication

Rong, Jia, Li, Gang and Chen, Yi-Ping Phoebe (2009) Acoustic feature selection for automatic emotion recognition from speech, Information processing & management, vol. 45, no. 3, pp. 315-328, Elsevier, Oxford, England [C1]
ERA journal ID: 17904 – Scopus EID: 2-s2.0-64549147125
Citation counts: Scopus - 34, Thomson - 14
DRO entry for this publication

Sajjanhar, Atul, Lu, Guojun*, Zhang, Dengsheng*, Hou, Jingyu and Chen, Yi-Ping Phoebe (2009) Spherical harmonics and distance transform for image representation and retrieval, Lecture notes in computer science, vol. 5788, pp. 309-316, Springer Berlin, Berlin, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-76249132087
Citation counts: Scopus - 3
DRO entry for this publication

Song, Xiao-Feng*, Chen, Wei-Min*, Chen, Yi-Ping Phoebe and Jiang, Bin* (2009) Candidate working set strategy based SMO algorithm in support vector machine, Information processing & management, vol. 45, no. 5, pp. 584-592, Elsevier Ltd., London, England [C1]
ERA journal ID: 17904 – Scopus EID: 2-s2.0-67650113615
Citation counts: Scopus - 9, Thomson - 7
DRO entry for this publication

Wang, Jinlong*, Gao, Ke*, Jiao, Yang* and Li, Gang (2009) Study on ensemble classification methods towards spam filtering, Lecture notes in artificial intelligence, vol. 5678, pp. 314-325, Springer, Heidelberg, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-70350303875
DRO entry for this publication

Wang, Jinlong*, Xu, Congfu* and Li, Gang (2009) Mining frequent itemsets in distorted databases with granula computing, International Journal of pattern recognition and artificial intelligence, vol. 23, no. 4, pp. 825-846, World Scientific Publishing Co., Toh Tuck Link, Singapore [C1]
ERA journal ID: 17958 – Scopus EID: 2-s2.0-67650705613
DRO entry for this publication

Wong, Adam K. L. and Goscinski, Andrzej M. (2009) Parallel computing on clusters and enterprise grids : practice and experience, International journal of high performance computing and networking, vol. 6, no. 2, pp. 137-147, Inderscience Publishers, Olney, England [C1]
ERA journal ID: 39921 – Scopus EID: 2-s2.0-68249155062
DRO entry for this publication

Xi, Yanping*, Chen, Yi-Ping Phoebe, Cao, Ming*, Wang, Weirong* and Wang, Fei* (2009) Analysis on relationship between extreme pathways and correlated reaction sets, BMC bioinformatics, vol. 10, no. Supplement 1, pp. S58-S71, BioMed Central Ltd, London, England [C1]
ERA journal ID: 40343 – Scopus EID: 2-s2.0-60849128208
Citation counts: Scopus - 2, Thomson - 3
DRO entry for this publication

Xiang, Yang*, Zhou, Wanlei and Guo, Minyi* (2009) Flexible deterministic packet marking: an IP traceback system to find the real source of attacks, IEEE transactions on parallel and distributed systems, vol. 20, no. 4, pp. 567-580, IEEE, Piscataway, NJ [C1]
ERA journal ID: 20981 – Scopus EID: 2-s2.0-67649889403
Citation counts: Scopus - 48, Thomson - 16
DRO entry for this publication

Yang, Pengyi* and Zhang, Zili (2009) An embedded two-layer feature selection approach for microarray data analysis, IEEE intelligent informatics bulletin, vol. 10, no. 1, pp. 24-32, IEEE, Los Alamitos, Calif. [C1]
ERA journal ID: 123131 – Scopus EID: Not tagged
DRO entry for this publication

Yang, Pengyi*, Tao, Li*, Xu, Liang* and Zhang, Zili (2009) Multiagent framework for bio-data mining, Lecture notes in computer science, vol. 5589, pp. 200-207, Springer, Heidelberg, Germany [C1]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-69049119327
Citation counts: Scopus - 2
DRO entry for this publication

