Research Services Division

Deakin Research

2012 School of Information Technology Research Output

Note: The 2012, 2013, 2014 publications have not been audited.

Jump to: Publications | Grants and Consultancies | HDR completions

Publications

Cesare, Silvio and Xiang, Yang (2012) Software similarity and classification, in Cesare, Silvio and Xiang, Yang (eds), Springer, Berlin, Germany [A1]
DRO entry for this publication

Xiang, Yang, Stojmenovic, Ivan*, Apduhan, Bernady O.*, Wang, Guojun*, Nakano, Koji* and Zomaya, Albert* (2012) Algorithms and architectures for parallel processing, in Xiang, Yang; Stojmenovic, Ivan; Apduhan, Bernady O.; Wang, Guojun; Nakano, Koji and Zomaya, Albert (eds), Springer Verlag, Berlin, Germany [A1.1]
DRO entry for this publication

Xiang, Yang, Stojmenovic, Ivan*, Apduhan, Bernady O.*, Wang, Guojun*, Nakano, Koji* and Zomaya, Albert* (2012) Algorithms and architectures for parallel processing, in Xiang, Yang; Stojmenovic, Ivan; Apduhan, Bernady O.; Wang, Guojun; Nakano, Koji and Zomaya, Albert (eds), Springer Verlag, Berlin, Germany [A1.1]
DRO entry for this publication

Abawajy, Jemal H., Pathan, Mukaddim*, Rahman, Mustafizur*, Pathan, Al-Sakib Khan* and Deris, Mustafa Mat* (2012) Internet and distributed computing advancements : theoretical frameworks and practical applications, in Abawajy, Jemal H.; Pathan, Mukaddim; Rahman, Mustafizur; Pathan, Al-Sakib Khan and Deris, Mustafa Mat (eds), Information Science Reference, Hershey, Pa. [A7]
DRO entry for this publication

Abawajy, Jemal H., Pathan, Mukaddim*, Rahman, Mustafizur*, Pathan, Al-Sakib Khan* and Deris, Mustafa Mat* (2012) Network and traffic engineering in emerging distributed computing applications, in Abawajy, Jemal H.; Pathan, Mukaddim; Rahman, Mustafizur; Pathan, Al-Sakib Khan and Deris, Mustafa Mat (eds), Information Science Reference, Hershey, Pa. [A7]
DRO entry for this publication

Kim, Tai-hoon*, Mohammed, Sabah*, Ramos, Carlos*, Abawajy, Jemal, Kang, Byeong-Ho* and Slezak, Dominik* (2012) Computer applications for modeling, simulation, and automobile : International Conferences, MAS and ASNT 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings, in Kim, Tai-hoon; Mohammed, Sabah; Ramos, Carlos; Abawajy, Jemal; Kang, Byeong-Ho and Slezak, Dominik (eds), Springer, Berlin, Germany [A7]
DRO entry for this publication

Kim, Tai-hoon*, Ramos, Carlos*, Abawajy, Jemal, Kang, Byeong-Ho*, Slezak, Dominik* and Adeli, Hojjat* (2012) Computer applications for modeling, simulation, and automobile : International Conferences, MAS and ASNT 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings, in Kim, Tai-hoon; Ramos, Carlos; Abawajy, Jemal; Kang, Byeong-Ho; Slezak, Dominik and Adeli, Hojjat (eds), Springer, Berlin, Germany [A7]
DRO entry for this publication

Kim, Tai-hoon*, Ko, Dae-sik*, Vasilakos, Thanos*, Stoica, Adrian* and Abawajy, Jemal (2012) Computer applications for communication, networking, and digital contents : International Conferences, FGCN and DCA 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceeding, in Kim, Tai-hoon; Ko, Dae-sik; Vasilakos, Thanos; Stoica, Adrian and Abawajy, Jemal (eds), Springer, Berlin, Germany [A7]
DRO entry for this publication

Xiang, Yang, Lopez, Javier*, Kuo, C.C. Jay* and Zhou, Wanlei (2012) Cyberspace safety and security : 4th International Symposium, CSS 2012 Melbourne, Australia, December 12-13, 2012 Proceedings, in Xiang, Yang; Lopez, Javier; Kuo, C.C. Jay and Zhou, Wanlei (eds), Springer-Verlag, Berlin, Germany [A7]
DRO entry for this publication

Dai, Honghua, Liu, James N. K.* and Smirov, Evgueni* (2012) Reliable knowledge discovery, in Dai, Honghua; Liu, James N. K. and Smirov, Evgueni (eds), Springer, New York, NY [A7.1]
DRO entry for this publication

Abawajy, Jemal and Kelarev, Andrei (2012) A multi-tier ensemble construction of classifiers for phishing email detection and filtering, in Xiang, Yang; Lopez, Javier; Kuo, C.C. Jay and Zhou, Wanlei (eds), Cyberspace safety and security : 4th International Symposium, CSS 2012 Melbourne, Australia, December 12-13, 2012 Proceedings, pp. 48-56, Springer-Verlag, Berlin, Germany [B1]
DRO entry for this publication

Al-jaljouli, Raja and Abawajy, Jemal (2012) Security framework for mobile agents-based applications, in Kumar, A.V. Senthil and Rahman, Hakikur (eds), Mobile computing techniques in emerging markets : systems, applications and services, pp. 242-269, Information Science Reference, Hershey Pa. [B1]
DRO entry for this publication

Al-jaljouli, Raja and Abawajy, Jemal (2012) Mobile agents security protocols, in Kumar, A.V. Senthil and Rahman, Hakikur (eds), Mobile computing techniques in emerging markets : systems, applications and services, pp. 270-305, Information Science Reference, Hershey, Pa. [B1]
DRO entry for this publication

Al-Jaljouli, Raja and Abawajy, Jemal (2012) Strategies for agent-based negotiation in e-trade, in Abawajy, Jemal; Pathan, Mukaddim; Rahman, Mustafizur; Pathan, Al-Sakib Khan and Deris, Mustafa Mat (eds), Network and traffic engineering in emerging distributed computing applications, pp. 43-65, Information Science Reference, Hershey, Pa. [B1]
DRO entry for this publication

Bedregal, Benjamin*, Beliakov, Gleb, Bustince, Humberto*, Fernandez, Javier*, Pradera, Ana* and Reiser, Renata Hax Sander* (2012) Negations generated by bounded lattices t-norms, in Greco, Salvatore; Bouchon-Meunier, Bernadette; Coletti, Giulianella; Fedrizzi, Mario; Matarazzo, Benedetto and Yager, Ronald R. (eds), Advances in computational intelligence, pp. 326-335, Springer Berlin Heidelberg, Berlin, Germany [B1]
DRO entry for this publication

Beliakov, Gleb and James, Simon (2012) Using linear programming for weights identification of generalized bonferroni means in R, in Torra, Vicenc; Narukawa, Yasuo; Lopez, Beatriz and Villaret, Mateu (eds), Modeling decisions for artificial intelligence : 9th international conference, MDAI 2012, Girona, Catalonia, Spain, November 2012 : proceedings, pp. 35-44, Springer, Berlin, Germany [B1]
DRO entry for this publication

Dai, Honghua (2012) Reliable graph discovery, in Dai, Honghua; Liu, James N. K. and Smirnov, Evgueni (eds), Reliable knowledge discovery, pp. 93-107, Springer, New York, N. Y. [B1]
DRO entry for this publication

Dai, Honghua (2012) The impact of sample size and data quality to classification reliability, in Dai, Honghua; Liu, James N. K. and Smirnov, Evgueni (eds), Reliable knowledge discovery, pp. 219-226, Springer, New York, N. Y. [B1]
DRO entry for this publication

Dang, Xuan Hong*, Ong, Kok-Leong and Lee, Vincent* (2012) An adaptive algorithm for finding frequent sets in landmark windows, in Hüllermeier, Eyke; Link, Sebastian; Fober, Thomas and Seeger, Bernhard (eds), Scalable uncertainty management, pp. 590-597, Springer Berlin Heidelberg, Berlin, Germany [B1]
DRO entry for this publication

Fernando, Harinda Sahadeva and Abawajy, Jemal (2012) A security framework for networked RFID, in Abawajy, Jemal H.; Pathan, Mukaddim; Rahman, Mustafizur; Pathan, Al-Sakib Khan and Deris, Mustafa Mat (eds), Internet and distributed computing advancements : theoretical frameworks and practical applications, pp. 85-114, IGI Global, Hershey, Pa. [B1]
DRO entry for this publication

Gan, Min and Dai, Honghua (2012) Subsequence frequency measurement and its impact on knowledge discovery in single sequences, in Dai, Honghua; Liu, James N. K. and Smirnov, Evgueni (eds), Reliable knowledge discovery, pp. 239-255, Springer, New York, N. Y. [B1]
DRO entry for this publication

Bansal, Shivali G. and Abawajy, Jemal (2012) Multi-input-multi-output antennas for radio frequency identification systems, in Karmakar, Nemai Chandra (eds), Chipless and conventional radio frequency identification : systems for ubiquitous tagging, pp. 96-127, IGI Global, United States [B1]
DRO entry for this publication

Goscinski, Andrzej, Brock, Michael and Church, Philip C. (2012) High performance computing clouds, in Wang, Lizhe; Ranjan, Rajiv; Chen, Jinjun and Benatallah, Boualem (eds), Cloud computing : methodology, systems and applications, pp. 221-259, CRC Press, Boca Raton, Fla. [B1]
DRO entry for this publication

Herawan, Tutut*, Noraziah, A.*, Abdullah, Zailani*, Deris, Mustafa Mat* and Abawajy, Jemal H. (2012) EFP-M2 : efficient model for mining frequent patterns in transactional database, in Nguyen, Ngoc-Thanh; Hoang, Kiem and Jedrzejowicz, Piotr (eds), Computational collective intelligence : technologies and applications : 4th international conference, ICCCI 2012, Ho Chi Minh City, Vietnam, November 28-30, 2012 : proceedings, pp. 29-38, Springer Berlin Heidelberg, Berlin, Germany [B1]
DRO entry for this publication

Izadi, Davood, Abawajy, Jemal and Ghanavati, Sarah* (2012) Quality control of sensor network data, in Lee, Gary (eds), Advances in automation and robotics, vol.1, selected papers from the 2011 International Conference on Automation and Robotics (ICAR 2011), Dubai, December 1-2, 2011, pp. 467-480, Springer, Berlin, Germany [B1]
DRO entry for this publication

