QUT ePrints

Browse By Person: Corney, Malcolm

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 25.

Book Chapter

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2002) E-Mail authorship attribution for computer forensics. In Barbara, Daniel & Jajodia, Sushil (Eds.) Applications of Data Mining in Computer Security. Kluwer Academic Publishers/Springer, Boston.

Journal Article

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2010) Transaction mining for fraud detection in ERP Systems. Industrial Engineering and Management Systems, 9(2), pp. 141-156.
Number of full-text downloads 464

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George (2001) Mining e-mail content for author identification forensics. ACM SIGMOD Record - Web Edition, 30(4).
Number of full-text downloads 2,260
Number of citations in Scopus 127
Number of citations in Web of Science® 62

Corney, Malcolm W., Anderson, Alison M., Mohay, George M., & de Vel, Olivier (2001) Identifying the Authors of Suspect Email. .
Number of full-text downloads 1,058

Corney, Malcolm W. & Bell, Peter (1988) Retention and degradation of organics in Rundle waste shale/retort water mixtures. Fuel, 67(10), pp. 1378-1381.
Number of citations in Scopus 1
Number of citations in Web of Science® 2

Conference Paper

Corney, Malcolm W., Fitzgerald, Sue, Hanks, Brian, Lister, Raymond, McCauley, Renée, & Murphy, Laurie (2014) 'Explain in plain English' questions revisited : data structures problems. In SIGCSE '14 Proceedings of the 45th ACM Technical Symposium on Computer Science Education, ACM, Hyatt Regency, Atlanta, GA, pp. 591-596.

Sheard, Judy, Simon,, Carbone, Angela, Chinn, Donald, Clear, Tony, Corney, Malcolm W., et al. (2013) How difficult are exams? A framework for assessing the complexity of introductory programming exams. In Carbone, Angela & Whalley, Jacqueline (Eds.) Proceedings of the 15th Australasian Computing Education Conference, ACS, Adelaide, SA.
Number of full-text downloads 136

Teague, Donna M., Corney, Malcolm W., Ahadi, Alireza, & Lister, Raymond (2013) A qualitative think aloud study of the early Neo-Piagetian stages of reasoning in novice programmers. In Carbone, Angela & Whalley, Jacqueline (Eds.) Proceedings of 15th Australasian Computing Education Conference, ACS, Adelaide, SA.
Number of full-text downloads 87

Teague, Donna M., Corney, Malcolm W., Fidge, Colin J., Roggenkamp, Michael G., Ahadi, Alireza, & Lister, Raymond (2012) Using neo-Piagetian theory, formative in-Class tests and think alouds to better understand student thinking : a preliminary report on computer programming. In Proceedings of 2012 Australasian Association for Engineering Education (AAEE) Annual Conference, Melbourne, Vic.
Number of full-text downloads 49

Lister, Raymond, Corney, Malcolm W., Curran, James, D'Souza, Daryl, Fidge, Colin J., Gluga, Richard, et al. (2012) Toward a shared understanding of competency in programming : an invitation to the BABELnot Project. In de Raadt, Michael & Carbone, Angela (Eds.) Proceedings of the 14th Australasian Computing Education Conference (ACE2012), Australian Computer Society, RMIT University, Melbourne. (In Press)
Number of full-text downloads 159

Corney, Malcolm W., Teague, Donna M., Ahadi, Alireza, & Lister, Raymond (2012) Some empirical results for neo-Piagetian reasoning in novice programmers and the relationship to code explanation questions. In de Raadt, Michael & Carbone, Angela (Eds.) Proceedings of Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society Inc, RMIT University, Melbourne, VIC. (In Press)
Number of full-text downloads 135

Teague, Donna M., Corney, Malcolm W., Ahadi, Alireza, & Lister, Raymond (2012) Swapping as the "Hello World" of relational reasoning : replications, reflections and extensions. In de Raadt, Michael & Carbone, Angela (Eds.) Proceedings of Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., RMIT University, Melbourne, VIC. (In Press)
Number of full-text downloads 45

Teague, Donna M. & Corney, Malcolm W. (2011) Is anybody there? Bootstrapping attendance with engagement. In Williams, G., Statham, P., Brown, N., & Cleland, B. (Eds.) Ascilite 2011 : Changing Demands, Changing Directions, 4-7 December 2011, Wrest Point, Hobart, TAS.
Number of full-text downloads 41

Islam, Aminul, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Raub, Tobias, et al. (2011) Detecting collusive fraud in enterprise resource planning systems. In Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361], Springer, Orlando, Florida, USA, pp. 143-153.
Number of full-text downloads 204

Corney, Malcolm W., Lister, Raymond, & Teague, Donna M. (2011) Early relational reasoning and the novice programmer : swapping as the “hello world” of relational reasoning. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 95-104.
Number of full-text downloads 193

Corney, Malcolm W., Mohay, George M., & Clark, Andrew J. (2011) Detection of anomalies from user profiles generated from system logs. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 23-32.
Number of full-text downloads 305

Islam, Asadul Khandoker, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Tobias, Raub, et al. (2010) Fraud detection in ERP systems using scenario matching. In Security and Privacy : Silver Linings in the Cloud : Proceedings of International Information Security Conference (SEC 2010), Springer, Brisbane Convention & Exhibition Centre, Brisbane, Queensland, pp. 112-123.
Number of full-text downloads 313

Corney, Malcolm W., Teague, Donna M., & Thomas, Richard N. (2010) Engaging students in programming. In Conferences in Research and Practice in Information Technology, Vol. 103. Tony Clear and John Hamer, Eds., Australian Computer Society, Inc., Brisbane, pp. 63-72.
Number of full-text downloads 426
Number of citations in Scopus 1

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2009) A role mining inspired approach to representing user behaviour in ERP systems. In Oyabu, Takashi & Gen, Mitsuo (Eds.) Proceedings of The 10th Asia Pacific Industrial Engineering and Management Systems Conference, The Korean Institute of Industrial Engineers, Kitakyushu International Conference Center, Kitakyushu, pp. 2541-2552.
Number of full-text downloads 309

Corney, Malcolm W., de Vel, Olivier, Anderson, Alison M., & Mohay, George M. (2002) Gender-preferential Text Mining of E-mail Discourse. In 18th Annual Computer Security Applications Conference, December 9-13, 2002, Las Vegas, NV, USA.
Number of full-text downloads 366
Number of citations in Web of Science® 3

de Vel, Olivier Y., Corney, Malcolm W., Anderson, Alison M., & Mohay, George M. (2002) Language and gender author cohort analysis of e-mail for computer forensics. In Digital Forensics Research Workshop, 6-8 August, Syracuse, NY, USA.
Number of full-text downloads 442

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2001) Multi-Topic E-mail Authorship Attribution Forensics. In ACM COnference on Computer Security - Workshop on Data Mining for Security Applications, November 8, 2001, Philadelphia, PA, USA.
Number of full-text downloads 264

Conference Item

Corney, Malcolm W. (2009) Designing for engagement : building IT systems. In ALTC First Year Experience Curriculum Design Symposium 2009, 5-6 February 2009, Queensland University of Technology, Brisbane.
Number of full-text downloads 67

QUT Thesis

Corney, Malcolm W. (2003) Analysing e-mail text authorship for forensic purposes. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 785

Other

Flegel, Ulrich, Bracher, Shane, Hochwarth, Pascal, Resch, Hermann, Sala, Paola, Wollny, Stephan, et al. (2012) Detecting anomalous user activity.
Number of full-text downloads 22

This list was generated on Sat Apr 19 10:06:41 2014 EST.