Research Services Division

Deakin Research

2013 School of Information Technology Research Output

Note: The 2012, 2013, 2014 publications have not been audited.

Jump to: Publications | Grants and Consultancies | HDR completions

Publications

Batten, Lynn Margaret (2013) Public key cryptography : applications and attacks, John Wiley & Sons, Hoboken, N.J. [A2]
DRO entry for this publication

Aversa, Rocco*, Kolodziej, Joanna*, Zhang, Jun, Amato, Flora* and Fortino, Giancarlo* (2013) Algorithms and architectures for parallel processing : 13th International Conference, ICA3PP 2013 Vietri sul Mare, Italy, December 18-20, 2013 Proceedings, in Aversa, Rocco; Kolodziej, Joanna; Zhang, Jun; Amato, Flora and Fortino, Giancarlo (eds), Springer, Berlin, Germany [A4]
DRO entry for this publication

Baczynski, Michal*, Beliakov, Gleb, BustinceSola, Humberto* and Pradera, Ana* (2013) Advances in fuzzy implication functions, in Baczynski, Michal; Beliakov, Gleb; BustinceSola, Humberto and Pradera, Ana (eds), Springer, Heidelberg, Germany [A7]
DRO entry for this publication

Alazab, Ammar, Abawajy, Jemal and Hobbs, Michael (2013) Web malware that targets web applications, in Caviglione, Luca; Coccoli, Mauro and Merlo, Alessio (eds), Social network engineering for secure web data and services, pp. 248-264, IGI Global, Hershey, Pa. [B1]
DRO entry for this publication

Alazab, Ammar, Hobbs, Michael, Abawajy, Jemal and Khraisat, Ansam* (2013) Developing an intelligent intrusion detection and prevention system against web application malware, in Awad, Ali Ismail; Hassanien, Aboul Ella and Baba, Kensuke (eds), Advances in security of information and communication networks. First International Conference , SecNet 2013 Cairo, Egypt, September Proceedings, pp. 177-184, Springer, Berlin, Germany [B1]
DRO entry for this publication

Alazab, Mamoun*, Venkatraman, Sitalakshmi*, Watters, Paul* and Alazab, Moutaz (2013) Information security governance: the art of detecting hidden malware, in Mellado, Daniel; Sanchez, Luis Enrique; Fernandez-Medina, Eduardo and Piattini, Mario G. (eds), IT security governance innovations: theory and research, pp. 293-315, IGI Global, Hershey, Pa. [B1]
DRO entry for this publication

Bedregal, Benjamin*, Beliakov, Gleb, Bustince, Humberto*, Fernandez, Javier*, Pradera, Ana* and Reiser, Renata* (2013) (S,N)-implications on bounded lattices, in Baczynski, Michal; Beliakov, Gleb; BustinceSola, Humberto and Pradera, Ana (eds), Advances in fuzzy implication functions, pp. 101-124, Springer, Heidelberg, Germany [B1]
DRO entry for this publication

Cesare, Silvio, Xiang, Yang and Zhang, Jun (2013) Clonewise - detecting package-level clones using machine learning, in Zia, Tanveer; Zomaya, Albert; Varadharajan, Vijay and Mao, Morley (eds), Security and privacy in communication networks, pp. 197-215, Springer International Publishing, Berlin, Germany [B1]
DRO entry for this publication

Chen, Jing*, Du, Ruiying*, Zhao, Li*, Wang, Chiheng*, Zheng, Minghui* and Xiang, Yang (2013) Fault-tolerant topology control based on artificial immune theory in WMNs, in Lopez, Javier; Huang, Xinyi and Sandhu, Ravi (eds), Network and system security: 7th international conference, NSS 2013, Madrid, Spain, June 3-4, 2013, proceedings, pp. 590-598, Springer, Berlin, Germany [B1]
DRO entry for this publication

Chowdhury, Belal, Chowdhury, Morshed and Abawajy, Jemal (2013) Securing a web-based anti-counterfeit RFID system, in Zia, Tanveer; Zomaya, Albert; Varadharajan, Vijay and Mao, Morley (eds), Security and privacy in communication networks, pp. 342-355, Springer International Publishing, Berlin, Germany [B1]
DRO entry for this publication

Chowdhury, Morshed U. and Ray, Biplob R.* (2013) Security risks/vulnerability in a RFID system and possible defenses, in Karmakar, Nemai Chandra (eds), Advanced RFID systems, security, and applications, pp. 1-15, Information Science Reference, Hershey, Pa. [B1]
DRO entry for this publication

Coldwell-Neilson, Jo (2013) Managing expectations : a changing landscape, in McKay, Elspeth (eds), ePedagogy in online learning : new developments in web mediated human computer interaction, pp. 1-17, Information Science Reference, Hershey, Pa. [B1]
DRO entry for this publication

Craig, Annemieke, Coldwell, Jo, Fisher, Julie* and Lang, Catherine* (2013) The silicon ceiling : women managers and leaders in ICT in Australia, in Paludi, Michele A. (eds), Women and management : global issues and promising solutions, pp. 177-200, Praeger, Santa Barbara, Calif. [B1]
DRO entry for this publication

Fernando, Harinda and Abawajy, Jemal (2013) Malware detection and prevention in RFID systems, in Bessis, Nik; Xhafa, Fatos; Varvarigou, Dora; Hill, Richard and Li, Maozhen (eds), Internet of things and inter-cooperative computational technologies for collective intelligence, pp. 143-166, Springer, Heidelberg, Germany [B1]
DRO entry for this publication

Gan, Min and Dai, Honghua (2013) Quantitatively evaluating the effects of price promotions using data mining, in Pooley, Rob; Coady, Jennifer; Linger, Henry; Barry, Chris; Lang, Michael and Schneider, Christoph (eds), Information systems development : reflections, challenges and new directions, pp. 485-497, Springer, New York, N.Y. [B1]
DRO entry for this publication

Herawan, Tutut*, Noraziah, A.*, Abdullah, Zailani*, Deris, Mustafa Mat* and Abawajy, Jemal H. (2013) IPMA : Indirect patterns mining algorithm, in Nguyen, Ngoc Thanh; Trawiski, Bogdan; Katarzyniak, Radoslaw and Jo, Geun-sik (eds), Advanced methods for computational collective intelligence, pp. 187-196, Springer, Berlin, Germany [B1]
Citation counts: Scopus - 1
DRO entry for this publication

Khaddage, Ferial and Lattenman, Christoph* (2013) The future of mobile apps for teaching and learning, in Berge, Zane L. and Muilenburg, Lin Y. (eds), Handbook of mobile learning, pp. 119-128, Routledge, New York, N.Y. [B1]
DRO entry for this publication

Lattemann, Christoph* and Khaddage, Ferial (2013) A review of the current status of mobile apps in education - implication for emerging countries business education strategies, in Alon, Ilan; Jones, Victoria and McIntyre, John R. (eds), Innovation in business education in emerging markets, pp. 181-192, Palgrave MacMillan, New York, N.Y. [B1]
DRO entry for this publication

Liao, Zhihua* and Zhang, Zili (2013) Learning to map Chinese sentences to logical forms, in Wang, Mingzheng (eds), Knowledge science engineering and management : 6th International Conference, KSEM 2013, Dalian, China, August 10-12, 2013, proceedings, pp. 463-472, Springer, Berlin, Germany [B1]
DRO entry for this publication

Liu, Yuxin*, Zhang, Zili, Gao, Chao*, Wu, Yuheng* and Qian, Tao* (2013) A physarum network evolution model based on IBTM, in Tan, Ying; Shi, Yuhui and Mo, Hongwei (eds), Advances in swarm intelligence, pp. 19-26, Springer, Berlin, Germany [B1]
DRO entry for this publication

Masud, Md. Anwar Hossain*, Islam, Md. Rafiqul* and Abawajy, Jemal (2013) Security concerns and remedy in a cloud based e-learning system, in Zia, Tanveer; Zomaya, Albert; Varadharajan, Vijay and Mao, Morley (eds), Security and privacy in communication networks, pp. 356-366, Springer International Publishing, Berlin, Germany [B1]
DRO entry for this publication

Moonsamy, Veelasha, Rong, Jia, Liu, Shaowu, Li, Gang and Batten, Lynn (2013) Contrasting permission patterns between clean and malicious android applications, in Zia, Tanveer; Zomaya, Albert; Varadharajan, Vijay and Mao, Morley (eds), Security and privacy in communication networks, pp. 69-85, Springer International Publishing, Berlin, Germany [B1]
DRO entry for this publication

Nguyen, Tu Dinh, Tran, Truyen, Phung, Dinh and Venkatesh, Svetha (2013) Latent patient profile modelling and applications with mixed-variate restricted Boltzmann machine, in Pei, Jian; Tseng, Vincent S.; Cao, Longbing; Xu, Guandong and Motoda, Hiroshi (eds), Advances in knowledge discovery and data mining : 17th Pacific-Asia Conference, PAKDD 2013 Gold Coast, Australia, April 14-17, 2013 Proceedings, Part I, pp. 123-135, Springer, Berlin, Germany [B1]
DRO entry for this publication

Niu, Wenjia*, Yang, Xinghua*, Li, Gang, Tong, Endong*, Tang, Hui* and Ci, Song* (2013) An agent collaboration-based data hierarchical caching approach for HD video surveillance, in Cao, Longbing; Zeng, Yifeng; Symeonidis, Andreas L; Gorodetsky, Vladimir I; Yu, Philip S and Singh, Munindar P (eds), Agents and data mining interaction, pp. 51-64, Springer, Berlin, Germany [B1]
DRO entry for this publication

