Items where Subject is "Australian and New Zealand Standard Research Classification > TECHNOLOGY (100000) > COMMUNICATIONS TECHNOLOGIES (100500) > Computer Communications Networks (100503)"
|Up a level|
- Subjects classification (42020)
- Australian and New Zealand Standard Research Classification (42020)
Group by: Authors/Creators | Item Type
Number of items at this level: 50.
Rooney, David, Hearn, Greg, & Ninan, Abraham (Eds.) (2005) Handbook on the knowledge economy. Edward Elgar, Cheltenham.
Bye, Rainer, Camtepe, Seyit A., & Albayrak, Sahin (2010) Teamworking for security : the collaborative approach. In Seigneu, Jean-Marc & Slagell, Adam (Eds.) Collaborative Computer Security and Trust Management. IGI Global, pp. 12-33.
Camtepe, Seyit A. & Yener, Bulent (2008) Key Management in Wireless Sensor Networks. In Lopez , Javier & Zhou, Jianying (Eds.) Wireless Sensor Network Security. IOS Press, pp. 110-141.
Choi, Jaz Hee-jeong (2009) Searching the self in Seoul : trans-youth and urban social networking in Korea. In Nyíri, Kristóf (Ed.) Engagement and Exposure : Mobile Communication and the Ethics of Social Networking. Passagen Verlag, Vienna, Austria, pp. 121-130.
Hamilton, Jillian G. (2006) A reformation of space : intimate transactions in art and distributed communication. In Hamilton, Jillian G. (Ed.) Intimate Transactions : Art, Exhibition and Interaction within Distributed Network Environments. ACID (Australasian CRC for Interaction Design), Brisbane Australia, pp. 116-129.
Camtepe, Seyit A., Bsufka, Karsten, Hennig, Leonhard, Simsek, Cihan, & Albayrak, Sahin (2012) A framework for automated identification of attack scenarios on IT infrastructures. PIK ( Praxis der Informationsverarbeitung und Kommunikation) Journal on Network Attack Detection and Defence, 35(1), pp. 25-31.
Camtepe, Seyit A. & Yener, Bulent (2007) Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking, 15(2), pp. 346-358.
Ingram, David M.E., Schaub, Pascal, & Campbell, Duncan A. (2012) Use of precision time protocol to synchronize sampled value process buses. IEEE Transactions on Instrumentation and Measurement, 61(5), pp. 1173-1180.
Ingram, David M.E., Schaub, Pascal, Campbell, Duncan A., & Taylor, Richard R. (2013) Performance analysis of PTP components for IEC 61850 process bus applications. IEEE Transactions on Instrumentation and Measurement, 62(4), pp. 710-719.
Ingram, David M.E., Schaub, Pascal, Campbell, Duncan A., & Taylor, Richard R. (2013) Quantitative assessment of fault tolerant precision timing for electricity substations. IEEE Transactions on Instrumentation and Measurement, 62(10), pp. 2694-2703.
Ingram, David M.E., Schaub, Pascal, Taylor, Richard R., & Campbell, Duncan A. (2012) Network interactions and performance of a multi-function IEC 61850 process bus. IEEE Transactions on Industrial Electronics, 60(12), pp. 5933-5942.
Ingram, David M.E., Schaub, Pascal, Taylor, Richard R., & Campbell, Duncan A. (2012) Performance analysis of IEC 61850 sampled value process bus networks. IEEE Transactions on Industrial Informatics, 9(3), pp. 1445-1454.
Peng, Chen & Tian, Yu-Chu (2008) Delay-dependent robust stability criteria for uncertain systems with interval time-varying delay. Journal of Computational and Applied Mathematics, 214(2), pp. 480-494.
Peng, Chen & Tian, Yu-Chu (2007) Networked H infinity control of linear systems with state quantization. Information Sciences, 177(24), pp. 5763-5774.
Peng, Chen & Tian, Yu-Chu (2006) Robust H-infinity control of networked control systems with parameter uncertainty and state-delay. European Journal of Control, 12(5), pp. 471-480.
Peng, Chen, Tian, Yu-Chu, & Yue, Dong (2007) Network quality-of-service based guaranteed cost control for networked control systems. Dynamics of Continuous, Discrete and Impulse Systems - Series B: Applications and Algorithms, 14, pp. 233-247.
Schmidt, Aubrey-Derrick, Peters, Frank, Lamour, Florian, Scheel, Christian, Camtepe, Seyit A., & Albayrak, Sahin (2009) Monitoring smartphones for anomaly detection. Mobile Networks and Applications, 14(1), pp. 92-106.
Schmidt, Stephan, Bye, Rainer, Chinnow, Joel, Bsufka, Karsten, Camtepe, Seyit A., & Albayrak, Sahin (2010) Application-level simulation for network security. Simulation, 86(5-6), pp. 311-330.