Yang, Pengyi*, Xu, Liang*, Zhou, Bing B.*, Zhang, Zili and Zomaya, Albert Y.* (2009) A particle swarm based hybrid system for imbalances medical data sampling, BMC genomics, vol. 10, pp. 1-14, BioMed Central, London, England [C1]
ERA journal ID: 2363 – Scopus EID: 2-s2.0-71549117908
Citation counts: Scopus - 14
DRO entry for this publication

Khaddage, Ferial, Chonka, Ashley and Zhou, Wanlei (2009) E-learning over mobile phone technology: best practices and guidelines, in Unknown (ed.), International journal of interactive mobile technologies, vol. 3, no. 3, pp. 55-58, Kassel University Press, Berlin, Germany [C1.1]
ERA journal ID: 123537 – Scopus EID: Not tagged
DRO entry for this publication

Khaddage, F., Lanham, E. and Zhou, W. (2009) A mobile learning model for universities : reblending the current learning environment, International journal of interactive mobile technologies, vol. 3, no. Supp 1, pp. 18-23, Kassel University Press GmbH, Berlin, Germany [C1.1]
ERA journal ID: 123537 – Scopus EID: Not tagged
DRO entry for this publication

Li, Ke, Zhou, Wanlei, Yu, Shui and Dai, Bo* (2009) Effective DDoS attacks detection using generalized entropy metric, Lecture notes in computer science, vol. 5574, pp. 266-280, Springer, Heidelberg, Germany [C2]
ERA journal ID: 123605 – Scopus EID: 2-s2.0-70349121381
Citation counts: Scopus - 1
DRO entry for this publication

Abawajy, J. H. (2009) Advances in pervasive computing, International journal of pervasive computing and communications, vol. 5, no. 1, pp. 4-8, Emerald Publishing Group, Bingley, England [C4]
ERA journal ID: 32100 – Scopus EID: Not tagged
DRO entry for this publication

Hsu, Ching-Hsien*, Abawajy, Jemal and Yeo, Sang-Soo* (2009) Editorial : In International journal of autonomous and adaptive communications systems, v.2 n.4, International journal of autonomous and adaptive communications systems, vol. 2, no. 4, pp. 313-316, Inderscience Publishers, Olney, England [C4]
ERA journal ID: 36602 – Scopus EID: Not tagged
DRO entry for this publication

Wang, Liang*, Wu, Qiang*, Li, Ming, Gonzalez, Jordi* and Geng, Xin* (2009) Editorial : In International Journal of pattern recognition and artificial intelligence, v.23 n.7, International Journal of pattern recognition and artificial intelligence, vol. 23, no. 7, pp. 1221-1222, World Scientific Publishing Co., Toh Tuck Link, Singapore [C4]
ERA journal ID: 17958 – Scopus EID: 2-s2.0-70450174152
DRO entry for this publication

Wang, Liang*, Wu, Qiang*, Wang, Hanzi*, Geng, Xin* and Li, Ming (2009) Image/video-based pattern analysis and HCI applications, Pattern recognition letters, vol. 30, no. 12, p. 1047, Elsevier BV, Amsterdam, Netherlands [C4]
ERA journal ID: 18106 – Scopus EID: 2-s2.0-67650260338
DRO entry for this publication

Xiang, Yang* and Zhou, Wanlei (2009) Special issue : multi-core supported network and system security, Concurrency and computation : practice and experience, vol. 21, no. 10, pp. 1251-1253, John Wiley & Sons, West Sussex, England [C4]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-67650481174
Citation counts: Scopus - 1
DRO entry for this publication

Zabir, Salim*, Abbawajy, J. H., Ahmed, Farid* and Karim, Mohammad A.* (2009) Guest editorial : In Journal of networks, v.4 n.10, Journal of networks, vol. 4, no. 10, pp. 929-930, Academy Publisher, Oulu, Finland [C4]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Zhou, Wanlei and Xiang, Yang* (2009) Editorial: network and system security, Journal of network and computer applications, vol. 32, no. 2, pp. 345-346, Academic Press, London, England [C4]
ERA journal ID: 18032 – Scopus EID: 2-s2.0-59249097172
DRO entry for this publication

Abawajy, Jemal (2009) Enhancing RFID tag resistance against cloning attack, in Xiang, Yang; Lopez, Javier; Wang, Haining and Zhou, Wanlei (eds), NSS 2009 : Proceedings of the third International Conference on Network and System Security, pp. 18-23, IEEE, Piscataway, N. J. [E1]
Citation counts: Scopus - 2
DRO entry for this publication