Liao, Zhihua* and Zhang, Zili (2012) A generic classifier-ensemble approach for biomedical named entity recognition, in Tan, Pang-Ning; Chawla, Sanjay; Ho, Chin Kuan and Bailey, James (eds), Advances in knowledge discovery and data mining, pp. 86-97, Springer-Verlag, Berlin, Germany [B1]
DRO entry for this publication

Liu, Yu-Hsn*, Ong, Kok-Leong and Goscinski, Andrzej (2012) Sensor-cloud computing : novel applications and research problems, in Benlamri, Rachid (eds), Networked digital technologies : 4th international conference, NDT 2012, Dubai, UAE, April 24-26, 2012 : proceedings, Part II, pp. 475-486, Springer Berlin Heidelberg, Berlin, Germany [B1]
DRO entry for this publication

Mahdin, Hairulnizam* and Abawajy, Jemal (2012) An approach to faulty reader detection in RFID reader network, in Abawajy, Jemal H.; Pathan, Mukaddim; Rahman, Mustafizur; Pathan, Al-Sakib Khan and Deris, Mustafa Mat (eds), Internet and distributed computing advancements : theoretical frameworks and practical applications, pp. 70-84, IGI Global, Hershey, Pa. [B1]
DRO entry for this publication

Fudzee, Mohd Farhan Md* and Abawajy, Jemal H. (2012) Management of service level agreement for service-oriented content adaptation platform, in Abawajy, Jemal; Pathan, Mukaddim; Rahman, Mustafizur; Pathan, Al-Sakib Khan and Deris, Mustafa Mat (eds), Network and traffic engineering in emerging distributed computing applications, pp. 21-42, Information Science Reference, Hershey, Pa. [B1]
DRO entry for this publication

Moonsamy, Veelasha, Tian, Ronghua and Batten, Lynn (2012) Feature reduction to speed up malware classification, Information security technology for applications, pp. 176-188, Springer, Berlin , Germany [B1]
DRO entry for this publication

Nurunnabi, Abdul Awal Md.* and Dai, Honghua (2012) Robust-diagnostic regression : a prelude for inducing reliable knowledge from regression, in Dai, Honghua; Liu, James N. K. and Smirnov, Evgueni (eds), Reliable knowledge discovery, pp. 69-92, Springer, New York, N. Y. [B1]
DRO entry for this publication

Ren, Yongli, Li, Gang and Zhou, Wanlei (2012) Improving Top-N recommendations with user consuming profiles, in Anthony, Patricia; Ishizuka, Mitsuru and Lukose, Dickson (eds), PRICAI 2012 : trends in artificial intelligence : 12th Pacific Rim International Conference on Artificial Intelligence, Kuching, Malaysia September 3-7 2012 : proceedings, pp. 887-890, Springer-Verlag, Berlin, Germany [B1]
DRO entry for this publication

Singh, Kalpana, Zhong, Jian*, Mirchandani, Vinod*, Batten, Lynn and Bertok, Peter* (2012) Securing data privacy on mobile devices in emergency health situations, in Schmidt, Andreas U.; Russello, Giovanni; Krontiris, Ioannis and Lian, Shiguo (eds), Security and privacy in mobile information and communication systems : 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised selected papers, pp. 119-130, Springer, Berlin, Germany [B1]
DRO entry for this publication

Tong, Endong*, Niu, Wenjia*, Li, Gang, Tang, Hui*, Tang, Ding* and Ci, Song* (2012) Hierarchical workflow management in wireless sensor network, PRICAI 2012 : trends in artificial intelligence : 12th Pacific Rim International Conference on Artificial Intelligence, Kuching, Malaysia September 3-7 2012 : proceedings, pp. 601-612, Springer-Verlag, Berlin, Germany [B1]
DRO entry for this publication

Tong, Endong*, Niu, Wenjia*, Tang, Hui*, Li, Gang and Zhao, Zhijun* (2012) Reasoning-based context-aware workflow management in wireless sensor network, in Pallis, George; Jmaiel, Mohamed; Charfi, Anis; Graupner, Sven; Karabulut, Yücel; Guinea, Sam; Rosenberg, Florian; Sheng, Quan Z.; Pautasso, Cesare and Mokhtar, Sonia Ben (eds), Service-oriented computing - ICSOC 2011 Workshops, pp. 270-282, Springer-Verlag, Heidelberg, Germany [B1]
DRO entry for this publication

Wang, Xiaofeng*, Niu, Wenjia*, Li, Gang, Yang, Xinghua* and Shi, Zhongzhi* (2012) Mining frequent agent action patterns for effective multi-agent-based web service composition, in Cao, Longbing; Bazzan, Ana L. C.; Symeonidis, Andreas L.; Gorodetsky, Vladimir I.; Weiss, Gerhard and Yu, Philip S. (eds), Agents and data mining interaction : 7th International Workshop on Agents and Data Mining Interation, ADMI 2011, Taipei, Taiwan, May 2-6 2011 : revised selected papers, pp. 211-227, Springer-Verlag, Berlin, Germany [B1]
Citation counts: Scopus - 2
DRO entry for this publication

Wu, Yuheng*, Zhang, Zili, Deng, Yong*, Zhou, Huan* and Qian, Tao* (2012) An enhanced multi-agent system with evolution mechanism to approximate Physarum transport networks, in Thielscher, Michael and Zhang, Dongmo (eds), AI 2012 : Advances in artificial intelligence : 25th Australasian Joint Conference Sydney, Australia, December 4-7, 2013. Proceedings, pp. 27-38, Springer Berlin Heidelberg, Berlin, Germany [B1]
DRO entry for this publication

Yu, Shui, James, Simon, Yonghong, Tian* and Dou, Wanchun* (2012) Reliable aggregation on network traffic for web based knowledge discovery, in Dai, Honghua; Liu, James N. K. and Smirnov, Evgueni (eds), Reliable knowledge discovery, pp. 149-159, Springer, New York, NY [B1]
DRO entry for this publication

Zhuang, Ling, Gan, Min and Dai, Honghua (2012) Improving reliability of unbalanced text mining by reducing performance bias, in Dai, Honghua; Liu, James N. K. and Smirnov, Evgueni (eds), Reliable knowledge discovery, pp. 259-268, Springer, New York, N. Y. [B1]
DRO entry for this publication

Mamoun, Alazab*, Venkatraman, Sitalakshmi*, Watters, Paul*, Alazab, Moutaz and Alazab, Ammar (2012) Cybercrime : the case of obfuscated malware, Global security, safety, and sustainability : 7th International and 4th e-Democracy Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised selected papers, pp. 204-211, Springer-Verlag, Berlin, Germany [B1.1]
Citation counts: Scopus - 2
DRO entry for this publication

Chi, Xiaoxiao and Hou, Jingyu (2012) Iteratively predict protein functions from protein-protein interactions, in Zhu, Egui and Sambath, Sabo (eds), Information technology and agricultural engineering, pp. 771-778, Springer-Verlag Berlin Heidelberg, Berlin, Germany [B1.1]
DRO entry for this publication

Nakano, Koji*, Zomaya, Albert* and Xiang, Yang (2012) Message from the ICA3PP 2012 general chairs, in Xiang, Yang; Stojmenovic, Ivan; Apduhan, Bernady O.; Wang, Guojun; Nakano, Koji and Zomaya, Albert (eds), Algorithms and architectures for parallel processing, Springer-Verlag, Berlin, Germany [BN]
DRO entry for this publication

Abawajy, J. and Kelarev, A.V. (2012) Classification systems based on combinatorial semigroups, Semigroup forum, vol. 86, pp. 603-612, Springer, New York, N.Y. [C1]
ERA journal ID: 389 – Scopus EID: Not tagged
Citation counts: Thomson - 1
DRO entry for this publication

Abawajy, Jemal (2012) Analysis of asynchronous online discussion forums for collaborative learning, International journal of education and learning, vol. 1, no. 2, pp. 11-21, SERSC, Sandy Bay, Tas. [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Alhyari, Salah*, Alazab, Moutaz, Venkatraman, Sitalakshmi*, Alazab, Mamoun* and Alazab, Ammar (2012) Six sigma approach to improve quality in E-services : an empirical study in Jordan, International journal of electronic government research, vol. 8, no. 2, pp. 57-74, IGI Global, Hershey, Pa. [C1]
ERA journal ID: 30348 – Scopus EID: Not tagged
DRO entry for this publication

Batten, Lynn, Pan, Lei and Khan, Nisar (2012) Hypothesis generation and testing in event profiling for digital forensic investigations, International journal of digital crime and forensics, vol. 4, no. 4, pp. 1-14, IGI Global, Hershey, Pa. [C1]
ERA journal ID: 40173 – Scopus EID: 2-s2.0-84880539102
DRO entry for this publication

Bedregal, Benjamín*, Beliakov, Gleb, Bustince, Humberto*, Calvo, Tomasa*, Mesiar, Radko* and Paternain, Daniel* (2012) A class of fuzzy multisets with a fixed number of memberships, Information sciences, vol. 189, pp. 1-17, Elsevier, Philadelphia, Pa. [C1]
ERA journal ID: 17908 – Scopus EID: 2-s2.0-84855873168
Citation counts: Scopus - 8
DRO entry for this publication

Beliakov, Gleb, Bustince, Humberto*, James, Simon, Calvo, Tomasa* and Fernandez, Javier* (2012) Aggregation for Atanassov's intuitionistic and interval valued fuzzy sets: the median operator, IEEE transactions on fuzzy systems, vol. 20, no. 3, pp. 487-498, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 17872 – Scopus EID: 2-s2.0-84867583764
Citation counts: Scopus - 12, Thomson - 12
DRO entry for this publication

Beliakov, Gleb and Li, Gang (2012) Improving the speed and stability of the k-nearest neighbors method, Pattern recognition letters, vol. 33, no. 10, pp. 1296-1301, Elsevier BV, Amsterdam, Netherlands [C1]
ERA journal ID: 18106 – Scopus EID: 2-s2.0-84860223796
Citation counts: Scopus - 6, Thomson - 5
DRO entry for this publication

Beliakov, Gleb, Bustince, Humbeto* and Paternain, Daniel* (2012) Image reduction using means on discrete product lattices, IEEE transactions on image processing, vol. 21, no. 3, pp. 1070-1083, IEEE, Piscataway, N. J. [C1]
ERA journal ID: 17873 – Scopus EID: Not tagged
Citation counts: Thomson - 10
DRO entry for this publication