Qian, Tao*, Zhang, Zili, Gao, Chao*, Wu, Yuheng* and Liu, Yuxin* (2013) An ant colony system based on the physarum network, in Tan, Ying; Shi, Yuhui and Mo, Hongwei (eds), Advances in swarm intelligence, pp. 297-305, Springer, Berlin, Germany [B1]
DRO entry for this publication

Ray, Biplob R., Chowdhury, Morshed and Abawajy, Jemal (2013) StenoCipher to provide data confidentiality and tampered data recovery for RFID tag, in Lee, Roger (eds), Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, pp. 37-51, Springer-Verlag Berlin Heidelberg, Berlin, Germany [B1]
DRO entry for this publication

Ren, Yongli, Zhu, Tianqing, Li, Gang and Zhou, Wanlei (2013) Top-N recommendations by learning user preference dynamics, in Pei, Jian; Tseng, Vincent S.; Cao, Longbing; Motoda, Hiroshi and Xu, Guandong (eds), Advances in knowledge discovery and data mining : 17th Pacific-Asia Conference, PAKDD 2013, Gold Coast, Australia, April 14-17, 2013, Proceedings, Part 1, pp. 390-401, Springer, Berlin, Germany [B1]
DRO entry for this publication

Singh, Kalpana and Batten, Lynn (2013) An attack-resistant hybrid data-privatization method with low information loss, in Fernandez-Gago, Carmen; Martinelli, Fabio; Pearson, Siani and Augdo, Issac (eds), Trust management VII, pp. 263-271, Springer, Berlin, Germany [B1]
DRO entry for this publication

Yuan, Ye*, Zeng, Wei* and Zhang, Zili (2013) A semantic technology supported precision agriculture system : a case study for citrus fertilizing, in Wang, Mingzheng (eds), Knowledge science engineering and management : 6th International Conference, KSEM 2013, Dalian, China, August 10-12, 2013, proceedings, pp. 104-111, Springer, Berlin, Germany [B1]
DRO entry for this publication

Zaman, Nazia* and Chowdhury, Morshed (2013) Multimedia stream rate control over MANET based on router feedback, in Lee, Roger (eds), Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, pp. 53-68, Springer-Verlag Berlin Heidelberg, Berlin, Germany [B1]
DRO entry for this publication

Wen, Sheng, Xiang, Yang and Zhou, Wanlei (2013) Modeling and analysis for thwarting worm propagation in email networks, in Lopez, Javier; Huang, Xinyi and Sandhu, Ravi (eds), Network and system security : 7th international conference, NSS 2013, Madrid, Spain, June 3-4, 2013, proceedings, pp. 763-769, Springer, Berlin, Germany [B2]
DRO entry for this publication

Abawajy, J., Kelarev, A.V., Yearwood, J.L.* and Turville, C.* (2013) A data mining application of the incidence semirings, Houston journal of mathematics, vol. 39, no. 4, pp. 1083-1093, University of Houston, Department of Mathematics, Houston, Tx. [C1]
ERA journal ID: 172 – Scopus EID: Not tagged
DRO entry for this publication

Abawajy, Jemal (2013) SQLIA detection and prevention approach for RFID systems, Journal of systems and software, vol. 86, no. 3, pp. 751-758, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 18045 – Scopus EID: Not tagged
DRO entry for this publication

Abawajy, J. H., Kelarev, A. V. and Chowdhury, M. (2013) Multistage approach for clustering and classification of ECG data, Computer methods and programs in biomedicine, vol. 112, no. 3, pp. 720-730, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 5039 – Scopus EID: 2-s2.0-84885423330
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Abawajy, Jemal H., Jami, Syed I.*, Shaikh, Zubair A.* and Hammad, Syed A.* (2013) A framework for scalable distributed provenance storage system, Computer standards & interfaces, vol. 35, no. 1, pp. 179-186, Elsevier BV, Amsterdam, The Netherlands [C1]
ERA journal ID: 17803 – Scopus EID: 2-s2.0-84867892973
DRO entry for this publication

Abawajy, J., Kelarev, A. V. and Zeleznikow, J.* (2013) Centroid sets with largest weight in Munn semirings for data mining applications, Semigroup forum, vol. 87, no. 3, pp. 617-626, Springer, Berlin, Germany [C1]
ERA journal ID: 389 – Scopus EID: 2-s2.0-84876366818
DRO entry for this publication

Alazab, Ammar, Hobbs, Michael, Abawajy, Jemal and Khraisat, Ansam* (2013) Malware detection and prevention system based on multi-stage rules, International journal of information security and privacy, vol. 7, no. 2, pp. 29-43, IGI Global, Hershey, Pa. [C1]
ERA journal ID: 31258 – Scopus EID: Not tagged
DRO entry for this publication

Al-Hyari, Salah*, Alazab, Moutaz, Venkatraman, Sitalakshmi*, Alazab, Mamoun* and Alazab, Ammar (2013) Performance evaluation of e-government services using balance scorecard : an empirical study in Jordan, Benchmarking : an international journal, vol. 20, no. 4, pp. 512-536, Emerald, Bingley, England [C1]
ERA journal ID: 19392 – Scopus EID: 2-s2.0-84879287226
DRO entry for this publication

Beliakov, Gleb and Kelarev, Andrei (2013) Global non-smooth optimization in robust multivariate regression, Optimization methods and software, vol. 28, no. 1, pp. 124-138, Taylor & Francis, Essex, England [C1]
ERA journal ID: 30913 – Scopus EID: 2-s2.0-84867469138
Citation counts: Thomson - 2
DRO entry for this publication

Beliakov, Gleb and James, Simon (2013) Stability of weighted penalty-based aggregation functions, Fuzzy sets and systems, vol. 226, pp. 1-18, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 159 – Scopus EID: 2-s2.0-84873581199
Citation counts: Scopus - 1
DRO entry for this publication

Beliakov, Gleb and James, Simon (2013) On extending generalized Bonferroni means to Atanassov orthopairs in decision making contexts, Fuzzy sets and systems, vol. 211, pp. 84-98, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 159 – Scopus EID: 2-s2.0-79251596994
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Beliakov, G., Creighton, D., Johnstone, M. and Wilkin, T. (2013) Efficient implementation of Bailey and Borwein pseudo-random number generator based on normal numbers, Computer physics communications, vol. 184, no. 8, pp. 1999-2004, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 962 – Scopus EID: 2-s2.0-84877691156
DRO entry for this publication

Bustince, H.*, Jurio, A.*, Pradera, A.*, Mesiar, R.* and Beliakov, G. (2013) Generalization of the weighted voting method using penalty functions constructed via faithful restricted dissimilarity functions, European journal of operational research, vol. 225, no. 3, pp. 472-478, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 148 – Scopus EID: Not tagged
Citation counts: Thomson - 1
DRO entry for this publication

Cesare, Silvio, Xiang, Yang and Zhou, Wanlei (2013) Malwise-an effective and efficient classification system for packed and polymorphic malware, IEEE transactions on computers, vol. 62, no. 6, pp. 1193-1206, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 4447 – Scopus EID: 2-s2.0-84877264918
Citation counts: Scopus - 2
DRO entry for this publication

Chiong, Choo W.R.*, Rong, Yue* and Xiang, Yong (2013) Channel training algorithms for two-way mimo relay systems, IEEE transactions on signal processing, vol. 61, no. 16, pp. 3988-3998, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 4462 – Scopus EID: 2-s2.0-84880897614
DRO entry for this publication

Deng, Kefeng*, Ren, Kaijun*, Song, Junqiang*, Yuan, Dong*, Xiang, Yang and Chen, Jinjun* (2013) A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computing, Concurrency computation practice and experience, vol. 25, no. 18, pp. 2523-2539, John Wiley & Sons, London, England [C1]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-84879718426
Citation counts: Thomson - 1
DRO entry for this publication

Dewan, Jahangir, Chowdhury, Morshed and Batten, Lynn (2013) An efficient algorithm for partitioning and authenticating problem-solutions of elearning contents, E-Learning and digital media, vol. 10, no. 3, pp. 236-241, Symposium Journals, Oxford, England [C1]
ERA journal ID: 20273 – Scopus EID: Not tagged
DRO entry for this publication

Dong, Yucheng*, Hong, Wei-Chiang*, Xu, Yinfeng* and Yu, Shui (2013) Numerical scales generated individually for analytic hierarchy process, European journal of operational research, vol. 229, no. 3, pp. 654-662, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 148 – Scopus EID: 2-s2.0-84877699651
DRO entry for this publication

Doss, Robin, Zhou, Wanlei and Yu, Shui (2013) Secure RFID tag ownership transfer based on quadratic residues, IEEE Transactions on information forensics and security, vol. 8, no. 2, pp. 390-401, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 32044 – Scopus EID: 2-s2.0-84872713391
DRO entry for this publication

Doss, Robin, Sundaresan, Saravanan and Zhou, Wanlei (2013) A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems, Ad hoc networks, vol. 11, no. 1, pp. 383-396, Elsevier, New York, N.Y. [C1]
ERA journal ID: 40972 – Scopus EID: 2-s2.0-84870065586
Citation counts: Scopus - 2
DRO entry for this publication