Abawajy, Jemal (2009) Determining service trustworthiness in inter loud computing environments, in Unknown (ed.), ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, pp. 784-788, ISPAN, Kaohsiung, Korea [E1]
Citation counts: Scopus - 18, Thomson - 5
DRO entry for this publication

Beliakov, Gleb and Yager, Ronald R.* (2009) OWA operators in linear regression and detection of outliers, in Unknown (ed.), AGOP 2009 : Proceedings of the Fifth International Summer School on Aggregation Operators, pp. 71-76, Universitat de les Illes Balears, Palma, Spain [E1]
DRO entry for this publication

Beliakov, Gleb and James, Simon (2009) Citation based journal rankings : an application of fuzzy measures, in Unknown (ed.), AGOP 2009 : Proceedings of the Fifth International Summer School on Aggregation Operators, pp. 59-64, Universitat de les Illes Balears, Palma, Spain [E1]
DRO entry for this publication

Beliakov, Gleb and James, Simon (2009) Using choquet integrals for evaluating citation indices in journal ranking, in Unknown (ed.), EUROFUSE 2009 : Proceedings of the Eurofuse Workshop Preference Modelling and Decision Analysis, pp. 1-6, Public University of Navarra, Pamplona, Spain [E1]
DRO entry for this publication

Beliakov, Gleb, Calvo, Tomasa* and James, Simon (2009) Some results on Lipschitz quasi-arithmetic means, in Carvalho, J. P.; Dubois, D.; Kaymak, U. and Sousa, J. M. C. (eds), IFSA-EUSFLAT 2009 : Proceedings of the 2009 International Fuzzy Systems Association World Congress and 2009 European Society for Fuzzy Logic and Technology Conference, pp. 1370-1375, EUSFLAT, Lisbon, Portugal [E1]
DRO entry for this publication

Brock, Michael and Goscinski, Andrzej (2009) Attributed publication and selection for web service-based distributed systems, in Zhang, Liang-Jie (eds), Services - I, 2009 World Conference on, pp. 732-739, IEEE Computer Society, Los Alamitos, Calif. [E1]
Citation counts: Thomson - 1
DRO entry for this publication

Brock, Michael and Goscinski, Andrzej (2009) Offering clusters from clouds using WSDL and stateful web services, in Unknown (ed.), APSCC 2009 : Services computing conference, IEEE Asia Pacific, pp. 233-238, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Calvo, Tomasa* and Beliakov, Gleb (2009) On migrative means and copulas, in Unknown (ed.), AGOP 2009 : Proceedings of the Fifth International Summer School on Aggregation Operators, pp. 107-109, Universitat de les Illes Balears, Palma, Spain [E1]
DRO entry for this publication

Chonka, Ashley and Zhou, Wanlei (2009) Defending grid web services from XDoS attacks by SOTA, in Unknown (ed.), Percom 2009 : Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, pp. 1-6, IEEE Computer Society, Piscataway, N. J. [E1]
DRO entry for this publication

Chowdhury, Belal*, Chowdhury, Morshed U and Sultana, Nasreen* (2009) Real-time early infectious outbreak detection systems using emerging technologies, in Unknown (ed.), ARTCom 2009 : Proceedings of the 2009 International Conference on Advances in Recent Technologies in Communication and Computing, pp. 506-508, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Craig, Annemieke, Coldwell, Jo and Goold, Annegret (2009) The role of the online teacher in supporting student learning: A case study, in Bastiaens, Theo; Dron, Jon and Xin, Cindy (eds), E-Learn 2009 : Proceedings of the World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, pp. 1181-1187, AACE, Vancouver, B.C. [E1]
DRO entry for this publication

Gao, Longxiang and Li, Ming (2009) Multi-level virtual ring : a foundation network architecture to support peer-to-peer application in wireless sensor network, in Unknown (ed.), ATNAC 2009 : Proceedings of the 2009 Australasian Telecommunication Networks and Applications Conference, pp. 1-6, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Goold, Annegret and Augar, Naomi (2009) Using virtual meeting spaces for work integrated learning, in Unknown (ed.), ASCILITE 2009 : Same places, different spaces : Proceedings of the 26th ASCILITE conference, pp. 367-371, Australian Society for Computers in Learning in Tertiary Education, Auckland, New Zealand [E1]
DRO entry for this publication