Beliakov, Gleb, Yearwood, John* and Kelarev, Andrei (2012) Application of rank correlation, clustering and classification in information security, Journal of networks, vol. 7, no. 6, pp. 935-945, Academy Publisher, Oulu, Finland [C1]
ERA journal ID: 40962 – Scopus EID: Not tagged
DRO entry for this publication

Beliakov, Gleb, Johnstone, Michael, Creighton, Doug and Wilkin, Tim (2012) An efficient implementation of Bailey and Borwein's algorithm for parallel random number generation on graphics processing units, Computing, pp. 1-18, Springer, Wein, Austria [C1]
ERA journal ID: 17816 – Scopus EID: Not tagged
Citation counts: Thomson - 1
DRO entry for this publication

Beliakov, Gleb, Kelarev, Andrei and Yearwood, John* (2012) Derivative-free optimization and neural networks for robust regression, Optimization, vol. 61, no. 12, pp. 1467-1490, Taylor & Francis, Abingdon, England [C1]
ERA journal ID: 346 – Scopus EID: 2-s2.0-84868710324
Citation counts: Scopus - 2, Thomson - 2
DRO entry for this publication

Beliakov, G., Johnstone, M. and Nahavandi, S. (2012) Computing of high breakdown regression estimators without sorting on graphics processing units, Computing, vol. 94, no. 5, pp. 433-447, Springer-Verlag, Wien, Austria [C1]
ERA journal ID: 17816 – Scopus EID: 2-s2.0-84861696059
Citation counts: Scopus - 2, Thomson - 2
DRO entry for this publication

Beloglazov, Anton*, Abawajy, Jemal and Buyya, Rajkumar* (2012) Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing, Future generation computer systems, vol. 28, no. 5, pp. 755-768, Elsevier BV, Amsterdam, Netherlands [C1]
ERA journal ID: 17858 – Scopus EID: Not tagged
Citation counts: Thomson - 56
DRO entry for this publication

Church, Phillip C., Goscinski, Andrzej and Lefevre, Christophe (2012) EXP-PAC : providing comparative analysis and storage of next generation gene expression data, Genomics, vol. 100, no. 1, pp. 8-13, Academic Press, Maryland Heights, MO [C1]
ERA journal ID: 2388 – Scopus EID: 2-s2.0-84862753124
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Coldwell-Neilson, J., Beekhuyzen, J.* and Craig, A. (2012) Which e-learning technology is right for me?, International journal of emerging technologies in learning, vol. 7, no. 2, pp. 13-21, Kassel University Press GmbH, Kassel, Germany [C1]
ERA journal ID: 123536 – Scopus EID: 2-s2.0-84863894402
DRO entry for this publication

Cui, Yongrui, Li, Mingchu*, Xiang, Yang, Ren, Yizhi* and Cesare, Silvio (2012) A QoS-based fine-grained reputation system in the grid environment, Concurrency computation : practice and experience, vol. 24, no. 17, pp. 1990-2006, John Wiley & Sons, Chichester, England [C1]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-84867337310
Citation counts: Scopus - 3, Thomson - 3
DRO entry for this publication

Doss, Robin, Zhou, Wanlei, Sundaresan, Saravanan, Yu, Shui and Gao, Longxiang (2012) A minimum disclosure approach to authentication and privacy in RFID systems, Computer networks, vol. 56, no. 15, pp. 3401-3416, Elsevier BV, Amsterdam, The Netherlands [C1]
ERA journal ID: 22147 – Scopus EID: 2-s2.0-84865741288
Citation counts: Scopus - 6, Thomson - 4
DRO entry for this publication

Gan, Min and Dai, Honghua (2012) Mining condensed sets of frequent episodes with more accurate frequencies from complex sequences, International journal of innovative computing, information & control, vol. 8, no. 1(A), pp. 453-470, ICIC International, Kumamoto, Japan [C1]
ERA journal ID: 3492 – Scopus EID: Not tagged
DRO entry for this publication

Gan, Min and Dai, Honghua (2012) An efficient one-pass method for discovering bases of recently frequent episodes over online data streams, International journal of innovative computing, information and control, vol. 8, no. 7A, pp. 4675-4690, ICIC International, Kumamoto, Japan [C1]
ERA journal ID: 3492 – Scopus EID: 2-s2.0-84862309146
Citation counts: Scopus - 1
DRO entry for this publication

Gao, Longxiang, Li, Ming, Bonti, Alessio, Zhou, Wanlei and Yu, Shui (2012) M-Dimension : multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models, Journal of network and computer applications, vol. 35, no. 4, pp. 1285-1296, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 18032 – Scopus EID: Not tagged
Citation counts: Thomson - 3
DRO entry for this publication

Hou, Jingyu and Chi, Xiaoxiao (2012) Predicting protein functions from PPI networks using functional aggregation, Mathematical biosciences, vol. 240, no. 1, pp. 63-69, Elsevier, Philadelphia, Pa. [C1]
ERA journal ID: 931 – Scopus EID: 2-s2.0-84864746280
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Huang, Yonggang*, Ma, Dianfu*, Zhang, Jun and Zhao, Yongwang* (2012) QDFA : query-dependent feature aggregation for medical image retrieval, IEICE transactions on information and systems, vol. E95-D, no. 1, pp. 275-279, Denshi Jouhou Tsuushin Gakkai (Institute of Electronics Information and Communication Engineers), Tokyo, Japan [C1]
ERA journal ID: 17892 – Scopus EID: 2-s2.0-84855299875
DRO entry for this publication

Huang, Yonggang*, Zhang, Jun, Zhao, Yongwang* and Ma, Dianfu* (2012) A new re-ranking method using enhanced pseudo-relevance feedback for content-based medical image retrieval, IEICE transactions on information and systems, vol. E95-D, no. 2, pp. 694-698, Denshi Jouhou Tsuushin Gakkai, Tokyo, Japan [C1]
ERA journal ID: 17892 – Scopus EID: 2-s2.0-84863036767
Citation counts: Scopus - 1
DRO entry for this publication

Islam, Rafiqul*, Tian, Ronghua, Moonsamy, Veelasha and Batten, Lynn (2012) A comparison of the classification of disparate malware collected in different time periods, Journal of networks, vol. 7, no. 6, pp. 946-955, Academy Publisher, Oulu, Finland [C1]
ERA journal ID: 40962 – Scopus EID: Not tagged
DRO entry for this publication

Javadi, Bahman*, Abawajy, Jemal and Buyya, Rajkumar* (2012) Failure-aware resource provisioning for hybrid cloud infrastructure, Journal of parallel and distributed computing, vol. 72, no. 10, pp. 1318-1331, Academic Press, Maryland Heights, Mo. [C1]
ERA journal ID: 18036 – Scopus EID: 2-s2.0-84865067611
Citation counts: Scopus - 8, Thomson - 3
DRO entry for this publication

Jiang, Jiao Jiao*, Zhanga, Hai Bin* and Yu, Shui (2012) An interior point trust region method for nonnegative matrix factorization, Neurocomputing, vol. 97, pp. 309-316, Elsevier BV, Amsterdam, The Netherlands [C1]
ERA journal ID: 18092 – Scopus EID: 2-s2.0-84865327519
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Khayyam, Hamid, Ranjbarzadeh, Hassan and Marano, Vincenzo* (2012) Intelligent control of vehicle to grid power, Journal of power sources, vol. 201, pp. 1-9, Elsevier S.A., Lausanne, Switzerland [C1]
ERA journal ID: 1470 – Scopus EID: 2-s2.0-83655190963
Citation counts: Scopus - 20, Thomson - 15
DRO entry for this publication

Khayyam, Hamid, Abawajy, Jemal and Jazar, Reza N.* (2012) Intelligent energy management control of vehicle air conditioning system coupled with engine, Applied thermal engineering, vol. 48, pp. 211-224, Pergamon, Oxford, England [C1]
ERA journal ID: 3658 – Scopus EID: 2-s2.0-84862726178
Citation counts: Scopus - 2
DRO entry for this publication

Kumar, Amit, Wong, Adam K.L., Tizard, Mark L.*, Moore, Robert J.* and Lefevre, Christophe (2012) miRNA_targets : a database for miRNA target predictions in coding and non-coding regions of mRNAs, Genomics, vol. 100, no. 6, pp. 352-356, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 2388 – Scopus EID: 2-s2.0-84869876664
Citation counts: Scopus - 6, Thomson - 5
DRO entry for this publication

Li, Peng*, Guo, Song*, Xiang, Yong and Jin, Hai* (2012) Unicast and broadcast throughput maximization in amplify-and-forward relay networks, IEEE transactions on vehicular technology, vol. 61, no. 6, pp. 2768-2776, IEEE, Piscataway, N. J. [C1]
ERA journal ID: 5074 – Scopus EID: 2-s2.0-84863964106
Citation counts: Scopus - 4, Thomson - 2
DRO entry for this publication

Liu, Xinwang* and Yu, Shui (2012) On the stress function-based OWA determination method with optimization criteria, IEEE transactions on systems, man, and cybernetics part b : cybernetics, vol. 42, no. 1, pp. 246-257, IEEE, Piscataway, N. J. [C1]
ERA journal ID: 4465 – Scopus EID: 2-s2.0-79961105003
Citation counts: Thomson - 5
DRO entry for this publication

Liu, Xinwang*, Pan, Yuwen*, Xu, Yejun* and Yu, Shui (2012) Least square completion and inconsistency repair methods for additively consistent fuzzy preference relations, Fuzzy sets and systems, vol. 198, pp. 1-19, Elsevier BV, Amsterdam, Netherlands [C1]
ERA journal ID: 159 – Scopus EID: 2-s2.0-83055162323
DRO entry for this publication

Liu, Yu-Hsn*, Ong, Kok-Leong, Lee, Vincent C. S.* and Chen, Yi-Ping Phoebe* (2012) Processing multiple image streams for real-time monitoring of parking lots, International journal on computer, consumer and control, vol. 1, no. 1, pp. 23-32, National Chin-Yi University of Technology, Taichung, Taiwan [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Liu, Yu-Hsn*, Ong, Kok-Leong and Goscinski, Andrzej (2012) Novel applications and research problems for sensor-clouds, Journal of e-technology, vol. 3, no. 2, pp. 57-68, Digital Information Research Foundation, Mumbai, India [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Marano, V.*, Rizzoni, G.*, Tulpule, P.*, Gong, Q.* and Khayyam, H. (2012) Intelligent energy management for plug-in hybrid electric vehicles : the role of ITS infrastructure in vehicle electrification, Oil and gas science and technology, vol. 67, no. 4, pp. 575-587, Editions Technip, Paris, France [C1]
ERA journal ID: 4069 – Scopus EID: Not tagged
Citation counts: Thomson - 1
DRO entry for this publication