Gao, Longxiang, Li, Ming, Bonti, Alessio, Zhou, Wanlei and Yu, Shui (2013) Multi-dimensional routing protocol in human associated delay-tolerant networks, IEEE transactions on mobile computing, vol. 12, no. 11, pp. 2132-2144, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 5073 – Scopus EID: 2-s2.0-84884690390
Citation counts: Scopus - 1
DRO entry for this publication

Gao, Shang, Coldwell-Neilson, Jo and Goscinski, Andrzej (2013) Improving assessment management using tools, International journal of advanced computer science and applications, vol. 4, no. 6, pp. 168-173, IJACSA, New York, N.Y. [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Gao, Shang, Coldwell-Neilson, Jo and Goscinski, Andrzej (2013) Approaches to improving teaching, Creative education, vol. 4, no. 7, pp. 1-7, Scientific Research Publishing, Irvine, Calif. [C1]
ERA journal ID: 123561 – Scopus EID: Not tagged
DRO entry for this publication

Gao, Shang, Coldwell-Neilson, Jo and Goscinski, Andrzej (2013) Constructivist learning: understanding and experience in IT tertiary education, Journal of curriculum and teaching, vol. 2, no. 2, pp. 140-146, Sciedu Press, Toronto, Ont. [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Hamid, Isredza Rahmi A., Abawajy, Jemal and Kim, Tai-hoon* (2013) Using feature selection and classification scheme for automating phishing email detection, Studies in informatics and control, vol. 22, no. 1, pp. 61-70, ICI Bucharest, Bucharest, Romania [C1]
ERA journal ID: Not matching ERA journal list
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Hou, Jingyu and Jiang, Yongqing (2013) Dynamically searching for a domain for protein function prediction, Journal of bioinformatics and computational biology, vol. 11, no. 4, pp. 1-20, Imperial College Press, London, England [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Hou, Jingyu and Saini, Ashish (2013) Semantically assessing the reliability of protein interactions, Mathematical biosciences, vol. 245, no. 2, pp. 226-234, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 931 – Scopus EID: 2-s2.0-84884136338
DRO entry for this publication

Hou, Jingyu, Zhu, Wei* and Chen, Yi-Ping Phoebe* (2013) Dynamically predicting protein functions from semantic associations of proteins, Network modeling analysis in health informatics and bioinformatics, vol. 2, no. 4, pp. 175-183, Springer, Berlin, Germany [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Ibragimov, Ranis*, Jefferson, Grace and Carminati, John (2013) Invariant and approximately invariant solutions of non-linear internal gravity waves forming a column of stratified fluid affected by the Earth's rotation, International journal of non-linear mechanics, vol. 51, pp. 28-44, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 5134 – Scopus EID: 2-s2.0-84872730393
Citation counts: Scopus - 1
DRO entry for this publication

Islam, Rafiqul*, Tian, Ronghua, Batten, Lynn M. and Versteeg, Steve* (2013) Classification of malware based on integrated static and dynamic features, Journal of network and computer applications, vol. 36, no. 2, pp. 646-656, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 18032 – Scopus EID: Not tagged
DRO entry for this publication

Islam, Rafiqul* and Abawajy, Jemal (2013) A multi-tier phishing detection and filtering approach, Journal of network and computer applications, vol. 36, no. 1, pp. 324-335, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 18032 – Scopus EID: 2-s2.0-84870666662
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Izadi, Davood, Abawajy, Jemal and Ghanavati, Sara (2013) Fuzzy logic optimized wireless sensor network routing protocol, Journal of high speed networks, vol. 19, no. 2, pp. 115-128, IOS Press, Amsterdam, The Netherlands [C1]
ERA journal ID: 4489 – Scopus EID: 2-s2.0-84880558086
DRO entry for this publication

Jefferson, G.F. (2013) On the second-order approximate symmetry classification and optimal systems of subalgebras for a forced Korteweg-de Vries equation, Communications in nonlinear science and numerical simulation, vol. 18, no. 9, pp. 2340-2358, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 100 – Scopus EID: 2-s2.0-84878018382
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Jefferson, G.F. and Carminati, J. (2013) ASP : Automated symbolic computation of approximate symmetries of differential equations, Computer physics communications, vol. 184, no. 3, pp. 1045-1063, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 962 – Scopus EID: Not tagged
Citation counts: Thomson - 2
DRO entry for this publication

Khan, Wazir Zada*, Aalsalem, Mohammed Y.*, Saad, Mohammed Naufal Bin Mohammed* and Xiang, Yang (2013) Detection and mitigation of node replication attacks in wireless sensor networks : a survey, International journal of distributed sensor networks, vol. 2013, no. 149023, pp. 1-22, Hindawi Publishing Corporation, Philadelphia, Pa. [C1]
ERA journal ID: 3489 – Scopus EID: 2-s2.0-84878653218
Citation counts: Scopus - 1
DRO entry for this publication

Khan, Wazir Zada*, Xiang, Yang, Aalsalem, Mohammed Y.* and Arshad, Quratulain* (2013) Mobile phone sensing systems : a survey, IEEE communications surveys and tutorials, vol. 15, no. 1, pp. 402-427, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 123593 – Scopus EID: 2-s2.0-84873708582
Citation counts: Scopus - 6, Thomson - 6
DRO entry for this publication

Khayyam, Hamid (2013) Stochastic models of road geometry and wind condition for vehicle energy management and control, IEEE transactions on vehicular technology, vol. 62, no. 1, pp. 61-68, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 5074 – Scopus EID: 2-s2.0-84880709511
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Khayyam, Hamid, Abawajy, Jemal, Javadi, Bahman*, Goscinski, Andrzej, Stojcevski, Alex and Bab-Hadiashar, Alireza* (2013) Intelligent battery energy management and control for vehicle-to-grid via cloud computing network, Applied energy, vol. 111, pp. 971-981, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 4005 – Scopus EID: 2-s2.0-84880756591
Citation counts: Scopus - 1
DRO entry for this publication

Kipli, Kuryati, Kouzani, Abbas Z. and Hamid, Isredza Rahmi A. (2013) Investigating machine learning techniques for detection of depression using structural MRI volumetric features, International journal of bioscience, biochemistry and bioinformatics, vol. 3, no. 5, pp. 444-448, International Association of Computer Science and Information Technology Press (IACSIT Press), Singapore [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Lai, K.-W.*, Khaddage, Ferial and Knezek, Gerald* (2013) Blending student technology experiences in formal and informal learning, Journal of computer assisted learning, vol. 29, no. 5, pp. 414-425, Wiley, London, England [C1]
ERA journal ID: 20267 – Scopus EID: 2-s2.0-84883757926
Citation counts: Scopus - 3, Thomson - 3
DRO entry for this publication

Lan, Jinhui*, Li, Jian*, Xiang, Yong, Huang, Tonghuan*, Yin, Yixin* and Yang, Jun* (2013) Fast automatic target detection system based on a visible image sensor and ripple algorithm, IEEE sensors journal, vol. 13, no. 7, pp. 2720-2728, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 4437 – Scopus EID: 2-s2.0-84878777328
DRO entry for this publication

Li, Gang, Law, Rob*, Vu, Huy Quan and Rong, Jia (2013) Discovering the hotel selection preferences of Hong Kong inbound travelers using the Choquet Integral, Tourism management, vol. 36, pp. 321-330, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 19693 – Scopus EID: Not tagged
Citation counts: Thomson - 1
DRO entry for this publication

Li, Xiangwen*, Mak-Hau, Vicky and Zhou, Sanming* (2013) The L(2,1)-labelling problem for cubic Cayley graphs on dihedral groups, Journal of combinatorial optimization, vol. 25, no. 4, pp. 716-736, Springer, New York, N. Y. [C1]
ERA journal ID: 19423 – Scopus EID: 2-s2.0-84863492277
DRO entry for this publication

Liu, Shaowu, Law, Rob*, Rong, Jia, Li, Gang and Hall, John (2013) Analyzing changes in hotel customers’ expectations by trip mode, International journal of hospitality management, vol. 34, pp. 359-371, Pergamon, Oxford, England [C1]
ERA journal ID: 19662 – Scopus EID: 2-s2.0-84878523557
DRO entry for this publication

Luo, Wei, Cao, Jiguo*, Gallagher, Marcus* and Wiles, Janet* (2013) Estimating the intensity of ward admission and its effect on emergency department access block, Statistics in medicine, vol. 32, no. 15, pp. 2681-2694, Wiley, London, England [C1]
ERA journal ID: 862 – Scopus EID: 2-s2.0-84879116922
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Mohammed, Ahmed Hassan*, Dai, Bin*, Huang, Benxiong*, Azhar, Muhammad*, Xu, Guan*, Qin, Peng* and Yu, Shui (2013) A survey and tutorial of wireless relay network protocols based on network coding, Journal of network and computer applications, vol. 36, no. 2, pp. 593-610, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 18032 – Scopus EID: Not tagged
DRO entry for this publication

Niu, Wenjia*, Li, Gang, Tong, Endong*, Yang, Xinghua*, Chang, Liang*, Shi, Zhongzhi* and Ci, Song* (2013) Interaction relationships of caches in agent-based HD video surveillance : discovery and utilization, Journal of network and computer applications, vol. 37, pp. 155-169, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 18032 – Scopus EID: 2-s2.0-84890431987
DRO entry for this publication

