QUT ePrints

Browse By Person: Corney, Malcolm

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 25.

Book Chapter

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2002) E-Mail authorship attribution for computer forensics. In Barbara, Daniel & Jajodia, Sushil (Eds.) Applications of Data Mining in Computer Security. Kluwer Academic Publishers/Springer, Boston.

Journal Article

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2010) Transaction mining for fraud detection in ERP Systems. Industrial Engineering and Management Systems, 9(2), pp. 141-156.
Number of full-text downloads 488

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George (2001) Mining e-mail content for author identification forensics. ACM SIGMOD Record - Web Edition, 30(4).
Number of full-text downloads 2,503
Number of citations in Scopus 136
Number of citations in Web of Science® 66

Corney, Malcolm W., Anderson, Alison M., Mohay, George M., & de Vel, Olivier (2001) Identifying the Authors of Suspect Email. .
Number of full-text downloads 1,093

Corney, Malcolm W. & Bell, Peter (1988) Retention and degradation of organics in Rundle waste shale/retort water mixtures. Fuel, 67(10), pp. 1378-1381.
Number of citations in Scopus 1
Number of citations in Web of Science® 2

Conference Paper

Corney, Malcolm W., Fitzgerald, Sue, Hanks, Brian, Lister, Raymond, McCauley, Renée, & Murphy, Laurie (2014) 'Explain in plain English' questions revisited : data structures problems. In SIGCSE '14 Proceedings of the 45th ACM Technical Symposium on Computer Science Education, ACM, Hyatt Regency, Atlanta, GA, pp. 591-596.

Sheard, Judy, Simon,, Carbone, Angela, Chinn, Donald, Clear, Tony, Corney, Malcolm W., et al. (2013) How difficult are exams? A framework for assessing the complexity of introductory programming exams. In Carbone, Angela & Whalley, Jacqueline (Eds.) Proceedings of the 15th Australasian Computing Education Conference, ACS, Adelaide, SA.
Number of full-text downloads 166

Teague, Donna M., Corney, Malcolm W., Ahadi, Alireza, & Lister, Raymond (2013) A qualitative think aloud study of the early Neo-Piagetian stages of reasoning in novice programmers. In Carbone, Angela & Whalley, Jacqueline (Eds.) Proceedings of 15th Australasian Computing Education Conference, ACS, Adelaide, SA.
Number of full-text downloads 102

Teague, Donna M., Corney, Malcolm W., Fidge, Colin J., Roggenkamp, Michael G., Ahadi, Alireza, & Lister, Raymond (2012) Using neo-Piagetian theory, formative in-Class tests and think alouds to better understand student thinking : a preliminary report on computer programming. In Proceedings of 2012 Australasian Association for Engineering Education (AAEE) Annual Conference, Melbourne, Vic.
Number of full-text downloads 52

Lister, Raymond, Corney, Malcolm W., Curran, James, D'Souza, Daryl, Fidge, Colin J., Gluga, Richard, et al. (2012) Toward a shared understanding of competency in programming : an invitation to the BABELnot Project. In de Raadt, Michael & Carbone, Angela (Eds.) Proceedings of the 14th Australasian Computing Education Conference (ACE2012), Australian Computer Society, RMIT University, Melbourne. (In Press)
Number of full-text downloads 169

Corney, Malcolm W., Teague, Donna M., Ahadi, Alireza, & Lister, Raymond (2012) Some empirical results for neo-Piagetian reasoning in novice programmers and the relationship to code explanation questions. In de Raadt, Michael & Carbone, Angela (Eds.) Proceedings of Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society Inc, RMIT University, Melbourne, VIC. (In Press)
Number of full-text downloads 153

Teague, Donna M., Corney, Malcolm W., Ahadi, Alireza, & Lister, Raymond (2012) Swapping as the "Hello World" of relational reasoning : replications, reflections and extensions. In de Raadt, Michael & Carbone, Angela (Eds.) Proceedings of Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., RMIT University, Melbourne, VIC. (In Press)
Number of full-text downloads 53

Teague, Donna M. & Corney, Malcolm W. (2011) Is anybody there? Bootstrapping attendance with engagement. In Williams, G., Statham, P., Brown, N., & Cleland, B. (Eds.) Ascilite 2011 : Changing Demands, Changing Directions, 4-7 December 2011, Wrest Point, Hobart, TAS.
Number of full-text downloads 45

Islam, Aminul, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Raub, Tobias, et al. (2011) Detecting collusive fraud in enterprise resource planning systems. In Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361], Springer, Orlando, Florida, USA, pp. 143-153.
Number of full-text downloads 226

Corney, Malcolm W., Lister, Raymond, & Teague, Donna M. (2011) Early relational reasoning and the novice programmer : swapping as the “hello world” of relational reasoning. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 95-104.
Number of full-text downloads 226

Corney, Malcolm W., Mohay, George M., & Clark, Andrew J. (2011) Detection of anomalies from user profiles generated from system logs. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 23-32.
Number of full-text downloads 407

Islam, Asadul Khandoker, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Tobias, Raub, et al. (2010) Fraud detection in ERP systems using scenario matching. In Security and Privacy : Silver Linings in the Cloud : Proceedings of International Information Security Conference (SEC 2010), Springer, Brisbane Convention & Exhibition Centre, Brisbane, Queensland, pp. 112-123.
Number of full-text downloads 334

Corney, Malcolm W., Teague, Donna M., & Thomas, Richard N. (2010) Engaging students in programming. In Conferences in Research and Practice in Information Technology, Vol. 103. Tony Clear and John Hamer, Eds., Australian Computer Society, Inc., Brisbane, pp. 63-72.
Number of full-text downloads 454
Number of citations in Scopus 1

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2009) A role mining inspired approach to representing user behaviour in ERP systems. In Oyabu, Takashi & Gen, Mitsuo (Eds.) Proceedings of The 10th Asia Pacific Industrial Engineering and Management Systems Conference, The Korean Institute of Industrial Engineers, Kitakyushu International Conference Center, Kitakyushu, pp. 2541-2552.
Number of full-text downloads 332

Corney, Malcolm W., de Vel, Olivier, Anderson, Alison M., & Mohay, George M. (2002) Gender-preferential Text Mining of E-mail Discourse. In 18th Annual Computer Security Applications Conference, December 9-13, 2002, Las Vegas, NV, USA.
Number of full-text downloads 387
Number of citations in Web of Science® 3

de Vel, Olivier Y., Corney, Malcolm W., Anderson, Alison M., & Mohay, George M. (2002) Language and gender author cohort analysis of e-mail for computer forensics. In Digital Forensics Research Workshop, 6-8 August, Syracuse, NY, USA.
Number of full-text downloads 524

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2001) Multi-Topic E-mail Authorship Attribution Forensics. In ACM COnference on Computer Security - Workshop on Data Mining for Security Applications, November 8, 2001, Philadelphia, PA, USA.
Number of full-text downloads 273

Conference Item

Corney, Malcolm W. (2009) Designing for engagement : building IT systems. In ALTC First Year Experience Curriculum Design Symposium 2009, 5-6 February 2009, Queensland University of Technology, Brisbane.
Number of full-text downloads 71

QUT Thesis

Corney, Malcolm W. (2003) Analysing e-mail text authorship for forensic purposes. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 821

Other

Flegel, Ulrich, Bracher, Shane, Hochwarth, Pascal, Resch, Hermann, Sala, Paola, Wollny, Stephan, et al. (2012) Detecting anomalous user activity.
Number of full-text downloads 31

This list was generated on Sat Jul 26 08:09:05 2014 EST.