Mason, L.R., Mak-Hau, Vicky H. and Ernst, A.T.* (2012) An exact method for minimizing the total treatment time in intensity-modulated radiotherapy, Journal of the operational research society, vol. 63, no. 10, pp. 1447-1456, Palgrave MacMillan, London, England [C1]
ERA journal ID: 32902 – Scopus EID: 2-s2.0-84865778106
DRO entry for this publication

Moloney, D.*, Sukhorukova, N.*, Vamplew, P.*, Ugon, J.*, Li, G., Beliakov, G., Philippe, C.*, Amiel, H.* and Ugon, A.* (2012) Detecting K-complexes for sleep stage identification using nonsmooth optimisation, ANZIAM Journal, vol. 52, no. 4, pp. 319-332, Cambridge University Press, Cambridge, England [C1]
ERA journal ID: 43 – Scopus EID: 2-s2.0-84859317592
DRO entry for this publication

Moonsamy, Veelasha, Alazab, Moutaz and Batten, Lynn (2012) Towards an understanding of the impact of advertising on data leaks, International journal of security and networks, vol. 7, no. 3, pp. 181-193, Inderscience Publishers, London, England [C1]
ERA journal ID: 32101 – Scopus EID: Not tagged
DRO entry for this publication

Musau, Felix*, Wang, Guojun*, Yu, Shui and Abdullahi, Muhammad Bahir* (2012) Securing recommendations in grouped P2P e-commerce trust model, IEEE transactions on network and service management, vol. 9, no. 4, pp. 407-420, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 5073 – Scopus EID: Not tagged
DRO entry for this publication

Natgunanathan, Iynkaran, Xiang, Yong, Rong, Yue*, Zhou, Wanlei and Guo, Song* (2012) Robust patchwork-based embedding and decoding scheme for digital audio watermarking, IEEE transactions on audio, speech and language processing, vol. 20, no. 8, pp. 2232-2239, Institute of Electrical and Electronics Engineers, Piscataway, N. J. [C1]
ERA journal ID: 34661 – Scopus EID: 2-s2.0-84865244384
Citation counts: Scopus - 9, Thomson - 7
DRO entry for this publication

Patterson, Nicholas C. and Hobbs, Michael (2012) Virtual world security inspection, Journal of networks, vol. 7, no. 6, pp. 895-907, Academy Publisher, Oulu, Finland [C1]
ERA journal ID: 40962 – Scopus EID: Not tagged
DRO entry for this publication

Peng, Dezhong*, Yi, Zhang*, Xiang, Yong and Zhang, Haixian* (2012) A globally convergent MC algorithm with an adaptive learning rate, IEEE transactions on neural networks and learning systems, vol. 23, no. 2, pp. 359-365, IEEE, Piscataway, N. J. [C1]
ERA journal ID: Not matching ERA journal list
Citation counts: Thomson - 2
DRO entry for this publication

Pradera, Ana*, Beliakov, Gleb and Bustince, Humberto* (2012) Aggregation functions and contradictory information, Fuzzy sets and systems, vol. 191, pp. 41-61, Elsevier BV, Amsterdam, Netherlands [C1]
ERA journal ID: 159 – Scopus EID: 2-s2.0-84855543361
Citation counts: Scopus - 2
DRO entry for this publication

Rong, Jia, Vu, Huy Quan, Law, Rob* and Li, Gang (2012) A behavioral analysis of web sharers and browsers in Hong Kong using targeted association rule mining, Tourism management, vol. 33, no. 4, pp. 731-740, Pergamon, Oxford, U. K. [C1]
ERA journal ID: 19693 – Scopus EID: Not tagged
Citation counts: Thomson - 8
DRO entry for this publication

Rong, Yue*, Khandaker, Muhammad R. A.* and Xiang, Yong (2012) Channel estimation of dual-hop MIMO relay system via parallel factor analysis, IEEE transactions on wireless communications, vol. 11, no. 6, pp. 2224-2233, IEEE, Piscataway, N. J. [C1]
ERA journal ID: 4466 – Scopus EID: 2-s2.0-84862844121
Citation counts: Scopus - 10, Thomson - 7
DRO entry for this publication

Sajjanhar, Atul (2012) Virtual worlds for student engagement, Creative education, vol. 3, pp. 796-801, Scientific Research Publishing, Irvine, Calif. [C1]
ERA journal ID: 123561 – Scopus EID: Not tagged
DRO entry for this publication

Sun, Da-Wei*, Chang, Gui-Ran*, Gao, Shang, Jin, Li-Zhong* and Wang, Xing-Wei* (2012) Modeling a dynamic data replication strategy to increase system availability in cloud computing environments, Journal of computer science and technology, vol. 27, no. 2, pp. 256-272, Springer, Boston, Mass. [C1]
ERA journal ID: 17984 – Scopus EID: 2-s2.0-84861644982
Citation counts: Scopus - 12, Thomson - 5
DRO entry for this publication

Tang, Feilong*, You, Ilsun*, Yu, Shui, Wang, Cho-Li*, Guo, Minyi* and Liu, Wenlong* (2012) An efficient deadlock prevention approach for service oriented transaction processing, Computers and mathematics with applications, vol. 63, pp. 458-468, Pergamon, Oxford, England [C1]
ERA journal ID: 111 – Scopus EID: Not tagged
DRO entry for this publication

Tang, Feilong*, You, Ilsun*, Yu, Shui, Li, Huakang* and Wang, Cho-Li* (2012) Grid transaction management and an efficient development kit, International journal of computer systems science and engineering, vol. 27, no. 5, pp. 345-353, CRL Publishing, Kibworth Beauchamp, England [C1]
ERA journal ID: 17806 – Scopus EID: Not tagged
DRO entry for this publication

Tang, Feilong*, You, Ilsun*, Tang, Can* and Yu, Sui (2012) A profiling based task scheduling approach for multicore network processors, Concurrency computation : practice and experience, pp. 1-15, John Wiley & Sons, London, England [C1]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-84860605230
DRO entry for this publication

Tang, Feilong*, Tang, Can*, Guo, Minyi*, Guo, Song* and Yu, Shui (2012) Service-oriented wireless sensor networks and an energy-aware mesh routing algorithm, Ad hoc & sensor wireless networks, vol. 15, no. 1, pp. 21-46, Old City Publishing, Philadelphia, PA [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Van den Bergh, Norbert*, Carminati, John, Karimian, Hamid Reza* and Huf, Peter (2012) Shear-free perfect fluids with a solenoidal electric curvature, Classical and quantum gravity, vol. 29, no. 10, pp. 1-9, Institute of Physics Publishing, Bristol, England [C1]
ERA journal ID: 959 – Scopus EID: 2-s2.0-84860654692
Citation counts: Scopus - 2, Thomson - 2
DRO entry for this publication

Vijayakumar, V.*, Wahida, Banu R. S. D.* and Abawajy, J. H. (2012) An efficient approach based on trust and reputation for secured selection of grid resources, International journal of parallel, emergent and distributed systems, vol. 27, no. 1, pp. 1-17, Taylor & Francis, Essex, England [C1]
ERA journal ID: 18101 – Scopus EID: 2-s2.0-84855970742
Citation counts: Scopus - 3
DRO entry for this publication

Vu, Huy Quan, Liu, Shaowu, Yang, Xinghua*, Li, Zhi and Ren, Yongli (2012) Identifying microphone from noisy recordings by using representative instance one class-classification approach, Journal of networks, vol. 7, no. 6, pp. 908-917, Academy Publisher, Oulu, Finland [C1]
ERA journal ID: 40962 – Scopus EID: Not tagged
DRO entry for this publication

Vu, Huy Quan, Li, Gang, Sukhorukova, Nadezda S.*, Beliakov, Gleb, Liu, Shaowu, Philippe, Carole*, Amiel, Helene* and Ugon, Adrien* (2012) K-Complex Detection Using a Hybrid-Synergic Machine Learning Method, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 42, no. 6, pp. 1478-1490, Institute of Electrical and Electronics Engineers, Piscataway, NJ [C1]
ERA journal ID: 17886 – Scopus EID: 2-s2.0-84860547202
DRO entry for this publication

Vu, K.T.*, Jefferson, G. F. and Carminati, J. (2012) Finding higher symmetries of differential equations using the MAPLE package DESOLVII, Computer physics communications, vol. 183, no. 4, pp. 1044-1054, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 962 – Scopus EID: 2-s2.0-84856214897
Citation counts: Scopus - 9, Thomson - 9
DRO entry for this publication

Wang, Jinlong*, Wu, Shunyao*, Wen, Can* and Li, Gang (2012) An effective semi-supervised clustering framework integrating pairwise constraints and attribute preferences, Computing and informatics, vol. 31, no. 3, pp. 597-612, Slovak Academic Press, Slovakia [C1]
ERA journal ID: Not matching ERA journal list
Citation counts: Thomson - 1
DRO entry for this publication

Wang, Qing*, Zhang, Zili, Zhang, Yajuan* and Deng, Yong* (2012) Fuzzy shortest path problem based on biological method, Journal of information and computational science, vol. 9, no. 5, pp. 1365-1371, Binary Information Press, Bethel, United States [C1]
ERA journal ID: Not matching ERA journal list
Citation counts: Scopus - 1
DRO entry for this publication

Wang, Yu, Xiang, Yang, Zhou, Wanlei and Yu, Shunzheng* (2012) Generating regular expression signatures for network traffic classification in trusted network management, Journal of network and computer applications, vol. 35, no. 3, pp. 992-1000, Academic Press, London, U. K. [C1]
ERA journal ID: 18032 – Scopus EID: Not tagged
Citation counts: Thomson - 5
DRO entry for this publication

