QUT ePrints

Browse By Person: Corney, Malcolm

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 25.

Book Chapter

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2002) E-Mail authorship attribution for computer forensics. In Barbara, Daniel & Jajodia, Sushil (Eds.) Applications of Data Mining in Computer Security. Kluwer Academic Publishers/Springer, Boston.

Journal Article

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2010) Transaction mining for fraud detection in ERP Systems. Industrial Engineering and Management Systems, 9(2), pp. 141-156.
Number of full-text downloads 498

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George (2001) Mining e-mail content for author identification forensics. ACM SIGMOD Record - Web Edition, 30(4).
Number of full-text downloads 2,588
Number of citations in Scopus 147
Number of citations in Web of Science® 67

Corney, Malcolm W., Anderson, Alison M., Mohay, George M., & de Vel, Olivier (2001) Identifying the Authors of Suspect Email. .
Number of full-text downloads 1,112

Corney, Malcolm W. & Bell, Peter (1988) Retention and degradation of organics in Rundle waste shale/retort water mixtures. Fuel, 67(10), pp. 1378-1381.
Number of citations in Scopus 1
Number of citations in Web of Science® 2

Conference Paper

Corney, Malcolm W., Fitzgerald, Sue, Hanks, Brian, Lister, Raymond, McCauley, Renée, & Murphy, Laurie (2014) 'Explain in plain English' questions revisited : data structures problems. In SIGCSE '14 Proceedings of the 45th ACM Technical Symposium on Computer Science Education, ACM, Hyatt Regency, Atlanta, GA, pp. 591-596.

Sheard, Judy, Simon,, Carbone, Angela, Chinn, Donald, Clear, Tony, Corney, Malcolm W., et al. (2013) How difficult are exams? A framework for assessing the complexity of introductory programming exams. In Carbone, Angela & Whalley, Jacqueline (Eds.) Proceedings of the 15th Australasian Computing Education Conference, ACS, Adelaide, SA.
Number of full-text downloads 172

Teague, Donna M., Corney, Malcolm W., Ahadi, Alireza, & Lister, Raymond (2013) A qualitative think aloud study of the early Neo-Piagetian stages of reasoning in novice programmers. In Carbone, Angela & Whalley, Jacqueline (Eds.) Proceedings of 15th Australasian Computing Education Conference, ACS, Adelaide, SA.
Number of full-text downloads 106

Teague, Donna M., Corney, Malcolm W., Fidge, Colin J., Roggenkamp, Michael G., Ahadi, Alireza, & Lister, Raymond (2012) Using neo-Piagetian theory, formative in-Class tests and think alouds to better understand student thinking : a preliminary report on computer programming. In Proceedings of 2012 Australasian Association for Engineering Education (AAEE) Annual Conference, Melbourne, Vic.
Number of full-text downloads 53

Lister, Raymond, Corney, Malcolm W., Curran, James, D'Souza, Daryl, Fidge, Colin J., Gluga, Richard, et al. (2012) Toward a shared understanding of competency in programming : an invitation to the BABELnot Project. In de Raadt, Michael & Carbone, Angela (Eds.) Proceedings of the 14th Australasian Computing Education Conference (ACE2012), Australian Computer Society, RMIT University, Melbourne. (In Press)
Number of full-text downloads 172

Corney, Malcolm W., Teague, Donna M., Ahadi, Alireza, & Lister, Raymond (2012) Some empirical results for neo-Piagetian reasoning in novice programmers and the relationship to code explanation questions. In de Raadt, Michael & Carbone, Angela (Eds.) Proceedings of Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society Inc, RMIT University, Melbourne, VIC. (In Press)
Number of full-text downloads 158

Teague, Donna M., Corney, Malcolm W., Ahadi, Alireza, & Lister, Raymond (2012) Swapping as the "Hello World" of relational reasoning : replications, reflections and extensions. In de Raadt, Michael & Carbone, Angela (Eds.) Proceedings of Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., RMIT University, Melbourne, VIC. (In Press)
Number of full-text downloads 53

