Items where Subject is "Australian and New Zealand Standard Research Classification > TECHNOLOGY (100000) > COMMUNICATIONS TECHNOLOGIES (100500) > Computer Communications Networks (100503)"
|Up a level|
- Subjects classification (39632)
- Australian and New Zealand Standard Research Classification (39632)
Group by: Authors/Creators | Item Type
Number of items at this level: 50.
Rooney, David, Hearn, Greg, & Ninan, Abraham (Eds.) (2005) Handbook on the knowledge economy. Edward Elgar, Cheltenham.
Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2010) Teamworking for security : the collaborative approach. In Seigneu, Jean-Marc & Slagell, Adam (Eds.) Collaborative Computer Security and Trust Management. IGI Global, pp. 12-33.
Camtepe, Seyit A. & Yener, Bulent (2008) Key Management in Wireless Sensor Networks. In Lopez , Javier & Zhou, Jianying (Eds.) Wireless Sensor Network Security. IOS Press, pp. 110-141.
Choi, Jaz Hee-jeong (2009) Searching the self in Seoul : trans-youth and urban social networking in Korea. In Nyíri, Kristóf (Ed.) Engagement and Exposure : Mobile Communication and the Ethics of Social Networking. Passagen Verlag, Vienna, Austria, pp. 121-130.
Hamilton, Jillian G. (2006) A reformation of space : intimate transactions in art and distributed communication. In Hamilton, Jillian G. (Ed.) Intimate Transactions : Art, Exhibition and Interaction within Distributed Network Environments. ACID (Australasian CRC for Interaction Design), Brisbane Australia, pp. 116-129.
Camtepe, Seyit A., Bsufka, Karsten, Hennig, Leonhard, Simsek, Cihan, & Albayrak, Sahin (2012) A framework for automated identification of attack scenarios on IT infrastructures. PIK ( Praxis der Informationsverarbeitung und Kommunikation) Journal on Network Attack Detection and Defence, 35(1), pp. 25-31.
Camtepe, Seyit A. & Yener, Bulent (2007) Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking, 15(2), pp. 346-358.
Ingram, David M.E., Schaub, Pascal, & Campbell, Duncan A. (2012) Use of precision time protocol to synchronize sampled value process buses. IEEE Transactions on Instrumentation and Measurement, 61(5), pp. 1173-1180.
Ingram, David M.E., Schaub, Pascal, Campbell, Duncan A., & Taylor, Richard R. (2013) Performance analysis of PTP components for IEC 61850 process bus applications. IEEE Transactions on Instrumentation and Measurement, 62(4), pp. 710-719.
Ingram, David M.E., Schaub, Pascal, Campbell, Duncan A., & Taylor, Richard R. (2013) Quantitative assessment of fault tolerant precision timing for electricity substations. IEEE Transactions on Instrumentation and Measurement, 62(10), pp. 2694-2703.
Ingram, David M.E., Schaub, Pascal, Taylor, Richard R., & Campbell, Duncan A. (2012) Network interactions and performance of a multi-function IEC 61850 process bus. IEEE Transactions on Industrial Electronics, 60(12), pp. 5933-5942.
Ingram, David M.E., Schaub, Pascal, Taylor, Richard R., & Campbell, Duncan A. (2012) Performance analysis of IEC 61850 sampled value process bus networks. IEEE Transactions on Industrial Informatics, 9(3), pp. 1445-1454.
Peng, Chen & Tian, Yu-Chu (2008) Delay-dependent robust stability criteria for uncertain systems with interval time-varying delay. Journal of Computational and Applied Mathematics, 214(2), pp. 480-494.
Peng, Chen & Tian, Yu-Chu (2007) Networked H infinity control of linear systems with state quantization. Information Sciences, 177(24), pp. 5763-5774.
Peng, Chen & Tian, Yu-Chu (2006) Robust H-infinity control of networked control systems with parameter uncertainty and state-delay. European Journal of Control, 12(5), pp. 471-480.
Peng, Chen, Tian, Yu-Chu, & Yue, Dong (2007) Network quality-of-service based guaranteed cost control for networked control systems. Dynamics of Continuous, Discrete and Impulse Systems - Series B: Applications and Algorithms, 14, pp. 233-247.
Schmidt, Aubrey-Derrick, Peters, Frank, Lamour, Florian, Scheel, Christian, Camtepe, Seyit A., & Albayrak, Sahin (2009) Monitoring smartphones for anomaly detection. Mobile Networks and Applications, 14(1), pp. 92-106.
Schmidt, Stephan, Bye, Rainer, Chinnow, Joel, Bsufka, Karsten, Camtepe, Seyit A., & Albayrak, Sahin (2010) Application-level simulation for network security. Simulation, 86(5-6), pp. 311-330.
Shea, Pip (2013) Co-creating knowledge online : approaches for community artists. Cultural Science, 6(1), pp. 37-48.