Wells, Jason, Barry, Robert Mathie and Spence, Aaron (2012) Using video tutorials as a carrot-and-stick approach to learning, IEEE transactions on education, vol. 55, no. 4, pp. 453-458, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 20625 – Scopus EID: 2-s2.0-84857542921
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Wen, Sheng*, Zhou, Wei*, Wang, Yini, Zhou, Wanlei and Xiang, Yang (2012) Locating defense positions for thwarting the propagation of topological worms, IEEE Communications Letters, vol. 16, no. 4, pp. 560-563, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 5068 – Scopus EID: 2-s2.0-84859962242
Citation counts: Thomson - 4
DRO entry for this publication

Wen, Sheng, Zhou, Wei, Xiang, Yang and Zhou, Wanlei (2012) CAFS : a novel lightweight cache-based scheme for large-scale intrusion alert fusion, Concurrency computation : practice and experience, vol. 24, no. 10, pp. 1137-1153, John Wiley & Sons, West Sussex, U. K. [C1]
ERA journal ID: 17819 – Scopus EID: Not tagged
Citation counts: Thomson - 1
DRO entry for this publication

Xiang, Yong, Natgunanathan, Iynkaran, Peng, Dezhong*, Zhou, Wanlei and Yu, Shui (2012) A dual-channel time-spread echo method for audio watermarking, IEEE transactions on information forensics and security, vol. 7, no. 2, pp. 383-392, IEEE Signal Processing Society, Piscataway, N.J. [C1]
ERA journal ID: 32044 – Scopus EID: 2-s2.0-84858427685
Citation counts: Scopus - 14, Thomson - 8
DRO entry for this publication

Xie, Shengli*, Yang, Liu*, Yang, Jun-Mei*, Zhou, Guoxu* and Xiang, Yong (2012) Time-frequency approach to underdetermined blind source separation, IEEE transactions on neural networks and learning systems, vol. 23, no. 2, pp. 306-316, IEEE, Piscataway, N. J. [C1]
ERA journal ID: Not matching ERA journal list
Citation counts: Thomson - 11
DRO entry for this publication

Yang, Zuyuan*, Xiang, Yong, Xie, Shengli*, Ding, Shuxue* and Rong, Yue* (2012) Nonnegative blind source separation by sparse component analysis based on determinant measure, IEEE transactions on neural networks and learning systems, vol. 23, no. 10, pp. 1601-1610, IEEE, Piscataway, N. J. [C1]
ERA journal ID: Not matching ERA journal list
Citation counts: Thomson - 9
DRO entry for this publication

Yu, Shui, Zhou, Wanlei, Jia, Weijia* and Hu, Jiankun* (2012) Attacking anonymous web browsing at local area networks through browsing dynamics, Computer journal, vol. 55, no. 4, pp. 410-421, Oxford University Press, Oxford, England [C1]
ERA journal ID: 17794 – Scopus EID: 2-s2.0-84859350725
Citation counts: Scopus - 3, Thomson - 4
DRO entry for this publication

Yu, Shui, Zhao, Guofeng*, Dou, Wanchun* and James, Simon (2012) Predicted packet padding for anonymous web browsing against traffic analysis attacks, IEEE transactions on information forensics and security, vol. 7, no. 4, pp. 1381-1393, IEEE, Piscataway, N. J. [C1]
ERA journal ID: 32044 – Scopus EID: 2-s2.0-84863959740
Citation counts: Scopus - 3, Thomson - 2
DRO entry for this publication

Yu, Shui, Zhou, Wanlei, Jia, Weijia*, Guo, Song*, Xiang, Yong and Tang, Feilong* (2012) Discriminating DDoS attacks from flash crowds using flow correlation coefficient, IEEE transactions on parallel and distributed systems, vol. 23, no. 6, pp. 1073-1080, IEEE, Piscataway, N. J. [C1]
ERA journal ID: 20981 – Scopus EID: 2-s2.0-84860543902
Citation counts: Scopus - 12, Thomson - 5
DRO entry for this publication

Yu, Yanli*, Li, Kequi*, Zhou, Wanlei and Li, Ping (2012) Trust mechanisms in wireless sensor networks : attack analysis and countermeasures, Journal of network and computer applications, vol. 35, no. 3, pp. 867-880, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 18032 – Scopus EID: Not tagged
Citation counts: Thomson - 15
DRO entry for this publication

Zhang, Yajuan*, Li, Ya*, Zhang, Zili, Deng, Yong* and Zhao, Shang* (2012) An improved physarum centrality measure for weighted networks, ICIC express letters, Part B : applications, vol. 3, no. 4, pp. 955-960, ICIC International, China [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Zhu, Wei*, Hou, Jingyu and Chen, Yi-Ping Phoebe* (2012) Exploiting multi-layered information to iteratively predict protein functions, Mathematical biosciences, vol. 236, no. 2, pp. 108-116, Elsevier, Philadelphia, Pa. [C1]
ERA journal ID: 931 – Scopus EID: 2-s2.0-84859156469
Citation counts: Thomson - 2
DRO entry for this publication

Yang, Zuyuan, Xiang, Yong, Xie, Shengli*, Ding, Shuxue* and Rong, Yue* (2012) Nonnegative Blind Source Separation by Sparse Component Analysis Based on Determinant Measure, IEEE Transactions on Neural Networks and Learning Systems, vol. 23, no. 10, pp. 1601-1610, IEEE Computational Intelligence Society, Piscataway, N. J. [C1.1]
ERA journal ID: Not matching ERA journal list
Citation counts: Scopus - 9
DRO entry for this publication

Abawajy, Jemal H. and Bhargava, Bharat* (2012) Foreword and editorial, International journal of security and its applications, vol. 6, no. 4, pp. vii-xii, Science and Engineering Research Support Society [C4]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Goscinski, Andrzej, Chou, Wu* and Liu, Ling* (2012) Editorial : Cloud computing (special Issue), Transactions on services computing, vol. 5, no. 4, pp. 469-471, IEEE Computer Society, Los Alamitos, Calif. [C4]
ERA journal ID: 36548 – Scopus EID: Not tagged
DRO entry for this publication

Hu, Jinakun*, Xiang, Yang and Zhou, Wanlei (2012) Advances in network and system security : editorial statement, Computer journal, vol. 55, no. 4, pp. 382-383, Oxford University Press, Oxford, England [C4]
ERA journal ID: 17794 – Scopus EID: 2-s2.0-84859322508
DRO entry for this publication

Niu, Wenjia* and Li, Gang (2012) Guest editorial : In Journal of networks, v7 n.6, Journal of networks, vol. 7, no. 6, pp. 893-894, Academy Publisher, Oulu, Finland [C4]
ERA journal ID: 40962 – Scopus EID: Not tagged
DRO entry for this publication

Qu, Wenyu*, Xiang, Yang and Zhang, Yong* (2012) Editorial in the Special issue on security in ubiquitous computing, Security and communication networks, vol. 5, no. 11, pp. 1221-1222, Wiley, London, England [C4]
ERA journal ID: 39741 – Scopus EID: Not tagged
DRO entry for this publication

Xiang, Yang, Hu, Jiankun* and Zhou, Wanlei (2012) Advances in network and system security, Concurrency computation : practice and experience, vol. 24, no. 10, pp. 1035-1036, John Wiley & Sons, London, England [C4]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-84862812406
DRO entry for this publication

Zabir, Salahuddin Muhammad Salim*, Abawajy, Jemal H., Ahmed, Farid*, Kamruzaman, Joarder*, Karim, Mohammad Ataul* and Sarkar, Nurul I.* (2012) Guest editorial : from Selected Papers of the 14th International Conference on Computer and Information Technology (ICCIT 2011), in Zabir, Salahuddin Muhammad Salim (eds), Journal of networks, vol. 7, no. 12, pp. 1909-1911, Academy Publisher, Oulu, Finland [C4]
ERA journal ID: 40962 – Scopus EID: Not tagged
DRO entry for this publication

Zabir, Salim*, Abawajy, J. H., Ahmed, Farid*, Kamruzaman, Joarder*, Karim, Mohammad A.* and Sarkar, Nurul I.* (2012) Guest editorial : In Journal of networks, v.7 n.3, Journal of networks, vol. 7, no. 3, pp. 409-411, Academy Publisher, Oulu, Finland [C4]
ERA journal ID: 40962 – Scopus EID: Not tagged
DRO entry for this publication

Abawajy, J., Kelarev, A.V., Stranieri, A.* and Jelinek, H.F.* (2012) Empirical investigation of multi-tier ensembles for the detection of cardiac autonomic neuropathy using subsets of the Ewing Features, in Al-Jumaily, Adel; Bennamoun, Mohammed and Al-Ani, Ahmed (eds), CIHealth 2012- Proceedings of the Workshop on New Trends of Computational Intelligence in Health Applciations, pp. 1-11, CEURS-WS, Sydney, N.S.W. [E1]
DRO entry for this publication

Abawajy, Jemal, Beliakov, Gleb, Kelarev, Andrei and Yearwood, John* (2012) Performance evaluation of multi-tier ensemble classifiers for phishing websites, in Warren, Matthew (eds), ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, pp. 11-16, School of Information Systems, Deakin University, Melbourne, Vic. [E1]
DRO entry for this publication

Alazab, Ammar, Hobbs, Michael, Abawajy, Jemal and Alazab, Moutaz (2012) Using feature selection for intrusion detection system, in unknown (ed.), ISCIT 2012 : Proceedings of the 12th IEEE International Symposium on Communications and Information Technologies, pp. 296-301, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Alazab, Moutaz, Moonsamy, Veelasha, Batten, Lynn, Tian, Ronghua and Lantz, Patrik* (2012) Analysis of malicious and benign Android applications, in Unknown (ed.), ICDCSW 2012 : Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops, pp. 608-616, IEEE, Los Alamitos, Calif. [E1]
Citation counts: Scopus - 3
DRO entry for this publication

Aziz, Izzatdin A.*, Goscinski, Andrzej M. and Hobbs, Michael (2012) In support of hydrocarbon exploration and discovery using clouds, in unknown (ed.), ICCIS 2012 : Proceedings of the 2012 International Conference on Computer and Information Science, pp. 592-597, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Beliakov, Gleb and James, Simon (2012) Defining Bonferroni means over lattices, in Unknown (ed.), FUZZ-IEEE 2012 : Proceedings of the IEEE 2012 International Conference on Fuzzy Systems, pp. 67-74, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Bellucci, Emilia, Venkatraman, Sitalakshmi*, Muecke, Nial*, Stranieri, Andrew* and Abawajy, Jemal (2012) The role of emotional intelligence on the resolution of disputes involving the electronic health record, in Butler-Henderson, Kerryn and Gray, Kathleen (eds), HIKM 2012 : Proceedings of the Fifth Australasian Workshop on Health Informatics and Knowledge Management, pp. 3-12, Australian Computer Society, Melbourne, Vic. [E1]
DRO entry for this publication