Hou, Jingyu and Chen, Yi-Ping Phoebe (2009) Data pre-processing for more effective gene clustering, in Yu, Lean; Lai, K. K. and Mishra, S. K. (eds), Proceedings of the 2nd International Joint Conference on Computational Sciences and Optimization, CSO 2009, pp. 710-713, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Islam, Md. Rafiqul, Abawajy, Jemal and Warren, Matthew (2009) Multi-tier phishing email classification with an impact of classifier rescheduling, in Unknown (ed.), ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, pp. 789-793, ISPAN, Kaohsiung, Korea [E1]
Citation counts: Scopus - 10, Thomson - 1
DRO entry for this publication

Jami, Dyed Imran*, Abawajy, Jemal H. and Shaikh, Zubair A.* (2009) Information provenance for open distributed collaborative system, in Unknown (ed.), ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, pp. 737-741, ISPAN, Kaohsiung, Korea [E1]
DRO entry for this publication

Li, Bai, Batten, Lynn and Doss, Robin (2009) Lightweight authentication for recovery in wireless sensor networks, in Unknown (ed.), MSN 2009 : Proceedings of the Mobile Ad-hoc and Sensor Networks 2009 international conference, pp. 465-471, IEEE Computer Society, Piscataway, N. J. [E1]
DRO entry for this publication

Li, Bai, Doss, R., Batten, L. M. and Schott, W.* (2009) Fast recovery from node compromise in wireless sensor networks, in Al-Agha, Khaldoun; Badra, Mohamad and Newby, Gregory B. (eds), NTMS 2009 : Proceedings of the NTMS 2009 3rd International Conference on New Technologies, Mobility and Security, pp. 1-6, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Li, Ke, Zhou, Wanlei and Li, Ping (2009) Reliable downloading algorithms for bittorrent-like systems, in Unknown (ed.), IFIP NPC 2009 : IFIP International Conference on Network and Parallel Computing Workshops : proceedings, 19-21 October, 2009, Gold Coast, Queensland, pp. 167-173, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Li, Ke, Zhou, Wanlei, Li, Ping, Hai, Jing and Liu, Jianwen (2009) Distinguishing DDoS attacks from flash crowds using probability metrics, in Xiang, Yang; Lopez, Javier; Wang, Haining and Zhou, Wanlei (eds), NSS 2009 : Proceedings of the third International Conference on Network and System Security, pp. 9-17, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Li, Ming and Gao, Longxiang (2009) Multi-level virtual ring : cross-level name routing with embedded identifier in sensor network, in Unknown (ed.), ICWN 2009 : Proceedings of the 2009 International Conference on Wireless Networks, pp. 67-74, ICWN, Las Vegas, Nev. [E1]
DRO entry for this publication

Li, Ming (2009) GeoConnect : geographic and connectivity-aware routing protocol for wireless sensor network, in Unknown (ed.), ICWN 2009 : Proceedings of the 2009 International Conference on Wireless Networks, pp. 96-102, ICWN, Las Vegas, Nev. [E1]
DRO entry for this publication

Liu, Qian*, Chen, Yi-Ping Phoebe and Li, Jinyan* (2009) High functional coherence in k-partite protein cliques of protein interaction networks, in Unknown (ed.), BIBM 2009 : Proccedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, pp. 111-117, IEEE Computer Society, Piscataway, N. J. [E1]
Citation counts: Scopus - 2, Thomson - 2
DRO entry for this publication

Mahdin, Hairulnizam* and Abawajy, Jemal (2009) An approach to filtering RFID data streams, in Unknown (ed.), ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, pp. 742-746, ISPAN, Kaohsiung, Korea [E1]
Citation counts: Scopus - 4
DRO entry for this publication