Shen, Pei Yuan, Tang, Maolin, Liu, Vicky, & Caelli, William (2012) Performance and scalability assessment for non-certificate-based public key management in VANETS. International Journal of Information Security and Privacy, 6(1), pp. 33-56.
Tian, Yu-Chu & Levy, David (2008) Compensation for control packet dropout in networked control systems. Information Sciences, 178(5), pp. 1263-1278.
Tian, Yu-Chu & Levy, David (2008) Dealing with network complexity in real-time networked control. International Journal of Computer Mathematics, 85(8), pp. 1235-1253.
Tian, Yu-Chu, Yu, Zu-Guo, & Fidge, Colin J. (2007) Multifractal nature of network induced time delay in networked control systems. Physics Letters. Section A: General, Atomic and Solid State Physics, 361(1-2), pp. 103-107.
Xia, Feng (2008) QoS Challenges and Opportunities in Wireless Sensor/Actuator Networks. Sensors, 8(2), pp. 1099-1110.
Xia, Feng, Sun, Youxian, & Tian, Yu-Chu (2009) Feedback scheduling of priority-driven control networks. Computer Standards and Interfaces, 31(3), pp. 539-547.
Xia, Feng, Tian, Yu-Chu, Li, Yanjun, & Sun, Youxian (2007) Wireless Sensor/Actuator Network Design for Mobile Control Applications. Sensors, 7(10), pp. 2157-2173.
Xia, Feng, Zhao, Wenhong, Sun, Youxian, & Tian, Yu-Chu (2007) Fuzzy Logic Control Based QoS Management in Wireless Sensor/Actuator Networks. Sensors, 7(12), pp. 3179-3191.
Ahmed, Ejaz, Clark, Andrew, & Mohay, George M. (2009) Characterising anomalous events using change point correlation on unsolicited network traffic. In Josang, Audun, Maseng, Torleiv, & Knapskog, Svein Johan (Eds.) Identity and Privacy in the Internet Age : Proceedings of the Fourteenth Nordic Conference on Secure IT Systems, Springer, University of Oslo, Oslo, pp. 104-109.
Ahmed, Ejaz, Mohay, George M., Tickle, Alan, & Bhatia, Sajal (2010) Use of IP addresses for high rate flooding attack detection. In Proceedings of 25th International Information Security Conference (SEC 2010), Springer, Brisbane, Queensland. (In Press)
Alzaid, Hani, Foo, Ernest, & Gonzalez Nieto, Juan (2008) RSDA: Reputation-based Secure Data Aggregation in Wireless Sensor Networks. In 1st International Workshop on Sensor Networks and Ambient Intelligence (SeNAmI 2008), December 1-4, 2008, Dunedin, New Zealand. (In Press)
Camtepe, Seyit A. & Yener, Bulent (2004) Combinatorial design of key distribution mechanisms for wireless sensor networks. In Samarati, Pierangela, Ryan, Peter, Gollmann, Dieter, & Molva, Refik (Eds.) Lecture Notes in Computer Science, Computer Security – ESORICS 2004, Springer Berlin Heidelberg, Institut Eurecom, Sophia Antipolis, French Riviera, France, pp. 293-308.
Chen, Xiaoqin, Jones, Haley, & Jayalath, Dhammika (2007) Congestion-Aware Routing Protocol for Mobile Ad Hoc Networks. In IEEE 66th Vehicular Technology Conference, 2007 (VTC-2007 Fall. 2007), Sept. 30 2007-Oct. 3 2007, Baltimore, MD, USA.
Fidge, Colin, Gu, Tianlong, Han, Qing-Long, Tade, Moses, & Tian, Glen (2006) Communication Architecture Design for Real-Time Networked Control Systems. In Yu, J (Ed.) 2006 International Conference on Communications, Circuits and Systems Proceedings (Vol 3), 25-28 June 2007, China, Guilin.
Fidge, Colin, Gu, Tianlong, Levy, David, Tade, Moses, & Tian, Glen (2006) Queuing Packets in Communication Networks for Networked Control Systems. In Chai, T & Wang, W (Eds.) Proceedings of the 6th World Congress on Intelligent Control and Automation, 21-23 June 2006, China, Dalian.
Gui, Li, Tian, Yu-Chu, & Fidge, Colin J. (2007) Performance Evaluation of IEEE 802.11 Wireless Networks for Real-time Networked Control Systems. In The 2007 International Conference on Embedded Systems and Applications, 25 - 28 June, Monte Carlo Resort, Las Vegas, Nevada, USA..
Hamilton, Jillian G. (2009) Identifying with an avatar : a multidisciplinary perspective. In Fennessy, Liam, Kerr, Russell, Melles, Gavin, Thong, Christine, & Wright, Emily (Eds.) Proceedings of the Cumulus Conference: 38º South: Hemispheric Shifts Across Learning, Teaching and Research, Swinburne University of Technology and and RMIT University, Swinburne University of Technology and and RMIT University, Melbourne, Australia.