Shea, Pip (2013) Co-creating knowledge online : approaches for community artists. Cultural Science, 6(1), pp. 37-48.
Shen, Pei Yuan, Tang, Maolin, Liu, Vicky, & Caelli, William (2012) Performance and scalability assessment for non-certificate-based public key management in VANETS. International Journal of Information Security and Privacy, 6(1), pp. 33-56.
Tian, Yu-Chu & Levy, David (2008) Compensation for control packet dropout in networked control systems. Information Sciences, 178(5), pp. 1263-1278.
Tian, Yu-Chu & Levy, David (2008) Dealing with network complexity in real-time networked control. International Journal of Computer Mathematics, 85(8), pp. 1235-1253.
Tian, Yu-Chu, Yu, Zu-Guo, & Fidge, Colin J. (2007) Multifractal nature of network induced time delay in networked control systems. Physics Letters. Section A: General, Atomic and Solid State Physics, 361(1-2), pp. 103-107.
Xia, Feng (2008) QoS Challenges and Opportunities in Wireless Sensor/Actuator Networks. Sensors, 8(2), pp. 1099-1110.
Xia, Feng, Sun, Youxian, & Tian, Yu-Chu (2009) Feedback scheduling of priority-driven control networks. Computer Standards and Interfaces, 31(3), pp. 539-547.
Xia, Feng, Tian, Yu-Chu, Li, Yanjun, & Sun, Youxian (2007) Wireless Sensor/Actuator Network Design for Mobile Control Applications. Sensors, 7(10), pp. 2157-2173.
Xia, Feng, Zhao, Wenhong, Sun, Youxian, & Tian, Yu-Chu (2007) Fuzzy Logic Control Based QoS Management in Wireless Sensor/Actuator Networks. Sensors, 7(12), pp. 3179-3191.
Ahmed, Ejaz, Clark, Andrew, & Mohay, George M. (2009) Characterising anomalous events using change point correlation on unsolicited network traffic. In Josang, Audun, Maseng, Torleiv, & Knapskog, Svein Johan (Eds.) Identity and Privacy in the Internet Age : Proceedings of the Fourteenth Nordic Conference on Secure IT Systems, Springer, University of Oslo, Oslo, pp. 104-109.
Ahmed, Ejaz, Mohay, George M., Tickle, Alan, & Bhatia, Sajal (2010) Use of IP addresses for high rate flooding attack detection. In Proceedings of 25th International Information Security Conference (SEC 2010), Springer, Brisbane, Queensland.
Alzaid, Hani, Foo, Ernest, & Gonzalez Nieto, Juan (2008) RSDA: Reputation-based Secure Data Aggregation in Wireless Sensor Networks. In 1st International Workshop on Sensor Networks and Ambient Intelligence (SeNAmI 2008), December 1-4, 2008, Dunedin, New Zealand.
Camtepe, Seyit A. & Yener, Bulent (2004) Combinatorial design of key distribution mechanisms for wireless sensor networks. In Samarati, Pierangela, Ryan, Peter, Gollmann, Dieter, & Molva, Refik (Eds.) Lecture Notes in Computer Science, Computer Security – ESORICS 2004, Springer Berlin Heidelberg, Institut Eurecom, Sophia Antipolis, French Riviera, France, pp. 293-308.
Chen, Xiaoqin, Jones, Haley, & Jayalath, Dhammika (2007) Congestion-Aware Routing Protocol for Mobile Ad Hoc Networks. In IEEE 66th Vehicular Technology Conference, 2007 (VTC-2007 Fall. 2007), Sept. 30 2007-Oct. 3 2007, Baltimore, MD, USA.
Fidge, Colin, Gu, Tianlong, Han, Qing-Long, Tade, Moses, & Tian, Glen (2006) Communication Architecture Design for Real-Time Networked Control Systems. In Yu, J (Ed.) 2006 International Conference on Communications, Circuits and Systems Proceedings (Vol 3), 25-28 June 2007, China, Guilin.
Fidge, Colin, Gu, Tianlong, Levy, David, Tade, Moses, & Tian, Glen (2006) Queuing Packets in Communication Networks for Networked Control Systems. In Chai, T & Wang, W (Eds.) Proceedings of the 6th World Congress on Intelligent Control and Automation, 21-23 June 2006, China, Dalian.
Gui, Li, Tian, Yu-Chu, & Fidge, Colin J. (2007) Performance Evaluation of IEEE 802.11 Wireless Networks for Real-time Networked Control Systems. In The 2007 International Conference on Embedded Systems and Applications, 25 - 28 June, Monte Carlo Resort, Las Vegas, Nevada, USA..
Hamilton, Jillian G. (2009) Identifying with an avatar : a multidisciplinary perspective. In Fennessy, Liam , Kerr, Russell , Melles, Gavin , Thong, Christine , & Wright, Emily (Eds.) Proceedings of the Cumulus Conference: 38º South: Hemispheric Shifts Across Learning, Teaching and Research, Swinburne University of Technology and and RMIT University, Swinburne University of Technology and and RMIT University, Melbourne, Australia.
