Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Operating Systems (080307)"
|Up a level|
- Subjects classification (40915)
- Australian and New Zealand Standard Research Classification (40915)
Group by: Authors/Creators | Item Type
Number of items at this level: 16.
Camtepe, S. A. & Yener, B. (2007) Modeling and detection of complex attacks. In Proceedings of the Third International Conference on Security and Privacy in Communications Networks and the Workshops, 2007, IEEE Conference Publications , Nice, France, 234 -243.
Clothier, Reece A., Harrison, Andrew, Dusha, Damien, McManus, Iain A., Greer, Duncan G., & Walker, Rodney A. (2005) Development of a Low-cost UAV System for Civilian Airspace Integration Trials. In Australian International Aerospace Congress, 13-17 March, 13-17 March 2005, Melbourne, Australia.
Clothier, Reece A., Harrison, Andrew, Dusha, Damien, McManus, Iain A., Greer, Duncan G., & Walker, Rodney A. (2005) Development of a Low-cost UAV System for Civilian Airspace Integration Trials (Poster). In Australian International Aerospace Congress, 13-17 March, Melbourne, Australia.
Clutterbuck, Peter, Mohay, George, & Seamons, Owen (2006) Exploring Transport Layer Solutions for Parallelism and Load Balancing Within Internet Services Clusters. International Transactions on Systems Science and Applications, 2(3), pp. 273-280.
Croll, Peter, Franco, Luis, & Sahama, Tony (2008) Security Enhanced Linux to enforce Mandatory Access Control in Health Information Systems. In Warren, J, Yu, P, Yearwood, J, & Patrick, J (Eds.) Health Data and Knowledge Management 2008, 22-25 January 2008, Wollongong, Australia.
Croll, Peter R., Henricksen, Matthew P., Caelli, William J., & Liu, Vicky (2007) Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. In Kuhn, Klaus A., Warren, James R., & Leong, Tze-Yun (Eds.) MEDINFO 2007: the 12th World Congress on Health (Medical) Informatics – Building Sustainable Health Systems, 20-24 August 2007, Brisbane, Australia.
Dong, Jinxiang, Ma, Longhua, Peng, Chen, Sun, Youxian, & Xia, Feng (2008) Cross-layer adaptive feedback scheduling of wireless control systems. Sensors, 8, pp. 4265-4281.
Goonasekera, Nuwan A., Caelli, William J., & Sahama, Tony R. (2009) 50 Years of Isolation. In IEEE Computer Society, IEEE Computer Society Conference Publishing Services (CPS), Brisbane, Australia, pp. 54-60.
Ma, Longhua, Peng, Zhe, & Xia, Feng (2008) Integrated design and implementation of embedded control systems with Scilab. Sensors, 8(9), pp. 5501-5515.
Richards, Mark A., Dunn, Tim L., & Pham, Binh (2007) Developing a motion-based input model for mobile devices. In Jacko, Julie (Ed.) Proceedings of the HCI International 2007 : Human-Computer Interaction. Interaction Platforms and Techniques, 22-27 July 2007, Beijing, China.
Schmidt, Aubrey-Derrick, Peters, Frank, Lamour, Florian, Scheel, Christian, Camtepe, Seyit A., & Albayrak, Sahin (2009) Monitoring smartphones for anomaly detection. Mobile Networks and Applications, 14(1), pp. 92-106.
Schmidt, Stephan, Bye, Rainer, Chinnow, Joel, Bsufka, Karsten, Camtepe, Seyit A., & Albayrak, Sahin (2010) Application-level simulation for network security. Simulation, 86(5-6), pp. 311-330.
Sitte, Joaquin (2006) Robotics and Robotics Education with Smalltalk. In Murase, K, Sekiyama, K, Kubota, N, Naniwa, T, & Sitte, J (Eds.) Proceedings of the 3rd International Symposium on Autonomous Minirobots for Research and Edutainment, 20-22 September 2005, Japan, Fukui, Awara-Spa.
Xia, Feng, Tian, Guosong, & Sun, Youxian (2007) Feedback scheduling: an event-driven paradigm. ACM SIGPLAN Notices, 42(12), pp. 7-14.
Xia, Feng, Tian, Yu-Chu, Sun, Youxian, & Dong, Jinxiang (2008) Control-theoretic dynamic voltage scaling for embedded controllers. IET Computers and Digital Techniques, 2(5), pp. 377-385.
Zhou, Erzhong, Zhong, Ning, & Li, Yuefeng (2013) Extracting news blog hot topics based on the W2T methodology. World Wide Web, March .