Pal, N.R.*, Bustince, H.*, Pagola, M.*, Mukherjee, U.K.*, Goswami, D.P.* and Beliakov, G. (2013) Uncertainties with Atanassov’s intuitionistic fuzzy sets : fuzziness and lack of knowledge, Information sciences, vol. 228, pp. 61-74, Elsevier, New York, N.Y. [C1]
ERA journal ID: 17908 – Scopus EID: Not tagged
Citation counts: Thomson - 3
DRO entry for this publication

Peng, Dezhong*, Xiang, Yong, Trinh, Hieu and Man, Zhihong* (2013) Adaptive blind equalization of time-varying SIMO systems driven by QPSK inputs, Digital signal processing : a review journal, vol. 23, no. 1, pp. 268-274, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 4407 – Scopus EID: 2-s2.0-84869496660
DRO entry for this publication

Peng, Sancheng*, Wang, Guojun* and Yu, Shui (2013) Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones, Journal of computer and system sciences, vol. 79, no. 5, pp. 586-595, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 17982 – Scopus EID: 2-s2.0-84875215204
Citation counts: Scopus - 1, Thomson - 1
DRO entry for this publication

Pham, Duc-Son* and Venkatesh, Svetha (2013) Efficient algorithms for robust recovery of images from compressed data, IEEE transactions on image processing, vol. 22, no. 12, pp. 4724-4737, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 17873 – Scopus EID: 2-s2.0-84885107770
DRO entry for this publication

Pooranian, Zahra*, Shojafar, Mohammad*, Abawajy, Jemal H. and Singhal, Mukesh* (2013) GLOA : a new job scheduling algorithm for grid computing, International journal of interactive multimedia and artificial intelligence, vol. 2, no. 1, pp. 59-64, Imal-Software, Madrid, Spain [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Ray, Biplob Rakshit, Chowdhury, Morshed and Abawajy, Jemal (2013) Hybrid approach to ensure data confidentiality and tampered data recovery for RFID tag, International journal of networked and distributed computing, vol. 1, no. 2, pp. 79-88, Atlantis Press, Paris, France [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Ren, Yizhi*, Li, Mingchu*, Xiang, Yang, Cui, Yongrui* and Sakurai, Kouichi* (2013) Evolution of cooperation in reputation system by group-based scheme, Journal of supercomputing, vol. 63, no. 1, pp. 171-190, Springer, New York, N.Y. [C1]
ERA journal ID: 18042 – Scopus EID: Not tagged
DRO entry for this publication

Ren, Yongli, Li, Gang, Zhang, Jun and Zhou, Wanlei (2013) Lazy collaborative filtering for data sets with missing values, IEEE transactions on cybernetics, vol. 43, no. 6, pp. 1822-1834, IEEE, Piscataway, N.J. [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Saini, Ashish and Hou, Jingyu (2013) Progressive clustering based method for protein function prediction, Bulletin of mathematical biology, vol. 75, no. 2, pp. 331-350, Springer, Berlin, Germany [C1]
ERA journal ID: 924 – Scopus EID: 2-s2.0-84873746692
Citation counts: Scopus - 2, Thomson - 2
DRO entry for this publication

Saini, Ashish, Hou, Jingyu and Zhou, Wanlei (2013) Hub-based reliable gene expression algorithm to classify ER+ and ER- breast cancer subtypes, International journal of bioscience, biochemistry and bioinformatics, vol. 3, no. 1, pp. 20-26, International Association of Computer Science and Information Technology Press, Singapore [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Shojafar, Mohammad*, Pooranian, Zahra*, Abawajy, Jemal H. and Meybodi, Mohammad Reza* (2013) An efficient scheduling method for grid systems based on a hierarchical stochastic petri net, Journal of computing science and engineering, vol. 7, no. 1, pp. 44-52, Korean Institute of Information Scientists and Engineers (KIISE), Seoul, Korea [C1]
ERA journal ID: 124806 – Scopus EID: Not tagged
DRO entry for this publication

Strainieri, Andrew*, Abawajy, Jemal, Kelarev, Andrei, Huda, Shamsul*, Chowdhury, Morshed and Jelinek, Herbert F.* (2013) An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy, Artificial intelligence in medicine, vol. 58, pp. 185-193, Elsevier BV, Amsterdam, The Netherlands [C1]
ERA journal ID: 5031 – Scopus EID: Not tagged
DRO entry for this publication

Wei, Chongyu*, Wei, Weichen and Huang, Shuai* (2013) Applications of a TransFLash in an embedded system debugging, International journal of advancements in computing technology, vol. 5, no. 3, pp. 299-307, Advanced Institute of Convergence Information Technology, Gyeongju, Korea [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Wen, Sheng*, Zhou, Wei*, Zhang, Jun, Xiang, Yang, Zhou, Wanlei and Jia, Weijia* (2013) Modeling propagation dynamics of social network worms, IEEE transactions on parallel and distributed systems, vol. 24, no. 8, pp. 1633-1643, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 20981 – Scopus EID: 2-s2.0-84880054920
DRO entry for this publication

Wong, Adam K.L. and Goscinski, Andrzej M. (2013) A unified framework for the deployment, exposure and access of HPC applications as services in clouds, Future generation computer systems, vol. 29, no. 6, pp. 1333-1344, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 17858 – Scopus EID: 2-s2.0-84875196761
DRO entry for this publication

Wu, Wei*, Zhou, Jianying*, Xiang, Yang and Xu, Li* (2013) How to achieve non-repudiation of origin with privacy protection in cloud computing, Journal of computer and system sciences, vol. 79, no. 8, pp. 1200-1213, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 17982 – Scopus EID: 2-s2.0-84880571602
Citation counts: Scopus - 1
DRO entry for this publication

Xiang, Yong, Peng, Dezhong*, Xiang, Yang and Guo, Song* (2013) Novel Z-Domain precoding method for blind separation of spatially correlated signals, IEEE transactions on neural networks and learning systems, vol. 24, no. 1, pp. 94-105, IEEE, Piscataway, N.J. [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Xie, Yi*, Hu, Jiankun*, Xiang, Yang, Yu, Shui, Tang, Shensheng* and Wang, Yu (2013) Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration, IEEE transactions on parallel and distributed systems, vol. 24, no. 9, pp. 1807-1817, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 20981 – Scopus EID: 2-s2.0-84881076393
DRO entry for this publication

Xie, Yi*, Tang, S.*, Xiang, Y. and Hu, J.* (2013) Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior, IEEE transactions on parallel and distributed systems, vol. 24, no. 7, pp. 1401-1410, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 20981 – Scopus EID: 2-s2.0-84878500827
DRO entry for this publication

Xu, C.*, Du, C.*, Zhao, G.F.* and Yu, S. (2013) A novel model for user clicks identification based on hidden semi-Markov, Journal of network and computer applications, vol. 36, no. 2, pp. 791-798, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 18032 – Scopus EID: Not tagged
DRO entry for this publication

Xu, Yuemei*, Niu, Wenjia*, Tang, Hui*, Li, Gang, Zhao, Zhijun* and Ci, Song* (2013) A policy-based web service redundancy detection in wireless sensor networks, Journal of network and systems management, vol. 21, no. 3, pp. 384-407, Springer New York LLC, New York, N. Y. [C1]
ERA journal ID: 32136 – Scopus EID: Not tagged
DRO entry for this publication

Yang, Zuyuan, Xiang, Yong, Rong, Yue* and Xie, Shengli* (2013) Projection-pursuit-based method for blind separation of nonnegative sources, IEEE transactions on neural networks and learning systems, vol. 24, no. 1, pp. 47-57, IEEE, Piscataway, N.J. [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Yao, Yuan*, Xu, Feng*, Ren, YongLi, Tong, HangHang* and Lu, Jian* (2013) SelfTrust : leveraging self-assessment for trust inference in internetware, Science China information sciences, vol. 56, no. 10, pp. 1-14, Science China Press, Berlin, Germany [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Zaman, Nazia* and Chowdhury, Morshed (2013) Explicit rate control for MANET, International journal of networked and distributed computing, vol. 1, no. 1, pp. 37-45, Atlantis Press, Paris, France [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Zhang, Jun, Xiang, Yang, Zhou, Wanlei and Wang, Yu (2013) Unsupervised traffic classification using flow statistical properties and IP packet payload, Journal of computer and system sciences, vol. 79, no. 5, pp. 573-585, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 17982 – Scopus EID: Not tagged
DRO entry for this publication

Zhang, Jun, Ye, Lei*, Xiang, Yang and Zhou, Wanlei (2013) Robust image retrieval with hidden classes, Computer vision and image understanding, vol. 117, no. 6, pp. 670-679, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 4402 – Scopus EID: 2-s2.0-84875458479
DRO entry for this publication

Zhang, Jun, Xiang, Yang, Wang, Yu, Zhou, Wanlei, Xiang, Yong and Guan, Yong* (2013) Network traffic classification using correlation information, IEEE transactions on parallel and distributed systems, vol. 24, no. 1, pp. 104-117, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 20981 – Scopus EID: 2-s2.0-84870950267
Citation counts: Scopus - 3, Thomson - 3
DRO entry for this publication

Zhang, Jun, Chen, Chao, Xiang, Yang, Zhou, Wanlei and Xiang, Yong (2013) Internet traffic classification by aggregating correlated naive bayes predictions, IEEE transactions on information forensics and security, vol. 8, no. 1, pp. 5-15, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 32044 – Scopus EID: 2-s2.0-84872025715
Citation counts: Scopus - 2, Thomson - 2
DRO entry for this publication