Bonti, Alessio, Li, Ming, Gao, Lonxiang and Shi, Wen* (2012) Effects of social characters in viral propagation seeding strategies in online social networks, in Min, Geyong; Wu, Yulei; Lei, Liu (Chris); Jin, Xiaolong; Jarvis, Stephen and Al-Dubai, Ahmed Y. (eds), TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 632-639, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Brock, Michael and Goscinski, Andrzej (2012) Execution of compute intensive applications on hybrid clouds (case study with mpiBLAST), in Unknown (ed.), CISIS 2012 : Proceedings of The 6th International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 995-1000, IEEE Computer Society, Los Alamitos, Calif. [E1]
Citation counts: Scopus - 2
DRO entry for this publication

Bustince, H.*, Fernandez, J.*, Sanz, J. A.*, Paternain, D.*, Baczyski, M.*, Beliakov, G. and Mesiar, R.* (2012) Construction of strong equality index from implication operators, in Unknown (ed.), FLINS 2012 : Proceedings of the 10th International Conference on Uncertainty Modeling in Knowledge Engineering and Decision Making, pp. 769-774, World Scientific Publishing Company, Singapore, Singapore [E1]
DRO entry for this publication

Cesare, Silvio and Xiang, Yang (2012) Wire - a formal intermediate language for binary analysis, in Min, Geyong; Wu, Yulei; Lei, Liu (Chris); Jin, Xiaolong; Jarvis, Stephen and Al-Dubai, Ahmed Y. (eds), TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 515-524, IEEE, Piscataway, N. J. [E1]
Citation counts: Scopus - 1
DRO entry for this publication

Chiong, Choo W.R.*, Rong, Yue* and Xiang, Yong (2012) Robust channel estimation algorithm for dual-hop MIMO relay channels, in Unknown (ed.), PIMRC 2012 : IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 2347-2352, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Chiong, Choo W.R.*, Rong, Yue* and Xiang, Yong (2012) Superimposed channel training for two-way MIMO relay systems, in Unknown (ed.), ICCS 2012 : Proceedings of the 13th IEEE International Conference on Communication Systems, pp. 21-25, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Chong, Soon Keow and Abawajy, Jemal (2012) E-commerce trust management system reliability, in Shen, Chien-Wen; Kuo, Sy-Yen; Kwack, Kae Dal; Chen, Yen-Wei; Hsu, Ping-Yu and Ko, Franz (eds), ISSDM 2012 : Proceedings of the 6th International Conference on New Trends in Information Science, Service Science and Data Mining, pp. 13-18, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Chonka, Ashley and Abawajy, Jemal (2012) Detecting and mitigating HX-DoS attacks against cloud web services, in Barolli, Leonard; Tamiar, David; Enokido, Tomoya; Rahayu, Wenny and Takizawa, Makoto (eds), NBIS 2012 : Proceedings of the 2012 International Conference on Network-Based Information Systems, pp. 429-434, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Church, Philip, Wong, Adam, Brock, Michael and Goscinski, Andrzej (2012) Toward exposing and accessing HPC applications in a SaaS cloud, in unknown (ed.), ICWS 2012 : Proceedings of the 2012 IEEE 19th International Conference on Web Services, pp. 692-699, IEEE, Piscataway, N. J. [E1]
Citation counts: Scopus - 4
DRO entry for this publication

Coldwell-Neilson, Jo and Craig, Annemieke (2012) Preparing for WIL : online career development for IT students, in Campbell, Matthew (eds), ACEN 2012 : Collaborative education, investing in the future : Proceedings of the 2012 Australian Collaborative Education Network national conference, pp. 37-41, Australian Collaborative Education Network (ACEN), Melbourne, Vic. [E1]
DRO entry for this publication

Craig, Annemieke, Coldwell-Neilson, Jo, Goold, Annegret and Beekhuyzen, Jenine* (2012) A review of e-learning technologies – opportunities for teaching and learning, in Unknown (ed.), CSEDU 2012 – 4th International Conference on Computer Supported Education, pp. 29-41, INSTICC, Porto, Portugal [E1]
DRO entry for this publication

Dai, Honghua, Keble-Johnston, Sarah and Gan, Min (2012) Reliable knowledge discovery with a minimal causal model inducer, in Vreeken, Jilles; Ling, Charles; Zaki, Mohammed J.; Siebes, Arno; Xu, Yu Jeffrey; Goethals, Bart; Webb, Geoff and Wu, Xindong (eds), ICDMW 2012 : Proceedings of the 12th IEEE International Conference on Data Mining Workshops, pp. 629-634, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Doss, Robin and Zhou, Wanlei (2012) A secure tag ownership transfer scheme in a closed loop RFID system, in Unknown (ed.), WCNCW 2012 : Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, pp. 164-169, IEEE Computer Society, Los Alamitos, Calif. [E1]
Citation counts: Scopus - 2
DRO entry for this publication

Gao, Longxiang, Li, Ming, Zhu, Tianqing, Bonti, Alessio, Zhou, Wanlei and Yu, Shui (2012) AMDD : Exploring entropy based anonymous multi-dimensional data detection for network optimization in human associated DTNs, in Min, Geyong; Wu, Yulei; Lei, Liu (Chris); Jin, Xiaolong; Jarvis, Stephen and Al-Dubai, Ahmed Y. (eds), TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1245-1250, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Javadi, Bahman*, Abawajy, Jemal and Sinnott, Richard O.* (2012) Hybrid cloud resource provisioning policy in the presence of resource failures, in Unknown (ed.), CloudCom 2012 : Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science, pp. 10-17, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Kelarev, A.V., Stranieri, A.*, Yearwood, J.L.*, Abawajy, J. and Jelinek, H.F.* (2012) Improving classifications for cardiac autonomic neuropathy using multi-level ensemble classifiers and feature selection based on random forest, in Zhao, Yanchang; Li, Jiuyong; Kennedy, Paul J. and Christen, Peter (eds), AusDM 2012 : Proceedings of the 10th Australasian Data Mining Conference, pp. 93-101, Australian Computer Society, Sydney, N.S.W. [E1]
DRO entry for this publication

Li, Peng*, Guo, Song*, Yu, Shui and Vasilakos, Athanasios V.* (2012) CodePipe : an opportunistic feeding and routing protocol for reliable multicast with pipelined network coding, in Unknown (ed.), INFOCOM 2012 : Proceedings of the 31st IEEE INFOCOM conference, pp. 100-108, IEEE Computer Society, Los Alamitos, Calif. [E1]
Citation counts: Scopus - 7
DRO entry for this publication

Moonsamy, Veelasha and Batten, Lynn (2012) Zero permission android applications - attacks and defenses, in Warren, Matthew (eds), ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, pp. 5-9, School of Information Systems, Deakin University, Melbourne, Vic. [E1]
DRO entry for this publication

Natgunanathan, Iynkaran, Xiang, Yong and Zong, Tianrui (2012) Patchwork-based stereo audio watermarking against de-synchronization attack, in Unknown (ed.), CISP 2012 : Proceedings of the 5th International Congress on Image and Signal Processing, pp. 1601-1605, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Nguyen, Anh and Pan, Lei (2012) Detecting SMS-based control commands in a Botnet from infected android devices, in Warren, Matthew (eds), ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, pp. 23-27, School of Information Systems, Deakin University, Melbourne, Vic. [E1]
DRO entry for this publication

Pan, L., Khan, N. and Batten, Lynn M. (2012) Using hypothesis generation in event profiling for digital forensic investigations, in Unknown (ed.), WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, pp. 76-86, University of Plymouth, Plymouth [E1]
DRO entry for this publication

Pan, Lei, Hutchinson, Damien and Khan, Nisar (2012) Towards a sustainable assessment strategy for digital forensic education and training, in Lee, Mark J.W. and Leong, Hong Va (eds), TALE 2012 : Proceedings of the IEEE International Conference on Teaching, Assessment and Learning for Engineering, pp. H1A-13-H1A-18, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Panahi, Nayyer*, Rohi, Hojat Olah*, Payandeh, Ali* and Haghighi, Mohammad Sayad (2012) Adaptation of LEACH routing protocol to cognitive radio sensor networks, in Unknown (ed.), IST 2012 : Proceedings of the 6th International Symposium on Telecommunications, pp. 541-547, IEEE, Piscataway, N.J. [E1]
Citation counts: Scopus - 2
DRO entry for this publication

Paternain, Daniel*, Jurio, Aranzazu* and Beliakov, Gleb (2012) Color image reduction by minimizing penalty functions, in Unknown (ed.), WCCI 2012 : Proceedings of the IEEE World Congress on Computational Intelligence, pp. 205-211, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Patterson, Nicholas, Hobbs, Michael and Abawajy, Jemal (2012) Virtual property theft detection framework, in Min, Geyong; Wu, Yulei; Lei, Liu (Chris); Jin, Xiaolong; Jarvis, Stephen and Al-Dubai, Ahmed Y. (eds), TRUSTCOM 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 177-184, IEEE Computer Society, Piscataway, N. J. [E1]
DRO entry for this publication

Ray, Biplob R., Chowdhury, Morshed and Abawajy, Jemal (2012) Secure mobile RFID ownership transfer protocol to cover all transfer scenarios, in Kwack, Kae Dal; Kawata, Shigeo; Hwang, Soonwook; Han, Dongsoo and Ko, Franz (eds), ICCCT 2012 : Proceeding of the 7th International Conference on Computing and Convergence Technology, pp. 1185-1192, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Ren, Yongli, Li, Gang, Zhang, Jun and Zhou, Wanlei (2012) The efficient imputation method for neighborhood-based collaborative filtering, in Unknown (ed.), CIKM 2012 : Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 684-693, ACM, New York, N.Y. [E1]
DRO entry for this publication

Ren, Yongli, Li, Gang and Zhou, Wanlei (2012) Learning rating patterns for Top-N recommendations, in Unknown (ed.), ASONAM 2012 : Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 472-479, IEEE Computer Society, Piscataway, N.J. [E1]
Citation counts: Thomson - 1
DRO entry for this publication