Ingram, David M.E., Schaub, Pascal, & Campbell, Duncan A. (2011) Multicast traffic filtering for sampled value process bus networks. In Fang, John & Cao, Zhenwei (Eds.) Proceedings of the 37th Annual Conference of the IEEE Industrial Electronics Society (IECON 2011), IEEE (Institute of Electrical and Electronics Engineers, Inc.), Crown Conference Centre, Melbourne, VIC, pp. 1-6.
Ingram, David M.E., Schaub, Pascal, Campbell, Duncan A., & Taylor, Richard R. (2012) Evaluation of precision time synchronisation methods for substation applications. In Lee, Kang & Sankar, Krishna (Eds.) Proceedings 2012 International IEEE Symposium on Precision Clock Synchronization for Measurement, Control and Communication, IEEE, San Francisco, CA, pp. 37-42.
Iqbal, Ahmed Ali, Mahmood, Waqar, Ahmed, Ejaz, & Samad, Kashan (2005) Evaluation of distributed control signaling protocols in GMPLS. In Proceedings of Fourth International Conference on the Optical Internet, Chongqing.
Liu, Xuemei, Zong, Nannan, & Dhanasekar, Manicka (2014) An alternate learning approach for destructive testing in civil engineering - Benefits from remote laboratory experimentation. In Zvacek, Susan, Restivo, Maria Teresa, Uhomoibhi, James, & Helfert, Markus (Eds.) Proceedings of 6th International Conference on Computer Supported Education, SCITEPRESS - Science and Technology Publications, Barcelona, Spain, pp. 275-279.
Peng, Chen & Tian, Glen (2006) Robust Controller Design of Networked Control Systems with Nonlinear Uncertainties. In Goa, C & Liu, X (Eds.) Impulsive Dynamical Systems and Applications: Proceedings of the 3rd International Conference on Impulsive Dynamical Systems and Applications, 21-23 July 2006, China, Qingdao.
Rakotonirainy, Andry (2007) Issues on ITS and human factors interface. In 3rd Conference on Human Factors in Transport, 20-21 August, Melbourne, Victoria, Australia. (Unpublished)
Russell, Selwyn (2006) Combining Commercial Networks for Optimum Large Scale Emergency Communications: Challenges and Opportunities. In Mendis, P, Lai, J, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference, 19 - 21 September 2006, Australia, Australian Capital Territory, Canberra.
Saghafi, Mahmoud R., Franz, Jill M., & Crowther, Philip (2010) Crossing the cultural divide : a contemporary holistic framework for conceptualising design studio education. In Proceedings of 2nd International Conference on Design Education : ConnectED, Sydney. (In Press)
Shafiq, Mohammed O., Ali, Arshad, Ahmed, Ejaz, Ahmed, Hafiz F., & Suguri, Hiroki (2005) Detection and prevention of distributed denial of services attacks by collaborative effort of software agents, first prototype implementation. In Parallel and Distributed Computing and Networks : Proceedings of the 23rd IASTED International Multi Conference on Applied Informatics, IASTED, Innsbruck, Austria.
Smith, Ryan N., Prentis, Peter, Langendoen, Koen, & Corke, Peter (2011) Pseudoseeds : investigating long-distance, ocean seed dispersal with wireless sensors. In IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS2011), Workshop on Robotic Environmental Monitoring, 25-30 September 2011, Hilton San Francisco Union Square, San Francisco, California.
Stebila, Douglas (2010) Reinforcing bad behaviour : the misuse of security indicators on popular websites. In Proceedings of the 22nd Australasian Conference on Computer-Human Interaction (OZCHI 2010), ACM, Queensland University of Technology, Brisbane, pp. 248-251.
Tian, Yu-Chu & Levy, David (2007) Configuring the worst-case communication delay in real-time networked control systems. In Arabnia, H. R. & Yang, L. T. (Eds.) 2007 International Conference on Embedded Systems and Applications (ESA'2007), June 25-28, Las Vegas Nevada, USA.
Dee, Mike (2012) Surveillance Town: Social inclusion-exclusion through surveillance, ‘the dignity of work’ and income management. In Surveillance and/in Everyday Life: Monitoring Pasts, Presents and Futures, 20-21 February 2012, Sydney Law School, Eastern Avenue, University of Sydney, Australia. (Unpublished)
Duplock, Ray, Savage, Bernadette, Gee, Donald, & Kelson, Neil (2010) Centrally supported online surveys for research at QUT. In 4th eResearch Australasia 2010 : 21st Century Research : Where Computing Meets Data, 8-12 November 2010, RACV Royal Pines, Gold Coast, Queensland. (Unpublished)