Zhang, Jun, Chen, Chao, Xiang, Yang, Zhou, Wanlei and Vasilakos, Athanasios V.* (2013) An effective network traffic classification method with unknown flow detection, IEEE transactions on network and service management, vol. 10, no. 2, pp. 133-147, IEEE, Piscataway, N.J. [C1]
ERA journal ID: 5073 – Scopus EID: 2-s2.0-84879105959
Citation counts: Scopus - 2
DRO entry for this publication

Zhang, Xiaoge*, Zhang, Zili, Zhang, Yajuan*, Wei, Daijun* and Deng, Yong* (2013) Route selection for emergency logistics management : a bio-inspired algorithm, Safety science, vol. 54, pp. 87-91, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 3717 – Scopus EID: 2-s2.0-84872458439
Citation counts: Scopus - 6, Thomson - 6
DRO entry for this publication

Zhang, Yajuan*, Zhang, Zili, Deng, Yong* and Mahadevan, Sankaran* (2013) A biologically inspired solution for fuzzy shortest path problems, Applied soft computing, vol. 13, no. 5, pp. 2356-2363, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 17759 – Scopus EID: 2-s2.0-84875181451
Citation counts: Scopus - 5, Thomson - 5
DRO entry for this publication

Zhu, Wei*, Hou, Jingyu and Chen, Yi-Ping Phoebe* (2013) Semantically predicting protein functions based on protein functional connectivity, Computational biology and chemistry, vol. 44, pp. 9-14, Elsevier, Amsterdam, The Netherlands [C1]
ERA journal ID: 17808 – Scopus EID: 2-s2.0-84874693851
DRO entry for this publication

Abawajy, Jemal, Kelarev, Andrei and Chowdhury, Morshed (2013) Power graphs : a survey, Electronic journal of graph theory and applications, vol. 1, no. 2, pp. 125-147, Indonesian Combinatorial Society (InaCombS), Graph Theory and Applications (GTA) Research Centre, The University of Newcastle, Australia, Institut Teknologi Bandung (ITB), Indonesia, Indonesia [C2]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Alazab, Ammar, Abawajy, Jemal, Hobbs, Michael and Khraisat, Ansam* (2013) Crime toolkits : the current threats to web applications, Journal of information privacy & security, vol. 9, no. 2, pp. 21-39, Ivy League Publishing, Marietta, Ga. [C2]
ERA journal ID: 32129 – Scopus EID: Not tagged
DRO entry for this publication

Barnett, Lisa M, Bangay, Shaun, McKenzie, Sophie and Ridgers, Nicola (2013) Active gaming as a mechanism to promote physical activity and fundamental movement skill in children, Frontiers in public health, vol. 1, no. Article 74, Frontiers Research Foundation, Lausanne, Switzerland [C2]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Abawajy, Jemal H. and Bhargava, Bharat* (2013) Foreword and editorial - July issue, International journal of security and its applications, vol. 7, no. 4, pp. vii-xvi, Science and Engineering Research Support Society, Seoul, Korea [C4]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Abawajy, Jemal H. and Bhargava, Bharat* (2013) Foreword and editorial - January issue, International journal of security and its applications, vol. 7, no. 1, pp. vii-xii, Science and Engineering Research Support Society, Seoul, Korea [C4]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Abawajy, Jemal H. and Bhargava, Bharat* (2013) Foreword and editorial - May issue, International journal of security and its applications, vol. 7, no. 3, pp. vii-xvi, Science and Engineering Research Support Society, Seoul, Korea [C4]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Abawajy, Jemal H. and Bhargava, Bharat* (2013) Foreword and editorial - March issue, International journal of security and its applications, vol. 7, no. 2, pp. vii-x, Science and Engineering Research Support Society, Seoul, Korea [C4]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Khan, Muhammad Khurram*, Xiang, Yang, Horng, Shi-Jinn* and Chen, Hsiao-Hwa* (2013) Editorial : Trust, security, and privacy in next-generation wireless sensor networks, International journal of distributed sensor networks, vol. 2013, pp. 1-2, Hindawi Publishing Corporation, Philadelphia, Pa. [C4]
ERA journal ID: 3489 – Scopus EID: 2-s2.0-84887458287
DRO entry for this publication

Peng, Yonghong*, Shi, Riyi* and Xiang, Yong (2013) Introduction to the special issue on Recent advance in signal processing, biomedical engineering and informatics, Computers and electrical engineering, vol. 39, no. 5, pp. 1461-1463, Elsevier, Amsterdam, The Netherlands [C4]
ERA journal ID: 4403 – Scopus EID: 2-s2.0-84879810742
DRO entry for this publication

Wang, Guojun*, Zhou, Wanlei and Yang, Laurence T.* (2013) Trust, security and privacy for pervasive applications, Journal of supercomputing, vol. 64, no. 3, pp. 661-663, Springer, Berlin, Germany [C4]
ERA journal ID: 18042 – Scopus EID: 2-s2.0-84876392349
DRO entry for this publication

Xiang, Yang, Cuzzocrea, Alfredo*, Hobbs, Michael and Yang, Laurence T.* (2013) EDITORIAL : Advances in parallel, distributed, embedded, and ubiquitous systems, Concurrency computation practice and experience, vol. 25, no. 14, pp. 1985-1986, John Wiley & Sons, London, England [C4]
ERA journal ID: 17819 – Scopus EID: 2-s2.0-84874702565
DRO entry for this publication

Alam, Md Jahangir* and Chowdhury, Morshed (2013) Detection of fingertips based on the combination of color information and circle detection, in Unknown (ed.), ICIIS 2013 : Proceedings of the 8th IEEE International Conference on Industrial and Information Systems, pp. 572-576, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Bangay, Shaun and Makin, Owen (2013) Modelling attribute dependencies in single unit game combat settings, in Unknown (ed.), IGIC 2013 : Proceedings of the 5th International IEEE Consumer Electronic Society Games Innovation Conference, pp. 20-26, IEEE, New York, NY [E1]
DRO entry for this publication

Beliakov, Gleb, James, Simon and Calvo, Tomasa* (2013) Aggregating fuzzy implications to measure group consensus, in Unknown (ed.), IFSA/NAFIPS 2013 : Proceedings of the 9th Joint IFSA World Congress and NAFIPS Annual Meeting, pp. 1016-1021, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Beliakov, Gleb, James, Simon and Radko, Mesiar* (2013) A generalization of the Bonferroni mean based on partitions, in Unknown (ed.), FUZZ-IEEE 2013 : Proceedings of the IEEE International Conference on Fuzzy Systems, IEEE Computational Intelligence Society, Piscataway, N.J. [E1]
DRO entry for this publication

Beliakov, Gleb, Bustince, Humberto*, Fernandez, Javier*, Mesiar, Radko* and Pradera, Ana* (2013) On the use of restricted dissimilarity and dissimilarity-like functions for defining penalty functions, in Pasi, Gabriella; Montero, Javier and Ciucci, Davide (eds), EUSFLAT 2013 : Proceedings of the 8th Conference of the European Society for Fuzzy Logic and Technology 2013, pp. 1-6, Atlantis Press, Amsterdam, The Netherlands [E1]
DRO entry for this publication

Beliakov, G., Bustince, H.*, Fernandez, J.*, Mesiar, R.* and Pradera, A.* (2013) On the use of restricted dissimilarity and dissimilarity-like functions for defining penalty functions, in Pasi, Gabriella; Montero, Javier and Ciucci, Davide (eds), EUSFLAT 2013 : Advances in Intelligent Systems Research : Proceedings of the 8th Conference of the European Society for Fuzzy Logic and Technology, pp. 620-625, Atlantis Press, Amsterdam, The Netherlands [E1]
DRO entry for this publication

Beliakov, Gleb, James, Simon and Nimmo, Dale (2013) Learning aggregation weights from 3-tuple comparison sets, in Unknown (ed.), IFSA/NAFIPS 2013 : Proceedings of the 9th Joint IFSA World Congress and NAFIPS Annual Meeting, pp. 1388-1393, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Craig, Annemieke, Coldwell-Neilson, Jo and Beekhuyzen, Jenine (2013) Are IT interventions for girls a special case?, in Unknown (ed.), SIGCSE 2013 : Proceedings of the ACM Special Interest Group on Computer Science Education 2013 technical symposium, pp. 451-456, ACM - Association for Computing Machinery, New York, N.Y. [E1]
DRO entry for this publication

Dewan, Jahangir, Chowdhury, Morshed and Batten, Lynn (2013) eLearning content authentication using bipartite matching, in Unknown (ed.), SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 51-55, IEEE Computer Society Conference Publishing Services (CPS), Piscataway, N. J. [E1]
DRO entry for this publication

Gao, Longxiang, Li, Ming, Zhou, Wanlei and Shi, Wen* (2013) Anonymous data forwarding in human associated delay tolerant networks, in Unknown (ed.), ICDCSW 2013 : Proceedings of the 33rd IEEE International Conference on Distributed Computing Systems, pp. 17-21, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Gorbacheva, Elena*, Beekhuyzen, Jenine, Craig, Annemieke and Coldwell-Nielson, Jo (2013) ICT Interventions for Schoolgirls Do Matter! Understanding the Factors Influencing ICT Career Intentions through Partial Least Squares Analysis., in Unknown (ed.), Proceedings of the 24th Australasian Conference on Information Systems, pp. 1-10, RMIT University, Melbourne, Vic. [E1]
DRO entry for this publication

