Malcolm Corney
Malcolm Corney
Kelvin Grove State College
Verifierad e-postadress på eq.edu.au
Titel
Citeras av
Citeras av
År
Mining e-mail content for author identification forensics
O De Vel, A Anderson, M Corney, G Mohay
ACM Sigmod Record 30 (4), 55-64, 2001
6492001
Gender-preferential text mining of e-mail discourse
M Corney, O De Vel, A Anderson, G Mohay
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
2192002
Language and gender author cohort analysis of e-mail for computer forensics
O De Vel, M Corney, A Anderson, G Mohay
Proceedings of Digital Forensics Research Workshop:, 1-16, 2002
872002
Analysing e-mail text authorship for forensic purposes
MW Corney
Queensland University of Technology, 2003
732003
Multi-topic e-mail authorship attribution forensics
O De Vel, AM Anderson, MW Corney, GM Mohay
ACM, 2001
612001
Engaging students in programming
MW Corney, DM Teague, RN Thomas
Conferences in Research and Practice in Information Technology, Vol. 103 …, 2010
552010
Identifying the Authors of Suspect Email
MW Corney, AM Anderson, GM Mohay, O De Vel
46*2001
A qualitative think aloud study of the early neo-piagetian stages of reasoning in novice programmers
DM Teague, MW Corney, A Ahadi, R Lister
Proceedings of 15th Australasian Computing Education Conference, 2013
402013
Some empirical results for neo-Piagetian reasoning in novice programmers and the relationship to code explanation questions
M Corney, D Teague, A Ahadi, R Lister
Proceedings of the fourteenth australasian computing education conference …, 2012
372012
Early relational reasoning and the novice programmer: swapping as the'hello world'of relational reasoning
M Corney, R Lister, D Teague
Proceedings of the Thirteenth Australiasian Computing Education Conference …, 2011
322011
How difficult are exams? A framework for assessing the complexity of introductory programming exams
J Sheard, A Carbone, D Chinn, T Clear, M Corney, D D'Souza, J Fenwick, ...
Australian Computer Society (ACS) 136, 145-154, 2013
312013
Fraud Detection in ERP Systems Using Scenario Matching
AK Islam, M Corney, G Mohay, A Clark, S Bracher, T Raub, U Flegel
25th IFIP TC11 International Information Security Conference, SEC 2010, 112-123, 2010
252010
Detection of anomalies from user profiles generated from system logs
M Corney, G Mohay, A Clark
Proceedings of the Ninth Australasian Information Security Conference:, 23-31, 2011
212011
E-mail authorship attribution for computer forensics
O de Vel, A Anderson, M Corney, G Mohay
Applications of Data Mining in Computer Security, 229-250, 2002
212002
Transaction mining for fraud detection in ERP Systems
RQ Khan, MW Corney, AJ Clark, GM Mohay
Industrial engineering and management systems 9 (2), 141-156, 2010
192010
'explain in plain english'questions revisited: data structures problems
M Corney, S Fitzgerald, B Hanks, R Lister, R McCauley, L Murphy
Proceedings of the 45th ACM technical symposium on Computer science …, 2014
182014
Using neo-Piagetian theory, formative in-Class tests and think alouds to better understand student thinking: a preliminary report on computer programming
DM Teague, MW Corney, CJ Fidge, MG Roggenkamp, A Ahadi, R Lister
Proceedings of 2012 Australasian Association for Engineering Education (AAEE …, 2012
172012
Toward a shared understanding of competency in programming: An invitation to the BABELnot project
R Lister, MW Corney, J Curran, D D'Souza, CJ Fidge, R Gluga, ...
Proceedings of the 14th Australasian Computing Education Conference (ACE2012 …, 2012
16*2012
Swapping as the" Hello World" of relational reasoning: replications, reflections and extensions
DM Teague, MW Corney, A Ahadi, R Lister
Proceedings of Conferences in Research and Practice in Information …, 2012
142012
Detecting anomalous user activity
U Flegel, S Bracher, P Hochwarth, H Resch, P Sala, S Wollny, H Wang, ...
US Patent 9,710,857, 2017
112017
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20