Browse By Person: Corney, Malcolm

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 25.

Book Chapter

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2002) E-Mail authorship attribution for computer forensics. In Barbara, Daniel & Jajodia, Sushil (Eds.) Applications of Data Mining in Computer Security. Kluwer Academic Publishers/Springer, Boston.

Journal Article

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2010) Transaction mining for fraud detection in ERP Systems. Industrial Engineering and Management Systems, 9(2), pp. 141-156.
Number of full-text downloads 544

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George (2001) Mining e-mail content for author identification forensics. ACM SIGMOD Record - Web Edition, 30(4).
Number of full-text downloads 3,397
Number of citations in Scopus 162
Number of citations in Web of Science® 72

Corney, Malcolm W. & Bell, Peter (1988) Retention and degradation of organics in Rundle waste shale/retort water mixtures. Fuel, 67(10), pp. 1378-1381.
Number of citations in Scopus 2
Number of citations in Web of Science® 2

Conference Paper

Corney, Malcolm W., Fitzgerald, Sue, Hanks, Brian, Lister, Raymond, McCauley, Renée, & Murphy, Laurie (2014) 'Explain in plain English' questions revisited : data structures problems. In SIGCSE '14 Proceedings of the 45th ACM Technical Symposium on Computer Science Education, ACM, Hyatt Regency, Atlanta, GA, pp. 591-596.
Number of full-text downloads 9

Sheard, Judy, Simon, , Carbone, Angela, Chinn, Donald, Clear, Tony, Corney, Malcolm W., et al. (2013) How difficult are exams? A framework for assessing the complexity of introductory programming exams. In Carbone, Angela & Whalley, Jacqueline (Eds.) Proceedings of the 15th Australasian Computing Education Conference, ACS, Adelaide, SA.
Number of full-text downloads 229

Teague, Donna M., Corney, Malcolm W., Ahadi, Alireza, & Lister, Raymond (2013) A qualitative think aloud study of the early Neo-Piagetian stages of reasoning in novice programmers. In Carbone, Angela & Whalley, Jacqueline (Eds.) Proceedings of 15th Australasian Computing Education Conference, ACS, Adelaide, SA.
Number of full-text downloads 134

Teague, Donna M., Corney, Malcolm W., Fidge, Colin J., Roggenkamp, Michael G., Ahadi, Alireza, & Lister, Raymond (2012) Using neo-Piagetian theory, formative in-Class tests and think alouds to better understand student thinking : a preliminary report on computer programming. In Proceedings of 2012 Australasian Association for Engineering Education (AAEE) Annual Conference, Melbourne, Vic.
Number of full-text downloads 61

Lister, Raymond, Corney, Malcolm W., Curran, James, D'Souza, Daryl, Fidge, Colin J., Gluga, Richard, et al. (2012) Toward a shared understanding of competency in programming : an invitation to the BABELnot Project. In de Raadt, Michael & Carbone, Angela (Eds.) Proceedings of the 14th Australasian Computing Education Conference (ACE2012), Australian Computer Society, RMIT University, Melbourne.
Number of full-text downloads 195

Corney, Malcolm W., Teague, Donna M., Ahadi, Alireza, & Lister, Raymond (2012) Some empirical results for neo-Piagetian reasoning in novice programmers and the relationship to code explanation questions. In de Raadt, Michael & Carbone, Angela (Eds.) Proceedings of Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society Inc, RMIT University, Melbourne, VIC.
Number of full-text downloads 180

Teague, Donna M., Corney, Malcolm W., Ahadi, Alireza, & Lister, Raymond (2012) Swapping as the "Hello World" of relational reasoning : replications, reflections and extensions. In de Raadt, Michael & Carbone, Angela (Eds.) Proceedings of Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., RMIT University, Melbourne, VIC.
Number of full-text downloads 70

Teague, Donna M. & Corney, Malcolm W. (2011) Is anybody there? Bootstrapping attendance with engagement. In Williams, G., Statham, P., Brown, N., & Cleland, B. (Eds.) Ascilite 2011 : Changing Demands, Changing Directions, 4-7 December 2011, Wrest Point, Hobart, TAS.
Number of full-text downloads 60

Islam, Aminul, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Raub, Tobias, et al. (2011) Detecting collusive fraud in enterprise resource planning systems. In Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361], Springer, Orlando, Florida, USA, pp. 143-153.
Number of full-text downloads 273

Corney, Malcolm W., Lister, Raymond, & Teague, Donna M. (2011) Early relational reasoning and the novice programmer : swapping as the “hello world” of relational reasoning. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 95-104.
Number of full-text downloads 292

Corney, Malcolm W., Mohay, George M., & Clark, Andrew J. (2011) Detection of anomalies from user profiles generated from system logs. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 23-32.
Number of full-text downloads 687

Islam, Asadul Khandoker, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Tobias, Raub, et al. (2010) Fraud detection in ERP systems using scenario matching. In Security and Privacy : Silver Linings in the Cloud : Proceedings of International Information Security Conference (SEC 2010), Springer, Brisbane Convention & Exhibition Centre, Brisbane, Queensland, pp. 112-123.
Number of full-text downloads 384

Corney, Malcolm W., Teague, Donna M., & Thomas, Richard N. (2010) Engaging students in programming. In Conferences in Research and Practice in Information Technology, Vol. 103. Tony Clear and John Hamer, Eds., Australian Computer Society, Inc., Brisbane, pp. 63-72.
Number of full-text downloads 529
Number of citations in Scopus 1

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2009) A role mining inspired approach to representing user behaviour in ERP systems. In Oyabu, Takashi & Gen, Mitsuo (Eds.) Proceedings of The 10th Asia Pacific Industrial Engineering and Management Systems Conference, The Korean Institute of Industrial Engineers, Kitakyushu International Conference Center, Kitakyushu, pp. 2541-2552.
Number of full-text downloads 364

Corney, Malcolm W., de Vel, Olivier, Anderson, Alison M., & Mohay, George M. (2002) Gender-preferential Text Mining of E-mail Discourse. In 18th Annual Computer Security Applications Conference, December 9-13, 2002, Las Vegas, NV, USA.
Number of full-text downloads 444
Number of citations in Web of Science® 3

de Vel, Olivier Y., Corney, Malcolm W., Anderson, Alison M., & Mohay, George M. (2002) Language and gender author cohort analysis of e-mail for computer forensics. In Digital Forensics Research Workshop, 6-8 August, Syracuse, NY, USA.
Number of full-text downloads 591

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2001) Multi-Topic E-mail Authorship Attribution Forensics. In ACM COnference on Computer Security - Workshop on Data Mining for Security Applications, November 8, 2001, Philadelphia, PA, USA.
Number of full-text downloads 297

Conference Item

Corney, Malcolm W. (2009) Designing for engagement : building IT systems. In ALTC First Year Experience Curriculum Design Symposium 2009, 5-6 February 2009, Queensland University of Technology, Brisbane.
Number of full-text downloads 79

QUT Thesis

Corney, Malcolm W. (2003) Analysing e-mail text authorship for forensic purposes. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 895

Working Paper

Corney, Malcolm W., Anderson, Alison M., Mohay, George M., & de Vel, Olivier (2001) Identifying the authors of suspect email. [Working Paper] (Unpublished)
Number of full-text downloads 1,152

Other

Flegel, Ulrich, Bracher, Shane, Hochwarth, Pascal, Resch, Hermann, Sala, Paola, Wollny, Stephan, et al. (2012) Detecting anomalous user activity.
Number of full-text downloads 36

This list was generated on Sat May 30 12:46:54 2015 AEST.