Nahar, Jesmin*, Tickle, Kevin S.*, Ali, A. B. M. Shawkat* and Chen, Yi-Ping (2009) Early breast cancer identification : Which way to go? Microarray or image based computer aided diagnosis!, in Xiang, Yang; Lopez, Javier; Wang, Haining and Zhou, Wanlei (eds), NSS 2009 : Proceedings of the third International Conference on Network and System Security, pp. 456-461, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Nasierding, G., Duc, B. V., Lee, S. L. A. and Kouzani, Abbas Z. (2009) Dual-random ensemble method for multi-label classification of biological data, in Unknown (ed.), ISBB 2009 : Proceedings of the 2009 International Symposium on Bioelectronics and Bioinformatics, pp. 49-52, ISBB, Melbourne, Vic. [E1]
DRO entry for this publication

Niu, Wenjia*, Li, Gang, Yang, Xinghua*, Xu, Han* and Shi, Zhongzhi* (2009) Facilitating dynamic web service composition with fine-granularity context management, in Lin, Tsau Young; Hu, Xiaohua; Xia, Jiali; Hong, Tzung-Pei; Shi, Zhongzhi; Han, Jianchao; Tsumoto, Shusaku and Shen, Xiajiong (eds), GrC 2009 : Proceedings of the 2009 IEEE International Conference on Granular Computing, pp. 454-459, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Pan, Lei and Batten, Lynn (2009) Robust correctness testing for digital forensic tools, in Sorell, Matthew (eds), Forensics in telecommunications, information and multimedia : second international conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009 : revised selected papers, pp. 54-64, Springer, Berlin, Germany [E1]
DRO entry for this publication

Tian, Ronghua, Batten, Lynn, Islam, Rafiqul and Versteeg, Steve* (2009) An automated classification system based on the strings of trojan and virus families, in Unknown (ed.), MALWARE 2009: 4th International Conference on Malicious and Unwanted Software, pp. 23-30, IEEE, New York, N.Y. [E1]
Citation counts: Scopus - 13, Thomson - 6
DRO entry for this publication

Yager, Ronald R.*, Beliakov, Gleb and James, Simon (2009) On generalized bonferroni means, in Unknown (ed.), EUROFUSE 2009 : Proceedings of the Eurofuse Workshop Preference Modelling and Decision Analysis, pp. 1-6, Public University of Navarra, Pamplona, Spain [E1]
DRO entry for this publication

Yildiz, Mehmet*, Abawajy, Jemal, Ercan, Tuncay* and Bernoth, Andrew* (2009) A layered security approach for cloud computing infrastructure, in Unknown (ed.), ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, pp. 763-767, ISPAN, Kaohsiung, Korea [E1]
Citation counts: Scopus - 16, Thomson - 3
DRO entry for this publication

Yu, Shui, Thapngam, Theerasak, Liu, Jianwen, Wei, Su and Zhou, Wanlei (2009) Discriminating DDoS flows from flash crowds using information distance, in Xiang, Yang; Lopez, Javier; Wang, Haining and Zhou, Wanlei (eds), NSS 2009 : Proceedings of the third International Conference on Network and System Security, pp. 351-356, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Yue, Ye*, Zhao, Ying*, You, Guohua*, Tu, Leqi* and Sajjanhar, Atul (2009) Parallelization of dissipative particle dynamics simulation, in Yu, Lean; Lai, K.K. and Mishar, S.K. (eds), CSO 2009 : Proceedings of the 2nd International Joint Conference on Computational Sciences and Optimization, pp. 18-22, IEEE Computer Society, Los Alamitos, Calif. [E1]
Citation counts: Scopus - 1
DRO entry for this publication

Zheng, Li*, Hoang, Doan B.* and Li, Ming (2009) Applying fair intelligent congestion control in a hybrid QoS architecture for wireless environment, in Unknown (ed.), ICICS 2009 : International Conference on Information, Communications and Signal Processing, pp. 1-6, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Fernando, Harinda and Abawajy, Jemal (2009) A RFID architecture framework for global supply chain applications, in Kotsis, Gabriele; Taniar, David; Pardede, Eric and Khalil, Ismail (eds), iiWAS 2009 : Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, pp. 313-320, Association for Computing Machinery, New York, United States [E1.1]
DRO entry for this publication

Khaddage, Ferial, Chonka, Ashley and Zhou, Wanlei (2009) Lectures display and presentation for mobile phone retrieval, in Unknown (ed.), ICBL 2009 : Proceedings of the Interactive Computer Aided Blended Learning 2009 international conference, Kassel University Press, Berlin, Germany [E1.1]
DRO entry for this publication