Sajjanhar, Atul (2012) Composite spectral shape descriptor, in Unknown (ed.), CISP 2012 : Proceedings of the 5th International Congress on Image and Signal Processing, pp. 776-780, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Sajjanhar, Atul and Zhao, Ying* (2012) Web service to deliver filtered RSS items to a mobile application, in Unknown (ed.), ChinaGrid 2012 : Proceedings of the 7th ChinaGrid Annual Conference 2012, pp. 128-133, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Singh, Kalpana, Zhong, Jian*, Batten, Lynn M. and Bertok, Peter* (2012) An efficient solution for privacy-preserving, secure remote access to sensitive data, in Meghanathan, Natarajan and Nagamalai, Dhinaharan (eds), ACSIT 2012 : Proceedings of the 2012 International Conference of Advanced Computer Science and Information Technology, pp. 173-191, The Conference, Chennai, India [E1]
DRO entry for this publication

Sundaresan, Saravanan, Doss, Robin and Zhou, Wanlei (2012) A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags, in Unknown (ed.), PIMRC 2012 : IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 30-35, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Sundaresan, Saravanan, Doss, Robin and Zhou, Wanlei (2012) A serverless ultra-lightweight secure search protocol for EPC Class-1 Gen-2 UHF RFID tags, in Unknown (ed.), ICCIS 2012 : Proceedings of the 2012 International Conference on Computer and Information Science, pp. 580-585, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Tajadod, Golnoosh, Batten, Lynn and Govinda, K.* (2012) Microsoft and Amazon : a comparison of approaches to cloud security, in Unknown (ed.), CloudCom 2012 : Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science, pp. 539-544, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Thapngam, Theerasak, Yu, Shui and Zhou, Wanlei (2012) DDoS discrimination by linear discriminant analysis (LDA), in Unknown (ed.), ICNC 2012 : Proceedings of the 2012 International Conference on Computing, Networking and Communications, pp. 532-536, IEEE Computer Society, Los Alamitos, Calif. [E1]
Citation counts: Scopus - 3
DRO entry for this publication

Vu, Huy Quan, Li, Gang and Beliakov, Gleb (2012) A fuzzy decision support method for customer preferences analysis based on Choquet integral, in unknown (ed.), FUZZ-IEEE 2012 : Proceedings of the IEEE 2012 International Conference on Fuzzy Systems, pp. 75-82, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Wang, Yu, Xiang, Yang, Zhang, Jun and Yu, Shunzheng* (2012) Internet traffic clustering with constraints, in Unknown (ed.), IWCMC 2012 : Proceedings of the IEEE 8th Wireless Communications and Mobile Computing Conference, pp. 619-624, IEEE, Piscataway, N. J. [E1]
DRO entry for this publication

Wong, Adam K. L. and Goscinski, Andrzej M. (2012) A VMD plugin for NAMD simulations on Amazon EC2, in Ali, Hesham; Shi, Yong; Khazanchi, Deepak; Lees, Michael; van Albada, G. Dick; Dongarra, Jack and Sloot, Peter M.A. (eds), ICCS 2012 : Empowering science through computing : Procedia Computer Science : Proceedings of the 12th Annual International conference on Computational Science, pp. 136-145, Elsevier, Amsterdam, The Netherlands [E1]
DRO entry for this publication

Yu, Shui, Zhou, Wanlei, Dou, Wanchun* and Makki, S.Kami* (2012) Why it is hard to fight against cyber criminals?, in Unknown (ed.), Proceedings of the 32nd IEEE International Conference on Distributed Computing Systems Workshops : ICDCSW 2012, pp. 537-541, IEEE Computer Society, Piscataway, N. J [E1]
Citation counts: Scopus - 1
DRO entry for this publication

Yu, Shui, Guo, Song* and Stojmenovic, Ivan* (2012) Can we beat legitimate cyber behavior mimicking attacks from botnets?, in Unknown (ed.), INFOCOM 2012 : Proceedings of the IEEE Computer Communications 2012 Conference, pp. 2851-2855, IEEE Computer Society, Piscataway, N. J. [E1]
Citation counts: Scopus - 2
DRO entry for this publication

Zhang, Jing, Ong, Kok-Leong and Lee, Vincent C. S.* (2012) Why web-based pseudo relevance feedback systems fail, in unknown (ed.), KICSS 2012 : Proceedings : Seventh International Conference on Knowledge, Information and Creativity Support Systems, pp. 216-222, IEEE Computer Society, Piscataway, N. J. [E1]
DRO entry for this publication

Zhang, Jing, Liu, Derek, Ong, Kok-Leong, Li, Zhijie and Li, Ming (2012) Detecting topic labels for tweets by matching features from pseudo-relevance feedback, in Zhao, Yanchang; Li, Jiuyong; Kennedy, Paul J. and Christen, Peter (eds), AusDM 2012 : Proceedings of the Tenth Austalasian Data Mining Conference, pp. 9-20, Australian Computer Society Inc., Sydney, N.S.W. [E1]
DRO entry for this publication

Zhang, Jun, Chen, Chao, Xiang, Yang and Zhou, Wanlei (2012) Classification of correlated internet traffic flows, in Min, Geyong; Wu, Yulei; Lei, Liu (Chris); Jin, Xiaolong; Jarvis, Stephen and Al-Dubai, Ahmed Y. (eds), TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 490-496, IEEE, Piscataway, N. J. [E1]
Citation counts: Scopus - 1
DRO entry for this publication

Zhang, Jun, Chen, Chao, Xiang, Yang and Zhou, Wanlei (2012) Semi-supervised and compound classification of network traffic, in Unknown (ed.), ICDCSW 2012 : Proceedings of the 32nd IEEE International Conference on Distributed Computing Systems Workshops, pp. 617-621, IEEE Computer Society, Piscataway, N. J. [E1]
Citation counts: Scopus - 1
DRO entry for this publication

Zhang, Yajuan*, Zhang, Zili, Zhang, Xiaoge*, Wei, Daijun* and Deng, Yong* (2012) An amoeboid algorithm for shortest path in fuzzy weighted networks, in Unknown (ed.), CCDC 2012 : Proceedings of the 24th Chinese Control and Decision Conference, pp. 3709-3713, IEEE Industrial Electronics, Singapore, Singapore [E1]
Citation counts: Scopus - 1
DRO entry for this publication

Zhou, Wei, Wen, Sheng, Wang, Yini, Xiang, Yang and Zhou, Wanlei (2012) An analytical model on the propagation of modern email worms, in Min, Geyong; Wu, Yulei; Lei, Liu (Chris); Jin, Xiaolong; Jarvis, Stephen and Al-Dubai, Ahmed Y. (eds), TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 533-540, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Priyadarshani, W.P.E.*, Wikramanayake, G.N.* and Batten, Lynn M. (2012) Enhancement of user level controls in cloud databases, in Unknown (ed.), NITC 2012 : Proceedings of the 30th National Information Technology Conference, pp. 46-53, Computer Society of Sri Lanka, Colombo, Sri Lanka [E2]
DRO entry for this publication

Singh, Kalpana (2012) Recovering private data : a comparison of three methods, in Warren, Matthew (eds), ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, pp. 24-25, School of Information Systems, Deakin University, Melbourne, Vic. [E2]
DRO entry for this publication

Abawajy, Jemal, Khayyam, Hamid and Kim, Taihoonn* (2012) Context-aware meta search engine for distributed web service, in Unknown (ed.), CCA 2012 : Computer and applications : Proceedings of the 2012 International Conference on Computer Applications, p. 155, Science & Engineering Research Support Centre, (SERSC), Seoul, South Korea [E3]
DRO entry for this publication

Abawajy, Jemal and Kim, Taihoonn* (2012) Analysis of networked RFID system reliability, in Unknown (ed.), AITS 2012 : Proceedings of the 2012 International Conference on Advanced Information Technology and Sensor Application, p. 91, The Conference, Daejeon, Korea [E3]
DRO entry for this publication

Zhou, Wanlei (2012) Keynote : Detection of and defense against distributed denial-of-service (DDoS) attacks, in Min, Geyong; Wu, Yulei; Lei, Liu (Chris); Jin, Xiaolong; Jarvis, Stephen and Al-Dubai, Ahmed Y. (eds), TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p. 1xxxii, IEEE, Piscataway, N. J. [E3]
DRO entry for this publication

James, Kimberley, Petty, Debra and Wood-Bradley, Guy (2012) Face it : some students are not attending class, in Unknown (ed.), DTL 2012 : Future learning@Deakin : Proceedings of the Deakin Teaching and Learning 2012 conference, p. 1, Deakin University, Melbourne, Vic. [E3.1]
DRO entry for this publication

James, Kimberley, Wood-Bradley, Guy and Petty, Debra (2012) Face it : some students are not attending class, in Unknown (ed.), Desire2Learn 2012 : Proceedings of the 2012 Asia-Pac Teaching and Learning Conference, p. 1, Conference, Melbourne, Vic [E3.1]
DRO entry for this publication

James, Kimberley, Petty, Debra and Wood-Bradley, Guy (2012) Face it : some students are not attending class, in Unknown (ed.), FUSION 2012 : Chart your course : Proceedings of the FUSION Desire2Learn Users’ 2012 Conference, p. 1, Desire2Learn, San Diego, California [E3.1]
DRO entry for this publication

Abawajy, Jemal, Mohammed, Sabah*, Caytiles, Ronnie, D.* and Gelogo, Yvette E.* (2012) Advanced signal processing : International conference, ASP 2012, March 30-31 2012, Olympic Parktel, Seoul, Korea : conference proceedings, in Abawajy, Jemal; Mohammed, Sabah; Caytiles, Ronnie, D. and Gelogo, Yvette E. (eds), Science & Engineering Research Support Centre, (SERSC), Seoul, South Korea [E4]
DRO entry for this publication

Abawajy, Jemal., Khan, Muhammad Khurram*, Gelogo, Yvette E.* and Caytiles, Ronnie D.* (2012) Information security and assurance : Proceedings international conference, ISA 2012, Shanghai China, April 2012, in Abawajy, Jemal.; Khan, Muhammad Khurram; Gelogo, Yvette E. and Caytiles, Ronnie D. (eds), Science & Engineering Research Support Centre, (SERSC), Sandy Bay, Tasmania [E4]
DRO entry for this publication

Abawajy, Jemal, Mohammed, Sabah*, Gelogo, Yvette, E.* and Caytiles, Ronnie, D.* (2012) Computer and applications : International conference, CCA 2012, March 30-31, 2012 Olympic Parktel, Seoul, Korea, conference proceedings, in Abawajy, Jemal; Mohammed, Sabah; Gelogo, Yvette, E. and Caytiles, Ronnie, D. (eds), SERSC, Seoul, South Korea [E4]
DRO entry for this publication