Teague, Donna M. & Corney, Malcolm W. (2011) Is anybody there? Bootstrapping attendance with engagement. In Williams, G., Statham, P., Brown, N., & Cleland, B. (Eds.) Ascilite 2011 : Changing Demands, Changing Directions, 4-7 December 2011, Wrest Point, Hobart, TAS.
Number of full-text downloads 46

Islam, Aminul, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Raub, Tobias, et al. (2011) Detecting collusive fraud in enterprise resource planning systems. In Advances in Digital Forensics VII : 7th IFIP WG 11.9 International Conference on Digital Forensics Revised Selected Papers [IFIP Advances in Information and Communication Technology, 2011, Volume 361], Springer, Orlando, Florida, USA, pp. 143-153.
Number of full-text downloads 231

Corney, Malcolm W., Lister, Raymond, & Teague, Donna M. (2011) Early relational reasoning and the novice programmer : swapping as the “hello world” of relational reasoning. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 95-104.
Number of full-text downloads 250

Corney, Malcolm W., Mohay, George M., & Clark, Andrew J. (2011) Detection of anomalies from user profiles generated from system logs. In Conferences in Research and Practice in Information Technology (CRPIT), Australian Computer Society, Inc., Curtin University, Perth, pp. 23-32.
Number of full-text downloads 443

Islam, Asadul Khandoker, Corney, Malcolm W., Mohay, George M., Clark, Andrew J., Bracher, Shane, Tobias, Raub, et al. (2010) Fraud detection in ERP systems using scenario matching. In Security and Privacy : Silver Linings in the Cloud : Proceedings of International Information Security Conference (SEC 2010), Springer, Brisbane Convention & Exhibition Centre, Brisbane, Queensland, pp. 112-123.
Number of full-text downloads 345

Corney, Malcolm W., Teague, Donna M., & Thomas, Richard N. (2010) Engaging students in programming. In Conferences in Research and Practice in Information Technology, Vol. 103. Tony Clear and John Hamer, Eds., Australian Computer Society, Inc., Brisbane, pp. 63-72.
Number of full-text downloads 467
Number of citations in Scopus 1

Khan, Roheena Q., Corney, Malcolm W., Clark, Andrew J., & Mohay, George M. (2009) A role mining inspired approach to representing user behaviour in ERP systems. In Oyabu, Takashi & Gen, Mitsuo (Eds.) Proceedings of The 10th Asia Pacific Industrial Engineering and Management Systems Conference, The Korean Institute of Industrial Engineers, Kitakyushu International Conference Center, Kitakyushu, pp. 2541-2552.
Number of full-text downloads 337

Corney, Malcolm W., de Vel, Olivier, Anderson, Alison M., & Mohay, George M. (2002) Gender-preferential Text Mining of E-mail Discourse. In 18th Annual Computer Security Applications Conference, December 9-13, 2002, Las Vegas, NV, USA.
Number of full-text downloads 395
Number of citations in Web of Science® 3

de Vel, Olivier Y., Corney, Malcolm W., Anderson, Alison M., & Mohay, George M. (2002) Language and gender author cohort analysis of e-mail for computer forensics. In Digital Forensics Research Workshop, 6-8 August, Syracuse, NY, USA.
Number of full-text downloads 538

de Vel, Olivier, Anderson, Alison M., Corney, Malcolm W., & Mohay, George M. (2001) Multi-Topic E-mail Authorship Attribution Forensics. In ACM COnference on Computer Security - Workshop on Data Mining for Security Applications, November 8, 2001, Philadelphia, PA, USA.
Number of full-text downloads 273

Conference Item

Corney, Malcolm W. (2009) Designing for engagement : building IT systems. In ALTC First Year Experience Curriculum Design Symposium 2009, 5-6 February 2009, Queensland University of Technology, Brisbane.
Number of full-text downloads 71

QUT Thesis

Corney, Malcolm W. (2003) Analysing e-mail text authorship for forensic purposes. Masters by Research thesis, Queensland University of Technology.
Number of full-text downloads 845

Other

Flegel, Ulrich, Bracher, Shane, Hochwarth, Pascal, Resch, Hermann, Sala, Paola, Wollny, Stephan, et al. (2012) Detecting anomalous user activity.
Number of full-text downloads 32

This list was generated on Sat Sep 13 08:27:30 2014 EST.