Khaddage, Ferial, Lanham, Elicia and Zhou, Wanlei (2009) Mobile phones as a learning device : is it time to stop the ban?, in Sánchez, Inmaculada Arnedillo and Isaías, Pedro (eds), ML 2009 : Proceedings of the Mobile Learning 2009 international conference, pp. 347-350, IADAS, Barcelona, Spain [E1.1]
DRO entry for this publication

Khaddage, Ferial, Chonka, Ashley and Zhou, Wanlei (2009) Technological considerations for mobile learning design, in Unknown (ed.), IMCL 2009 : Proceedings of the Interactive Mobile and Computer Aided Learning 2009 international conference, p. 310, The Conference, Amman, Jordan [E1.1]
DRO entry for this publication

Khaddage, F., Lanham, E. and Zhou, W. (2009) A proposed blended mobile learning model for application in higher education, in Unknown (ed.), IMCL2009 : Proceedings of the Interactive Mobile and Computer Aided Learning 2009 international conference, pp. 141-147, The Conference, Amman, Jordan [E1.1]
DRO entry for this publication

Khaddage, Ferial and Lattemann, Christoph* (2009) Towards an ad-hoc mobile social learning network using mobile phones, in Auer, Michael E. (eds), ICL 2009 : The challenges of lifelong learning : Proceedings of the Interactive Computer Aided Learning 2009 international conference, pp. 374-381, Kassel University Press, Berlin, Germany [E1.1]
DRO entry for this publication

Islam, Md Rafiqul, Zhou, Wanlei and Chowdhury, Morshed U (2009) MVGL analyser for multi-classifier based spam filtering system, ICIS 2009 : Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science 2009, pp. 394-399, IEEE, Piscataway, N. J. [E2]
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Wang, Jinlong*, Gao, Ke*, Ren, Yongli* and Li, Gang (2009) Journal ranking based on social information, JCDL 2009 : Proceedings of the 2009 ACM/IEEE International Joint Conference on Digital Libraries, p. 453, Association for Computing Machinery, New York, N. Y. [E2]
DRO entry for this publication

Kennedy, P. J.*, Ong, K-L. and Christen, P.* (2009) Data mining and analytics 2009, in Kennedy, P. J.; Ong, K-L. and Christen, P. (eds), AusMD, Melbourne, Vic. [E4]
DRO entry for this publication

Abawajy, Jemal, Hsu, Robert C. H.*, Chung, Yeh-Ching* and Deris, Mustafa* (2009) IASM 2009 Preface, IASM 2009 : Proceedings of the 2009 International Workshop on Information Assurance and Security Management, p. 1, IASM, Kaohsiung, Taiwan [EN]
DRO entry for this publication

Vincs, Kim, Yip, Wai Kuan*, Mak, Vicky and Barbour, Kim (2009) Choreographer-mathematician collaboration: developing machine segmentation techniques for motion capture analysis of dance, Movement and Motion Capture, pp. 1-29, Macquarie University, Sydney, N.S.W. [EN]
DRO entry for this publication

Yip, Wai Kuan*, Vincs, Kim and Mak, Vicky (2009) Analysis of motion capture using principal component analysis on spectral extracted features, HCSNet Workshop on Movement and Motion Capture [EN]
DRO entry for this publication

Abawajy, Jemal (2009) Internationalisation of curriculum : design and delivery of undergraduate security management course, MCEC 2009 : Proceedings of the 6th Melbourne Computing Education Conventicle 2009, MCEC, Melbourne, Vic. [L1]
DRO entry for this publication

Grants and Consultancies

Grants with funding during 2009

Research Income - National Competitive Grants

Kloeden, P and Ivanov, A. Computer visualisation of chaotic delay equations, Australian Research Council Small Grant [T]

  • 1995: $9,684

Goscinski, A, Horan, P and Gerrity, G*. Performance studies of distributed operating systems based on the Rhodos system, Australian Research Council Large Grant [T]

  • 1995: $44,768

Ivanov, A. Perturbations of Difference Equations, Australian Research Council Large Grant [T]

  • 1998: $1,167
  • 1997: $48,000

Wang, L. Solving Combinatorial Optimisation Problems using Discrete Time Neural Networks, Australian Research Council Small Grant [T]