Kang, Byeong Ho*, Abawajy, Jemal, Gelogo, Yvette E.* and Caytiles, Ronnie D.* (2012) Ubiquitous computing and multimedia applications : Proceedings of the 2012 Third UCMA International Conference, in Kang, Byeong Ho; Abawajy, Jemal; Gelogo, Yvette E. and Caytiles, Ronnie D. (eds), Science and Engineering Research Support Society, Sandy Bay, Tasmania [E4]
DRO entry for this publication

Lee, Vincent C. S.* and Ong, Kok-Leong (2012) 2012 Seventh International Conference on Knowledge, Information and Creativity Support Systems, in Lee, Vincent C. S. and Ong, Kok-Leong (eds), IEEE, Piscataway, N. J. [E4]
DRO entry for this publication

Mehata, K.M.* and Hou, Jingyu (2012) ICSEMA 2012 : Proceedings of the International Conference on Software Engineering and Mobile Application Modelling and Development, in Mehata, K.M. and Hou, Jingyu (eds), Allied Publishers, New Delhi, India [E4]
DRO entry for this publication

Ray, Indrajit*, Yan, Zheng*, Yu, Shui and Liu, Lei (Chris)* (2012) TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, in Ray, Indrajit; Yan, Zheng; Yu, Shui and Liu, Lei (Chris) (eds), IEEE, Piscataway, N.J. [E4]
DRO entry for this publication

Dai, Honghua, Liu, James* and Smirnov, Evgueni* (2012) Preface : Fourth workshop on reliability issues in knowledge discovery, in Dai, Honghua; Liu, James and Smirnov, Evgueni (eds), ICDMW 2012 : Proceedings of the 12th IEEE International Conference on Data Mining Workshops, pp. xlvii-xlviii, IEEE, Piscataway, N.J. [EN]
DRO entry for this publication

Ong, Kok-Leong (2012) Message from the program chair, in Ong, Kok-Leong (eds), KICSS 2012 : Proceedings of 7th IEEE International Conference on Knowledge, Information and Creativity Support System, p. X, IEEE, Piscataway, N.J. [EN]
DRO entry for this publication

Grants and Consultancies

Grants with funding during 2012

Research Income - National Competitive Grants

Kloeden, P and Ivanov, A. Computer visualisation of chaotic delay equations, Australian Research Council Small Grant [T]

  • 1995: $9,684

Goscinski, A, Horan, P and Gerrity, G*. Performance studies of distributed operating systems based on the Rhodos system, Australian Research Council Large Grant [T]

  • 1995: $44,768

Ivanov, A. Perturbations of Difference Equations, Australian Research Council Large Grant [T]

  • 1998: $1,167
  • 1997: $48,000

Wang, L. Solving Combinatorial Optimisation Problems using Discrete Time Neural Networks, Australian Research Council Small Grant [T]

  • 1997: $19,414

Garner, B and Sunwoo, J*. An automated (concurrent) software audit for software development process, Australian Research Council SPIRT Grant [T]

  • 2000: $77,487
  • 1999: $151,165

Goscinski, A. Supporting PVM Programmers and Improving Performance of PVM Based Parallel Processing., Australian Research Council Small Grant [T]

  • 1998: $17,000

Goscinski, A and Silcock, J. The Management of Parallel Processes, Data and computational Resources for Applications Using distributed Shared Memory., Australian Research Council Small Grant [T]

  • 1999: $17,000

Yang, Y and Zhou, W. Coordination and Security Mechanisms for Computer-Mediated Teamwork Support in a Web-based Environment., Australian Research Council Small Grant [T]

  • 1998: $10,000

Yang, Y. Visual Programming support for Web-Based Teamwork Modelling., Australian Research Council Small Grant [T]

  • 1999: $10,000

Zhou, W. A Reactive system for Building Fault-Tolerant java Applications, Australian Research Council Small Grant [T]

  • 1998: $10,000

Zhou, W. Towards the Building of Reliable Web-Based Databases., Australian Research Council Small Grant [T]

  • 1999: $14,000

Webb, G. Machine-expert collaborative knowledge acquisition, Australian Research Council Large Grant [T]

  • 1996: $47,286
  • 1995: $46,934

Kloeden, P and Diamond, P*. Numerical Analysis of Dynamical Systems and the Computational Process as a Dynamical System, Australian Research Council Large Grant [T]

  • 1997: $71,280
  • 1996: $68,795
  • 1995: $65,000

Webb, G, Pazzani, M* and Zheng, Z*. Learning efficient accurate Bayesian classifiers from data, Australian Research Council Large Grant [T]

  • 2000: $56,971

Goscinski, A. The Improvement of Execution Performance of Parallel Applications and Utilisation of a Cluster of Workstations Using Global Scheduling, Australian Research Council Small Grant [T]

  • 2000: $16,300

Zhang, C. Coordinating Multi-Agent Systems for Business Process Management Based on Temporal Dependencies, Australian Research Council Small Grant [T]

  • 2000: $16,000

Zhou, W. Managing Replicated Transactions in Web-Based Applications to survive Network Partitioning Failures, Australian Research Council Small Grant [T]

  • 2000: $13,000

Webb, G. Learning efficient accurate Bayesian classifiers from data, Australian Research Council Large Grant [T]

  • 2002: $61,626
  • 2001: $60,281

Goscinski, A, Zhou, B and Brent, R. Job Scheduling Strategies for General-Purpose High Performance Computing Clusters, ARC - Discovery [T]

  • 2004: $70,033
  • 2003: $66,155
  • 2002: $62,322

Zou, L and Hu, E. Removal of Toxic Air Pollutants from car cabin by Photocatalytic Oxidation Reactor, Australian Research Council Linkage APAI [T]

  • 2005: $24,650

Chen, Y. Design and development of a Web-based Intelligent Multimedia Mining System, Australian Research Council Linkage Project [T]

  • 2005: $24,650
  • 2004: $48,260

Dawson, E*, Batten, L and Simpson, L*. Efficient and Secure Word-Based Stream Ciphers for Wireless Communications, Australian Research Council Discovery Project [T]

  • 2005: $16,666
  • 2004: $16,666

Chen, Y. Australian Centre for Genome-Phenome Bioinformatics, ARC Centre - Centres of Excellence [T]

  • 2009: $54,572
  • 2005: $96,122
  • 2004: $82,000

Chen, Y. Integrating Database Technologies and Visual Analysis, Australian Research Council, Project - Discovery - Projects [T]

  • 2004: $62,961

Chen, Y, Wong, L* and Li, J*. Development of Knowledge Discovery for High Dimensional Biomedical Data, Australian Research Council [T]

  • 2005: $7,147

Goscinski, A, Silcock, J, Hobbs, M and Dew, R. Self Discovery, Self Configuration and Self Healing of Enterprise Grids, Australian Research Council Discovery Project [T]

  • 2005: $82,701

Chen, Y. Exploiting Database Technologies for the Visualization and Analysis of Measured and Simulated Plant Structures in Bioinformatics, Australian Research Council Discovery Project [T]

  • 2005: $51,050

Zhou, S* and Mak, V. Channel Assignment in Cellular Communication Systems and Optical Networks, Australian Research Council Discovery Project [T]

  • 2005: $2,500

Wang, H* and Charnes, C. Private Information Retrieval, Australian Research Council Discovery Project [T]

  • 2005: $10,000

Zhou, W, Shi, W and Shi, W*. Protecting Web Services from Distributed Denial of Service Attacks, ARC Collaborative - Linkage - Projects (Round 2, APAI) [T]

  • 2009: $13,069
  • 2005: $12,325

Zhou, W. Development of methods to address internet crime, ARC Grant - Discovery Projects [T]

  • 2009: $78,568

Research Income - Other Public Sector Funding

Ivanov, A. Visiting fellowship for Professor Alexander Sharkovsky. [U]

  • 1997: $13,950

Hobbs, M. PhD Scholarship - Brendan McKenzie [U]

  • 2005: $8,931
  • 2004: $13,863
  • 2003: $13,500
  • 2002: $13,000

Warren, M. PhD Scholarship - Warren Brooks [U]

  • 2002: $13,000

Zhou, W. PhD Scholarship - Elicia Lanham [U]

  • 2005: $8,228
  • 2004: $13,863
  • 2003: $13,500
  • 2002: $13,000

Zhou, W. Local Government System [U]

  • 2005: $1,250
  • 2004: $7,500
  • 2003: $1,250

Goscinski, A. PhD Scholarship - Andrew Maloney [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Zhou, W. PhD Scholarship - John Casey [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Zhou, W. PhD Scholarship - Naomi Augar [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Batten, L, Doss, R and Palm, B*. Recovery Mechanisms for Wireless Sensor Devices [U]

  • 2009: $18,855

Research Income - Industry and Other Funding

Garner, B. Scholarship Income [V]

  • 2000: $20,000

Batten, L and Castleman, T. Supplier wide eBusiness engagement Project [V]

  • 2003: $25,000
  • 2002: $25,000

Rosenberg, J. BlueJ- The interactive environment [V]

  • 2003: $168,899

Chen, Y. Design and development of a Web-based Intelligent Multimedia Mining System [V]

  • 2004: $5,000
  • 2005: $5,000

Research Income - Industry and Other Funding - Australian

Zhou, W, Shi, W and Shi, W*. Protecting Web Services from Distributed Denial of Service Attacks [V.1]

  • 2005: $6,000

Beliakov, G. Reliable methods of data approximation and forecasting [V.1]

  • 2005: $21,000

Zhou, W and Shi, W. A novel computational approach for identifying transcription factor binding sites in gene promoters [V.1]

  • 2005: $23,000

Chen, Y. Development of data mining tools for the prediction of genomic linked clinical outcomes in a genetic disease state Cystic Fibrosis [V.1]

  • 2005: $18,000

Research Income - Industry and Other Funding - International B (Other Income)

Rosenberg, J. BlueJ- The interactive environment [V.3]

  • 2007: $215,655

Higher Degree by Research Completions

No completions found or audited.

Legend:
* Not a member of Deakin University at time of output.

DRO to publications collection last synchronised: Wednesday 22nd October 2014 10:04pm

Deakin University acknowledges the traditional land owners of present campus sites.

8th November 2010