Iqbal, Sohail, Chowdhury, Morshed U. and Harsh, Om Kumar* (2013) Mobile devices supported learning for novice programmers, in Unknown (ed.), ICEEE 2013 : Proceedings of the 2nd International Conference on e-Learning and e-Technologies, pp. 277-282, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Khaddage, Ferial and Knezek, Gerald* (2013) iLearn via mobile technology: a comparison of mobile learning attitudes among university students in two nations, in Chen, Nian-Shing; Huang, Ronghuai; Kinshuk; Li, Yanyan and Sampson, Demetrios G. (eds), ICALT 2013 : Proceedings of the IEEE Advanced Learning Technologies 2013 International Conference, pp. 256-258, IEEE, Piscataway, New Jersey [E1]
DRO entry for this publication

Khaddage, Ferial, Knezek, Gerald* and Rosen, Dina* (2013) The teacher education evolution : the shift from online to mobile learning in curriculum, assessment and delivery, in McBride, Ron and Searson, Michael (eds), SITE 2013 : Proceedings of Society for Information Technology & Teacher Education 2013 international conference, pp. 3936-3942, Association for the Advancement of Computing in Education (AACE), Chesapeake, Va. [E1]
DRO entry for this publication

Khaddage, Ferial and Knezek, Gerald* (2013) Introducing a mobile learning attitude scale for higher education, in Reynold, Nicholas and Webb, Mary (eds), WCCE 2013 : Learning while we are connected : Proceedings of the IFIP Computers in Education 2013 World Conference, pp. 226-235, Nicolaus Copernicus University Press, Torun, Italy [E1]
DRO entry for this publication

Khaddage, Ferial and Latteman, Christoph* (2013) iTeach we learn via mobile apps : "a case study in a business course", in McBride, Ron and Searson, Michael (eds), SITE 2013 : Proceedings of Society for Information Technology & Teacher Education international conference, pp. 3225-3233, Association for the Advancement of Computing in Education (AACE), Chesapeake, Va. [E1]
DRO entry for this publication

Khaddage, Ferial, Shonfeld, Miri*, Yildiz, Melda N.*, Latteman, Christoph*, Reed, Adalheidur* and Bray, Eric* (2013) Is this an ipad revolution or mobile learning revolution? A global perspective across countries : " iWorld, iLearn", in McBride, Ron and Searson, Michael (eds), SITE 2013 : Proceedings of Society for Information Technology & Teacher Education international conference, pp. 3505-3513, Association for the Advancement of Computing in Education (AACE), Chesapeake, Va. [E1]
DRO entry for this publication

Khaddage, Ferial and Reed, Adalheidur* (2013) Community-based learning (CBL) via facebook mobile “it is time to BYOD (bring your own device), in McBride, Ron and Searson, Michael (eds), SITE 2013 : Proceedings of Society for Information Technology & Teacher Education International Conference, pp. 3220-3224, Association for the Advancement of Computing in Education (AACE), Chesapeake, VA [E1]
DRO entry for this publication

Khaddage, Ferial (2013) The ipad global embrace! Are we branding mobile learning?, in McBride, Ron and Searson, Michael (eds), SITE 2013 : Proceedings of Society for Information Technology & Teacher Education 2013 international conference, pp. 3234-3240, Association for the Advancement of Computing in Education (AACE), Chesapeake, Va. [E1]
DRO entry for this publication

Kipli, Kuryati, Kouzani, Abbas and Xiang, Yong (2013) An empirical comparison of classification algorithms for diagnosis of depression from brain sMRI scans, in Unknown (ed.), Proceedings of the 2nd International Conference on Advanced Computer Science Applications and Technologies; ACSAT 2013, pp. 1-4, The Conference, Sarawak, Malaysia [E1]
DRO entry for this publication

Knight, Owen, Wilkin, Tim and Bangay, Shaun (2013) Emergent effects in massive agent swarms in real-time game environments, in Unknown (ed.), IGIC 2013 : Proceedings of the 5th International IEEE Consumer Electronic Society Games Innovation Conference, pp. 114-118, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Makin, Owen and Bangay, Shaun (2013) Establishing Competitive Domination Cycles for Peer-to-peer Game Combat, in Gershon, Nahum (eds), Proceedings of the 5th International IEEE Consumer Electronic Society Games Innovation Conference; IGIC 2013, pp. 1-5, IEEE, New York, NY [E1]
DRO entry for this publication

Moonsamy, Veelasha, Batten, Lynn and Shore, Malcolm* (2013) Can smartphone users turn off tracking service settings?, in Mayrhofer, Rene; Chen, Luke; Steinbauer, Matthias; Kotsis, Gabriele and Khalil, Ismail (eds), MoMM 2013 : Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, pp. 455-463, Association for Computing Machinery, Vienna, Austria [E1]
DRO entry for this publication

Nasierding, Gulisong* and Sajjanhar, Atul (2013) Multi-label classification with clustering for image and text categorization, in Unknown (ed.), Proceedings of the 6th International Congress on Image and Signal Processing; CISP 2013, pp. 869-874, IEEE, Piscataway, NJ [E1]
DRO entry for this publication

Natgunanathan, Iynkaran, Xiang, Yong, Elbadry, Suzan S.M., Zhou, Wanlei and Xiang, Yang (2013) Analysis of a patchwork-based audio watermarking scheme, in Unknown (ed.), ICIEA 2013 : Proceedings of the 8th IEEE Conference on Industrial Electronics and Applications, pp. 900-905, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Olabelurin, Abimbola*, Kallos, Georgios*, Xiang, Yang, Bloomfield, Robin*, Veluru, Suresh* and Rajarajan, Muttukrishnan* (2013) Time correlated anomaly detection based on inferences, in Kuusisto, Rauno and Kurkinen, Erkki (eds), ECIWS 2013 : Proceedings of the European Conference on Information Warfare and Security, pp. 351-360, Academic Conference and Publishing International Limited, Jyvaskyla, Finland [E1]
DRO entry for this publication

Pan, Lei and Zhou, Yan (2013) Developing an empirical algorithm for protecting text-based CAPTCHAs against segmentation attacks, in Unknown (ed.), TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1-8, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Ray, Biplob R.*, Chowdhury, Morshed and Abawajy, Jemal (2013) Critical analysis and comparative study of security for networked RFID systems, in Unknown (ed.), SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computin, pp. 197-202, IEEE Computer Society Conference Publishing Services, Piscataway, N. J [E1]
DRO entry for this publication

Ren, Yongli, Li, Gang, Zhang, Jun and Zhou, Wanlei (2013) AdaM : adaptive-maximum imputation for neighborhood-based collaborative filtering, in Ozyer, Tansel; Carrington, Peter and Lim, Ee-Peng (eds), ASONAM 2013 : Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 628-635, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Tian, Biming*, Merrick, Kathryn*, Yu, Shui and Hu, Jiankun* (2013) A hierarchical PCA-based anomaly detection model, in Unknown (ed.), ICNC 2013 : International Conference on Computing, Networking and Communications, pp. 621-625, IEEE Computer Society, Piscataway, N.J. [E1]
DRO entry for this publication

Trojahn, Matthias*, Pan, Lei and Schmidt, Fabian* (2013) Developing a Cloud Computing Based Approach for Forensic Analysis Using OCR, in Unknown (ed.), IMF 2013 : Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, pp. 59-68, IEEE, Piscataway, N. J [E1]
DRO entry for this publication

Wang, Yu, Xiang, Yang and Zhang, Jun (2013) Network traffic clustering using random forest proximities, in Kim, Dong-In and Mueller, Peter (eds), ICC 2013 : IEEE International Conference on Communications, pp. 2058-2062, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Wilkin, Tim (2013) Image reduction operators based on non-monotonic averaging functions, in Unknown (ed.), FUZZ-IEEE 2013 : Proceedings of the IEEE International Conference on Fuzzy Systems, IEEE Computational Intelligence Society, Piscataway, N.J. [E1]
DRO entry for this publication

Yu, Shui, Doss, Robin, Zhou, Wanlei and Guo, Song* (2013) A general cloud firewall framework with dynamic resource allocation, in Kim, Dong-In and Mueller, Peter (eds), Proceedings of the IEEE International Conference on Communications; ICC 2013, pp. 1941-1945, IEEE, Piscataway, NJ [E1]
DRO entry for this publication

Zeng, Deze*, Guo, Song*, Stojmenovic, Ivan* and Yu, Shui (2013) Stochastic modeling and analysis of opportunistic computing in intermittent mobile cloud, in Unknown (ed.), ICIEA 2013 : Proceedings of the 8th IEEE Conference on Industrial Electronics and Applications, pp. 1902-1907, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Zhang, Jun, Chen, Chao, Xiang, Yang and Zhou, Wanlei (2013) Robust network traffic identification with unknown applications, in Unknown (ed.), Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security; ASIA CCS 2013, pp. 405-414, ACM - The Association for Computing Machinery, New York, N.Y. [E1]
DRO entry for this publication

Zhang, Yuexin*, Xu, Li*, Xiang, Yang and Huang, Xinyi* (2013) Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge, in Kim, Dong-In and Mueller, Peter (eds), ICC 2013 : IEEE International Conference on Communications, pp. 1604-1608, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Zhu, Tianqing, Li, Gang, Ren, Yongli, Zhou, Wanlei and Xiong, Ping* (2013) Differential privacy for neighborhood-based collaborative filtering, in Ozyer, Tansel; Carrington, Peter and Lim, Ee-Peng (eds), ASONAM 2013 : Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 752-759, IEEE, Piscataway, NJ, USA [E1]
DRO entry for this publication