  • 1997: $19,414

Garner, B and Sunwoo, J*. An automated (concurrent) software audit for software development process, Australian Research Council SPIRT Grant [T]

  • 2000: $77,487
  • 1999: $151,165

Goscinski, A. Supporting PVM Programmers and Improving Performance of PVM Based Parallel Processing., Australian Research Council Small Grant [T]

  • 1998: $17,000

Goscinski, A and Silcock, J. The Management of Parallel Processes, Data and computational Resources for Applications Using distributed Shared Memory., Australian Research Council Small Grant [T]

  • 1999: $17,000

Yang, Y and Zhou, W. Coordination and Security Mechanisms for Computer-Mediated Teamwork Support in a Web-based Environment., Australian Research Council Small Grant [T]

  • 1998: $10,000

Yang, Y. Visual Programming support for Web-Based Teamwork Modelling., Australian Research Council Small Grant [T]

  • 1999: $10,000

Zhou, W. A Reactive system for Building Fault-Tolerant java Applications, Australian Research Council Small Grant [T]

  • 1998: $10,000

Zhou, W. Towards the Building of Reliable Web-Based Databases., Australian Research Council Small Grant [T]

  • 1999: $14,000

Webb, G. Machine-expert collaborative knowledge acquisition, Australian Research Council Large Grant [T]

  • 1996: $47,286
  • 1995: $46,934

Kloeden, P and Diamond, P*. Numerical Analysis of Dynamical Systems and the Computational Process as a Dynamical System, Australian Research Council Large Grant [T]

  • 1997: $71,280
  • 1996: $68,795
  • 1995: $65,000

Webb, G, Pazzani, M* and Zheng, Z*. Learning efficient accurate Bayesian classifiers from data, Australian Research Council Large Grant [T]

  • 2000: $56,971

Goscinski, A. The Improvement of Execution Performance of Parallel Applications and Utilisation of a Cluster of Workstations Using Global Scheduling, Australian Research Council Small Grant [T]

  • 2000: $16,300

Zhang, C. Coordinating Multi-Agent Systems for Business Process Management Based on Temporal Dependencies, Australian Research Council Small Grant [T]

  • 2000: $16,000

Zhou, W. Managing Replicated Transactions in Web-Based Applications to survive Network Partitioning Failures, Australian Research Council Small Grant [T]

  • 2000: $13,000

Webb, G. Learning efficient accurate Bayesian classifiers from data, Australian Research Council Large Grant [T]

  • 2002: $61,626
  • 2001: $60,281

Goscinski, A, Zhou, B and Brent, R. Job Scheduling Strategies for General-Purpose High Performance Computing Clusters, ARC - Discovery [T]

  • 2004: $70,033
  • 2003: $66,155
  • 2002: $62,322

Zou, L and Hu, E. Removal of Toxic Air Pollutants from car cabin by Photocatalytic Oxidation Reactor, Australian Research Council Linkage APAI [T]

  • 2005: $24,650

Chen, Y. Design and development of a Web-based Intelligent Multimedia Mining System, Australian Research Council Linkage Project [T]

  • 2005: $24,650
  • 2004: $48,260

Dawson, E*, Batten, L and Simpson, L*. Efficient and Secure Word-Based Stream Ciphers for Wireless Communications, Australian Research Council Discovery Project [T]

  • 2005: $16,666
  • 2004: $16,666

Chen, Y. Australian Centre for Genome-Phenome Bioinformatics, ARC Centre - Centres of Excellence [T]

  • 2009: $54,572
  • 2005: $96,122
  • 2004: $82,000

Chen, Y. Integrating Database Technologies and Visual Analysis, Australian Research Council, Project - Discovery - Projects [T]

  • 2004: $62,961

Chen, Y, Wong, L* and Li, J*. Development of Knowledge Discovery for High Dimensional Biomedical Data, Australian Research Council [T]

  • 2005: $7,147

Goscinski, A, Silcock, J, Hobbs, M and Dew, R. Self Discovery, Self Configuration and Self Healing of Enterprise Grids, Australian Research Council Discovery Project [T]

  • 2005: $82,701

Chen, Y. Exploiting Database Technologies for the Visualization and Analysis of Measured and Simulated Plant Structures in Bioinformatics, Australian Research Council Discovery Project [T]