Ingram, David M.E., Schaub, Pascal, & Campbell, Duncan A. (2011) Multicast traffic filtering for sampled value process bus networks. In Fang, John & Cao, Zhenwei (Eds.) Proceedings of the 37th Annual Conference of the IEEE Industrial Electronics Society (IECON 2011), IEEE (Institute of Electrical and Electronics Engineers, Inc.), Crown Conference Centre, Melbourne, VIC, pp. 1-6.
Ingram, David M.E., Schaub, Pascal, Campbell, Duncan A., & Taylor, Richard R. (2012) Evaluation of precision time synchronisation methods for substation applications. In Lee, Kang & Sankar, Krishna (Eds.) Proceedings 2012 International IEEE Symposium on Precision Clock Synchronization for Measurement, Control and Communication, IEEE, San Francisco, CA, pp. 37-42.
Iqbal, Ahmed Ali, Mahmood, Waqar, Ahmed, Ejaz, & Samad, Kashan (2005) Evaluation of distributed control signaling protocols in GMPLS. In Proceedings of Fourth International Conference on the Optical Internet, Chongqing.
Liu, Xuemei, Zong, Nannan, & Dhanasekar, Manicka (2014) An alternate learning approach for destructive testing in civil engineering - Benefits from remote laboratory experimentation. In Zvacek, Susan, Restivo, Maria Teresa, Uhomoibhi, James, & Helfert, Markus (Eds.) Proceedings of 6th International Conference on Computer Supported Education, SCITEPRESS - Science and Technology Publications, Barcelona, Spain, pp. 275-279.
Peng, Chen & Tian, Glen (2006) Robust Controller Design of Networked Control Systems with Nonlinear Uncertainties. In Goa, C & Liu, X (Eds.) Impulsive Dynamical Systems and Applications: Proceedings of the 3rd International Conference on Impulsive Dynamical Systems and Applications, 21-23 July 2006, China, Qingdao.
Rakotonirainy, Andry (2007) Issues on ITS and human factors interface. In 3rd Conference on Human Factors in Transport, 20-21 August, Melbourne, Victoria, Australia. (Unpublished)
Russell, Selwyn (2006) Combining Commercial Networks for Optimum Large Scale Emergency Communications: Challenges and Opportunities. In Mendis, P, Lai, J, & Dawson, E (Eds.) Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference, 19 - 21 September 2006, Australia, Australian Capital Territory, Canberra.
Saghafi, Mahmoud R., Franz, Jill M., & Crowther, Philip (2010) Crossing the cultural divide : a contemporary holistic framework for conceptualising design studio education. In Proceedings of 2nd International Conference on Design Education : ConnectED, Sydney.
Shafiq, Mohammed O., Ali, Arshad, Ahmed, Ejaz, Ahmed, Hafiz F., & Suguri, Hiroki (2005) Detection and prevention of distributed denial of services attacks by collaborative effort of software agents, first prototype implementation. In Parallel and Distributed Computing and Networks : Proceedings of the 23rd IASTED International Multi Conference on Applied Informatics, IASTED, Innsbruck, Austria.
Smith, Ryan N. , Prentis, Peter, Langendoen, Koen, & Corke, Peter (2011) Pseudoseeds : investigating long-distance, ocean seed dispersal with wireless sensors. In IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS2011), Workshop on Robotic Environmental Monitoring, 25-30 September 2011, Hilton San Francisco Union Square, San Francisco, California.
Stebila, Douglas (2010) Reinforcing bad behaviour : the misuse of security indicators on popular websites. In Proceedings of the 22nd Australasian Conference on Computer-Human Interaction (OZCHI 2010), ACM, Queensland University of Technology, Brisbane, pp. 248-251.
Tian, Yu-Chu & Levy, David (2007) Configuring the worst-case communication delay in real-time networked control systems. In Arabnia, H. R. & Yang, L. T. (Eds.) 2007 International Conference on Embedded Systems and Applications (ESA'2007), June 25-28, Las Vegas Nevada, USA.
Dee, Mike (2012) Surveillance Town: Social inclusion-exclusion through surveillance, ‘the dignity of work’ and income management. In Surveillance and/in Everyday Life: Monitoring Pasts, Presents and Futures, 20-21 February 2012, Sydney Law School, Eastern Avenue, University of Sydney, Australia. (Unpublished)
Duplock, Ray, Savage, Bernadette, Gee, Donald, & Kelson, Neil (2010) Centrally supported online surveys for research at QUT. In 4th eResearch Australasia 2010 : 21st Century Research : Where Computing Meets Data, 8-12 November 2010, RACV Royal Pines, Gold Coast, Queensland. (Unpublished)