Zong, Tianrui, Xiang, Yong, Elbadry, Suzan and Nahavandi, Saeid (2013) A modified moment-based image watermarking method robust to cropping attack, in Unknown (ed.), ICIEA 2013 : Proceedings of the 8th IEEE Conference on Industrial Electronics and Applications, pp. 881-885, IEEE, Piscataway, N.J. [E1]
DRO entry for this publication

Tissera, Menik, Doss, Robin, Li, Gang and Batten, Lynn (2013) Information discovery in multidimensional wireless sensor networks, in Unknown (ed.), ICOIN 2013 : Proceedings of the 27th International Conference on Information Networking, pp. 54-59, IEEE, Piscataway, N.J. [E1.1]
DRO entry for this publication

Alajeely, Majeed, Ahmad, Asma'a and Doss, Robin (2013) Comparative study of routing protocols for opportunistic networks, in Unknown (ed.), ICST 2013 : Proceedings of the 7th International Conference on Sensing Technology, pp. 209-214, IEEE, Piscataway, N.J. [E2]
DRO entry for this publication

Alazab, Ammar, Abawajy, Jemal, Hobbs, Michael, Layton, Robert* and Khraisat, Ansam* (2013) Crime toolkits : the productisation of cybercrime, in Unknown (ed.), TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1626-1632, IEEE, Piscataway, N.J. [E2]
DRO entry for this publication

Alrubaiey, Baker, Chowdhury, Morshed and Sajjanhar, Atul (2013) Smart Interactive Advertising Board (SIAB), in Matsuo, Tokuro; Hashimoto, Kiyota and Hirokawa, Sachio (eds), IIAI AAI 2013 : Proceedings of the 2nd International Conference on Advanced Applied Informatics, pp. 312-317, IEEE Computer Society, Piscataway, N.J. [E2]
DRO entry for this publication

Copcic, Amra, McKenzie, Sophie and Hobbs, Michael (2013) Permadeath : a review of literature, in Unknown (ed.), IGIC 2013 : Proceedings of the 5th International IEEE Consumer Electronic Society Games Innovation Conference, pp. 40-47, IEEE, Piscataway, N.J. [E2]
DRO entry for this publication

Dewan, Jahangir and Chowdhury, Morshed (2013) A framework for mobile elearning (mlearning) with content security and authentication, in Matsuo, Tokuro; Hashimoto, Kiyota and Hirokawa, Sachio (eds), IIAI AAI 2013 : Proceedings of the 2nd International Conference on Advanced Applied Informatics, pp. 95-99, IEEE Computer Society, Piscataway, N.J. [E2]
DRO entry for this publication

Gao, Longxiang, Li, Ming, Zhou, Wanlei and Shi, Wen* (2013) Privacy protected data forwarding in human associated delay tolerant networks, in Unknown (ed.), TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 586-593, IEEE Computer Society, Piscataway, N.J. [E2]
DRO entry for this publication

Ghanavati, Sara, Abawajy, Jemal and Izadi, Davood (2013) A fuzzy technique to control congestion in WSN, in Unknown (ed.), IJCNN 2013 : Proceedings of the International Joint Conference on Neural Networks, pp. 1806-1810, IEEE, Piscataway, N.J. [E2]
DRO entry for this publication

Hamid, Isredza Rahmi A. and Abawajy, Jemal H. (2013) Profiling phishing email based on clustering approach, in Unknown (ed.), TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 628-635, IEEE Computer Society, Piscataway, N.J. [E2]
DRO entry for this publication

Izadi, Davood, Abawajy, Jemal and Ghanavati, Sara (2013) A new energy efficient cluster-head and backup selection scheme in WSN, in Unknown (ed.), IRI 2013 : Proceedings of the 14th IEEE International Conference on Information Reuse and Integration, pp. 408-415, IEEE, Piscataway, N.J. [E2]
DRO entry for this publication

Leao, Simone, Krezel, Adam and Ong, Kok-Leong (2013) 2Loud? Monitoring traffic noise with mobile phones, in Unknown (ed.), Liveable Cities 2013 : Making cities liveable - designing health cities and sustaibable communities : Proceedings of the 6th Making Cities Liveable Conference, pp. 172-187, AST Management, Nerang, Qld. [E2]
DRO entry for this publication

Li, Zhijie and Li, Ming (2013) A hierarchical cloud pricing system, in Unknown (ed.), SERVICES 2013 : Proceedings of the 2013 IEEE 9th World Congress on Services, pp. 403-411, IEEE Computer Society, Piscataway, N.J. [E2]
DRO entry for this publication

Meng, Yuxin*, Li, Wenjuan*, Kwok, Lam-For* and Xiang, Yang (2013) Towards designing privacy-preserving signature-based IDS as a service : a study and practice, in Xhafa, Fatos; Barolli, Leonard and Chen, Xiaofeng (eds), INCOS 2013 : Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 181-188, IEEE Computer Society, Piscataway, N.J. [E2]
DRO entry for this publication

Ninggal, Mohd Izuan Hafez and Abawajy, Jemal (2013) Preserving utility in social network graph anonymization, in Unknown (ed.), TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 226-232, IEEE Computer Society, Piscataway, N.J. [E2]
DRO entry for this publication

Patterson, Nicholas, Hobbs, Michael and Palmer, Darren (2013) A direct insight into victims of cybercrime, in Unknown (ed.), TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 603-610, IEEE Computer Society, Piscataway, N.J. [E2]
DRO entry for this publication

Peng, Sancheng*, Wang, Guojun* and Yu, Shui (2013) Modeling malware propagation in smartphone social networks, in Unknown (ed.), TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 196-201, IEEE Computer Society, Piscataway, N.J. [E2]
DRO entry for this publication

Sundaresan, Saravanan, Doss, Robin and Zhou, Wanlei (2013) Offline grouping proof protocol for RFID systems, in Unknown (ed.), WiMob 2013 2013 : Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 247-252, IEEE, Piscataway, N.J. [E2]
DRO entry for this publication

Tao, Yuan* and Yu, Shui (2013) DDoS attack detection at local area networks using information theoretical metrics, in Unknown (ed.), TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 233-240, IEEE Computer Society, Piscataway, N.J. [E2]
DRO entry for this publication

Tissera, Menik, Doss, Robin, Li, Gang and Batten, Lynn (2013) An adaptive approach to information discovery in multi-dimensional wireless sensor networks, in Unknown (ed.), ICST 2013 : Proceedings of the 7th International Conference on Sensing Technology, pp. 203-208, IEEE, Piscataway, N.J. [E2]
DRO entry for this publication

Toorchi, Niloofar*, Attari, Mahmoud Ahmadian*, Haghighi, Mohammad Sayad and Xiang, Yang (2013) A Markov model of safety message broadcasting for vehicular networks, in Unknown (ed.), WCNC 2013 : IEEE Wireless Communications and Networking Conference, pp. 1657-1662, IEEE, Piscataway, N.J. [E2]
DRO entry for this publication

Zhu, Tianqing, Xiong, Ping*, Xiang, Yang and Zhou, Wanlei (2013) An effective deferentially private data releasing algorithm for decision tree, in Unknown (ed.), TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 388-395, IEEE Computer Society, Piscataway, N.J. [E2]
DRO entry for this publication

Zhu, Tianqing, Li, Gang, Ren, Yongli, Zhou, Wanlei and Xiong, Ping* (2013) Privacy preserving for tagging recommender systems, in Raghavan, Vijay; Hu, Xiaolin; Liau, Churn-Jung and Treur, Jan (eds), WI-IAT 2013 : Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence, pp. 81-88, IEEE, Piscataway, N.J. [E2]
DRO entry for this publication

Huf, P.A. and Carminati, J. (2013) TensorPack : Maple software for tensor algebra, in Unknown (ed.), ACGRG 2013 : Proceedings of the 7th Australasian Conference on General Relativity and Gravitation, p. 1, The Conference, Singapore [E3]
DRO entry for this publication

Lai, Kwok-wing*, Khaddage, Ferial and Knezek, Gerald* (2013) Student technology experiences in formal and informal learning, in Reynold, Nicholas; Webb, Mary; Syslo, Maciej M. and Dagiene, Valentina (eds), WCCE 2013 : Learning while we are connected : Proceedings of the IFIP Computers in Education 2013 World Conference, p. 290, Nicolaus Copernicus University Press, Torun, Italy [E3]
DRO entry for this publication

Leao, Simone, Ong, Kok-Leong and Osman-Schlegel, Linda (2013) TMImap : an online database for historical impact of climate change on soil moisture and built environment, in Unknown (ed.), NCCARF 2013 : Proceedings of the Climate Adaptation knowledge+partnerships conference, p. 166, The Conference, Sydney, N.S.W. [E3]
DRO entry for this publication

McKenzie, Sophie, Coleman, Kathryn and Chakman, Sabrina (2013) Using ePortfolios to develop career objectives in games design and development at an Australia University, in Unknown (ed.), Proceedings of the ePortfolio Australian Workshop, p. 1, The Workshop, Canberra, ACT [E3]
DRO entry for this publication