  • 2005: $51,050

Zhou, S* and Mak, V. Channel Assignment in Cellular Communication Systems and Optical Networks, Australian Research Council Discovery Project [T]

  • 2005: $2,500

Wang, H* and Charnes, C. Private Information Retrieval, Australian Research Council Discovery Project [T]

  • 2005: $10,000

Zhou, W, Shi, W* and Shi, W. Protecting Web Services from Distributed Denial of Service Attacks, ARC Collaborative - Linkage - Projects (Round 2, APAI) [T]

  • 2009: $13,069
  • 2005: $12,325

Zhou, W. Development of methods to address internet crime, ARC Grant - Discovery Projects [T]

  • 2009: $78,568

Research Income - Other Public Sector Funding

Ivanov, A. Visiting fellowship for Professor Alexander Sharkovsky. [U]

  • 1997: $13,950

Hobbs, M. PhD Scholarship - Brendan McKenzie [U]

  • 2005: $8,931
  • 2004: $13,863
  • 2003: $13,500
  • 2002: $13,000

Warren, M. PhD Scholarship - Warren Brooks [U]

  • 2002: $13,000

Zhou, W. PhD Scholarship - Elicia Lanham [U]

  • 2005: $8,228
  • 2004: $13,863
  • 2003: $13,500
  • 2002: $13,000

Zhou, W. Local Government System [U]

  • 2005: $1,250
  • 2004: $7,500
  • 2003: $1,250

Goscinski, A. PhD Scholarship - Andrew Maloney [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Zhou, W. PhD Scholarship - John Casey [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Zhou, W. PhD Scholarship - Naomi Augar [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Batten, L, Doss, R and Palm, B*. Recovery Mechanisms for Wireless Sensor Devices [U]

  • 2009: $18,855

Research Income - Industry and Other Funding

Garner, B. Scholarship Income [V]

  • 2000: $20,000

Batten, L and Castleman, T. Supplier wide eBusiness engagement Project [V]

  • 2003: $25,000
  • 2002: $25,000

Rosenberg, J. BlueJ- The interactive environment [V]

  • 2003: $168,899

Chen, Y. Design and development of a Web-based Intelligent Multimedia Mining System [V]

  • 2004: $5,000
  • 2005: $5,000

Research Income - Industry and Other Funding - Australian

Zhou, W, Shi, W* and Shi, W. Protecting Web Services from Distributed Denial of Service Attacks [V.1]

  • 2005: $6,000

Beliakov, G. Reliable methods of data approximation and forecasting [V.1]

  • 2005: $21,000

Zhou, W and Shi, W. A novel computational approach for identifying transcription factor binding sites in gene promoters [V.1]

  • 2005: $23,000

Chen, Y. Development of data mining tools for the prediction of genomic linked clinical outcomes in a genetic disease state Cystic Fibrosis [V.1]

  • 2005: $18,000

Research Income - Industry and Other Funding - International B (Other Income)

Rosenberg, J. BlueJ- The interactive environment [V.3]

  • 2007: $215,655

Higher Degree by Research Completions

2009 - Doctor of Philosophy

Ashley Chonka. Supervisor: Wanlei Zhou
Thesis entitled: Protecting Web Services from various Distributed Denial of Service Attacks.

Keith Knapp. Supervisor: Yi-Ping Phoebe Chen
Thesis entitled: Statistical Properties and Taxonomies of Human Untranslated Exons.

Ke Li. Supervisor: Wanlei Zhou
Thesis entitled: Reliable Algorithms and Attack Detection Schemes for Network Systems.

Leanne Ngo. Supervisor: Wanlei Zhou
Thesis entitled: Transitioning towards an Improved IT Security Culture in Organisations.

Guy William Wood-Bradley. Supervisor: Michael Hobbs
Thesis entitled: Supporting Gen Y's Engagement, Enrichment and Entertainment in Interactive Technologies.

2009 - Master of Science

Ana Palavestra (nee Jancic). Supervisor: Lynn Batten
Thesis entitled: Authentication in Public Key Encryption Schemes.

Legend:
* Not a member of Deakin University at time of output.

DRO to publications collection last synchronised: Thursday 30th October 2014 10:04pm

Deakin University acknowledges the traditional land owners of present campus sites.

8th November 2010