Voogt, Joke*, Knezek, Gerald*, Albion, Peter*, Cox, Margaret*, Davis, Niki*, Eickelmann, Birgit*, Gibson, David*, Khaddage, Ferial, Lai, Kwok-Wing*, Mishra, Punya*, Niederhauser, Dale*, Raffaghelli, Juliana*, Twining, Peter* and Webb, Mary* (2013) Building a global community of policy-makers, researchers, and teachers to move education into the digital age, in Reynold, Nicholas; Webb, Mary; Syslo, Maciej M. and Dagiene, Valentina (eds), WCCE 2013: Learning while we are connected: Proceedings of the IFIP Computers in Education 2013 World Conference, p. 288, Nicolaus Copernicus University Press, Torun, Italy [E3]
DRO entry for this publication

Xiang, Yang (2013) Classifying network traffic in the big data era, in Xhafa, Fatos; Barolli, Leonard and Chen, Xiaofeng (eds), INCOS 2013 : Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems, p. xxxi, IEEE Computer Society, Piscataway, N.J. [E3]
DRO entry for this publication

Drahansky, Martin*, Abawajy, J.H., Xiao, Yang*, Orsag, Filip* and Khan, Muhammad Khurram* (2013) Advanced science and technology letters : advanced researches on security and assurance, in Drahansky, Martin; Abawajy, J.H.; Xiao, Yang; Orsag, Filip and Khan, Muhammad Khurram (eds), Science and Engineering Research Support Society, Cebu, Philippines [E4]
DRO entry for this publication

Grants and Consultancies

Grants with funding during 2013

Research Income - National Competitive Grants

Kloeden, P and Ivanov, A. Computer visualisation of chaotic delay equations, Australian Research Council Small Grant [T]

  • 1995: $9,684

Goscinski, A, Horan, P and Gerrity, G*. Performance studies of distributed operating systems based on the Rhodos system, Australian Research Council Large Grant [T]

  • 1995: $44,768

Ivanov, A. Perturbations of Difference Equations, Australian Research Council Large Grant [T]

  • 1998: $1,167
  • 1997: $48,000

Wang, L. Solving Combinatorial Optimisation Problems using Discrete Time Neural Networks, Australian Research Council Small Grant [T]

  • 1997: $19,414

Garner, B and Sunwoo, J*. An automated (concurrent) software audit for software development process, Australian Research Council SPIRT Grant [T]

  • 2000: $77,487
  • 1999: $151,165

Goscinski, A. Supporting PVM Programmers and Improving Performance of PVM Based Parallel Processing., Australian Research Council Small Grant [T]

  • 1998: $17,000

Goscinski, A and Silcock, J. The Management of Parallel Processes, Data and computational Resources for Applications Using distributed Shared Memory., Australian Research Council Small Grant [T]

  • 1999: $17,000

Yang, Y and Zhou, W. Coordination and Security Mechanisms for Computer-Mediated Teamwork Support in a Web-based Environment., Australian Research Council Small Grant [T]

  • 1998: $10,000

Yang, Y. Visual Programming support for Web-Based Teamwork Modelling., Australian Research Council Small Grant [T]

  • 1999: $10,000

Zhou, W. A Reactive system for Building Fault-Tolerant java Applications, Australian Research Council Small Grant [T]

  • 1998: $10,000

Zhou, W. Towards the Building of Reliable Web-Based Databases., Australian Research Council Small Grant [T]

  • 1999: $14,000

Webb, G. Machine-expert collaborative knowledge acquisition, Australian Research Council Large Grant [T]

  • 1996: $47,286
  • 1995: $46,934

Kloeden, P and Diamond, P*. Numerical Analysis of Dynamical Systems and the Computational Process as a Dynamical System, Australian Research Council Large Grant [T]

  • 1997: $71,280
  • 1996: $68,795
  • 1995: $65,000

Webb, G, Pazzani, M* and Zheng, Z*. Learning efficient accurate Bayesian classifiers from data, Australian Research Council Large Grant [T]

  • 2000: $56,971

Goscinski, A. The Improvement of Execution Performance of Parallel Applications and Utilisation of a Cluster of Workstations Using Global Scheduling, Australian Research Council Small Grant [T]

  • 2000: $16,300

Zhang, C. Coordinating Multi-Agent Systems for Business Process Management Based on Temporal Dependencies, Australian Research Council Small Grant [T]

  • 2000: $16,000

Zhou, W. Managing Replicated Transactions in Web-Based Applications to survive Network Partitioning Failures, Australian Research Council Small Grant [T]

  • 2000: $13,000

Webb, G. Learning efficient accurate Bayesian classifiers from data, Australian Research Council Large Grant [T]

  • 2002: $61,626
  • 2001: $60,281

Goscinski, A, Zhou, B and Brent, R. Job Scheduling Strategies for General-Purpose High Performance Computing Clusters, ARC - Discovery [T]

  • 2004: $70,033
  • 2003: $66,155
  • 2002: $62,322

Zou, L and Hu, E. Removal of Toxic Air Pollutants from car cabin by Photocatalytic Oxidation Reactor, Australian Research Council Linkage APAI [T]

  • 2005: $24,650

Chen, Y. Design and development of a Web-based Intelligent Multimedia Mining System, Australian Research Council Linkage Project [T]

  • 2005: $24,650
  • 2004: $48,260

Dawson, E*, Batten, L and Simpson, L*. Efficient and Secure Word-Based Stream Ciphers for Wireless Communications, Australian Research Council Discovery Project [T]

  • 2005: $16,666
  • 2004: $16,666

Chen, Y. Australian Centre for Genome-Phenome Bioinformatics, ARC Centre - Centres of Excellence [T]

  • 2009: $54,572
  • 2005: $96,122
  • 2004: $82,000

Chen, Y. Integrating Database Technologies and Visual Analysis, Australian Research Council, Project - Discovery - Projects [T]

  • 2004: $62,961

Chen, Y, Wong, L* and Li, J*. Development of Knowledge Discovery for High Dimensional Biomedical Data, Australian Research Council [T]

  • 2005: $7,147

Goscinski, A, Silcock, J, Hobbs, M and Dew, R. Self Discovery, Self Configuration and Self Healing of Enterprise Grids, Australian Research Council Discovery Project [T]

  • 2005: $82,701

Chen, Y. Exploiting Database Technologies for the Visualization and Analysis of Measured and Simulated Plant Structures in Bioinformatics, Australian Research Council Discovery Project [T]

  • 2005: $51,050

Zhou, S* and Mak, V. Channel Assignment in Cellular Communication Systems and Optical Networks, Australian Research Council Discovery Project [T]

  • 2005: $2,500

Wang, H* and Charnes, C. Private Information Retrieval, Australian Research Council Discovery Project [T]

  • 2005: $10,000

Zhou, W, Shi, W and Shi, W*. Protecting Web Services from Distributed Denial of Service Attacks, ARC Collaborative - Linkage - Projects (Round 2, APAI) [T]

  • 2009: $13,069
  • 2005: $12,325

Zhou, W. Development of methods to address internet crime, ARC Grant - Discovery Projects [T]

  • 2009: $78,568

Research Income - Other Public Sector Funding

Ivanov, A. Visiting fellowship for Professor Alexander Sharkovsky. [U]

  • 1997: $13,950

Hobbs, M. PhD Scholarship - Brendan McKenzie [U]

  • 2005: $8,931
  • 2004: $13,863
  • 2003: $13,500
  • 2002: $13,000

Warren, M. PhD Scholarship - Warren Brooks [U]

  • 2002: $13,000

Zhou, W. PhD Scholarship - Elicia Lanham [U]

  • 2005: $8,228
  • 2004: $13,863
  • 2003: $13,500
  • 2002: $13,000

Zhou, W. Local Government System [U]

  • 2005: $1,250
  • 2004: $7,500
  • 2003: $1,250

Goscinski, A. PhD Scholarship - Andrew Maloney [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Zhou, W. PhD Scholarship - John Casey [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Zhou, W. PhD Scholarship - Naomi Augar [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Batten, L, Doss, R and Palm, B*. Recovery Mechanisms for Wireless Sensor Devices [U]

  • 2009: $18,855

Research Income - Industry and Other Funding

Garner, B. Scholarship Income [V]

  • 2000: $20,000

Batten, L and Castleman, T. Supplier wide eBusiness engagement Project [V]

  • 2003: $25,000
  • 2002: $25,000

Rosenberg, J. BlueJ- The interactive environment [V]

  • 2003: $168,899

Chen, Y. Design and development of a Web-based Intelligent Multimedia Mining System [V]

  • 2004: $5,000
  • 2005: $5,000

Research Income - Industry and Other Funding - Australian

Zhou, W, Shi, W and Shi, W*. Protecting Web Services from Distributed Denial of Service Attacks [V.1]

  • 2005: $6,000

Beliakov, G. Reliable methods of data approximation and forecasting [V.1]

  • 2005: $21,000

Zhou, W and Shi, W. A novel computational approach for identifying transcription factor binding sites in gene promoters [V.1]

  • 2005: $23,000

Chen, Y. Development of data mining tools for the prediction of genomic linked clinical outcomes in a genetic disease state Cystic Fibrosis [V.1]

  • 2005: $18,000

Research Income - Industry and Other Funding - International B (Other Income)

Rosenberg, J. BlueJ- The interactive environment [V.3]

  • 2007: $215,655

Higher Degree by Research Completions

No completions found or audited.

Legend:
* Not a member of Deakin University at time of output.

DRO to publications collection last synchronised: Friday 18th April 2014 10:04pm

Deakin University acknowledges the traditional land owners of present campus sites.

8th November 2010