Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Malcolm Corney
@inproceedings{DBLP:conf/sigcse/CorneyFHLMM14, author = {Malcolm Corney and Sue Fitzgerald and Brian Hanks and Raymond Lister and Ren{\'{e}}e A. McCauley and Laurie Murphy}, editor = {J. D. Dougherty and Kris Nagel and Adrienne Decker and Kurt Eiselt}, title = {'explain in plain english' questions revisited: data structures problems}, booktitle = {The 45th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2014, Atlanta, GA, USA, March 5-8, 2014}, pages = {591--596}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2538862.2538911}, doi = {10.1145/2538862.2538911}, timestamp = {Tue, 23 Mar 2021 10:54:19 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/CorneyFHLMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ace/TeagueCAL13, author = {Donna Teague and Malcolm Corney and Alireza Ahadi and Raymond Lister}, editor = {Angela Carbone and Jacqueline L. Whalley}, title = {A qualitative think aloud study of the early neo-piagetian stages of reasoning in novice programmers}, booktitle = {Proceedings of the Fifteenth Australasian Computing Education Conference, {ACE} '13, Adelaide, Australia, January 29 - February 1, 2013}, pages = {87--95}, publisher = {Australian Computer Society / {ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2667209}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/ace/TeagueCAL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ace/SheardSCCCCDFHL13, author = {Judy Sheard and Simon and Angela Carbone and Donald Chinn and Tony Clear and Malcolm Corney and Daryl J. D'Souza and Joel Fenwick and James Harland and Mikko{-}Jussi Laakso and Donna Teague}, editor = {Angela Carbone and Jacqueline L. Whalley}, title = {How difficult are exams?: a framework for assessing the complexity of introductory programming exams}, booktitle = {Proceedings of the Fifteenth Australasian Computing Education Conference, {ACE} '13, Adelaide, Australia, January 29 - February 1, 2013}, pages = {145--154}, publisher = {Australian Computer Society / {ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2667215}, timestamp = {Thu, 23 Jun 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ace/SheardSCCCCDFHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/CorneyMC11, author = {Malcolm Corney and George M. Mohay and Andrew J. Clark}, editor = {Colin Boyd and Josef Pieprzyk}, title = {Detection of Anomalies from User Profiles Generated from System Logs}, booktitle = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {116}, pages = {23--32}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Corney.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/CorneyMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/IslamCMCBRF11, author = {Asadul K. Islam and Malcolm Corney and George M. Mohay and Andrew J. Clark and Shane Bracher and Tobias Raub and Ulrich Flegel}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Detecting Collusive Fraud in Enterprise Resource Planning Systems}, booktitle = {Advances in Digital Forensics {VII} - 7th {IFIP} {WG} 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {361}, pages = {143--153}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24212-0\_11}, doi = {10.1007/978-3-642-24212-0\_11}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/IslamCMCBRF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/IslamCMCBRF10, author = {Asadul K. Islam and Malcolm Corney and George M. Mohay and Andrew J. Clark and Shane Bracher and Tobias Raub and Ulrich Flegel}, editor = {Kai Rannenberg and Vijay Varadharajan and Christian Weber}, title = {Fraud Detection in {ERP} Systems Using Scenario Matching}, booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11} International Information Security Conference, {SEC} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {330}, pages = {112--123}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15257-3\_11}, doi = {10.1007/978-3-642-15257-3\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/IslamCMCBRF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CorneyVAM02, author = {Malcolm Corney and Olivier Y. de Vel and Alison Anderson and George M. Mohay}, title = {Gender-Preferential Text Mining of E-mail Discourse}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {282--289}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176299}, doi = {10.1109/CSAC.2002.1176299}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CorneyVAM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/02/VelACM02, author = {Olivier Y. de Vel and Alison Anderson and Malcolm Corney and George M. Mohay}, editor = {Daniel Barbar{\'{a}} and Sushil Jajodia}, title = {E-Mail Authorship Attribution for Computer Forensics}, booktitle = {Applications of Data Mining in Computer Security}, series = {Advances in Information Security}, pages = {229--250}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-0953-0\_9}, doi = {10.1007/978-1-4615-0953-0\_9}, timestamp = {Fri, 26 Jul 2019 10:53:31 +0200}, biburl = {https://dblp.org/rec/books/sp/02/VelACM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmod/VelACM01, author = {Olivier Y. de Vel and Alison Anderson and Malcolm Corney and George M. Mohay}, title = {Mining Email Content for Author Identification Forensics}, journal = {{SIGMOD} Rec.}, volume = {30}, number = {4}, pages = {55--64}, year = {2001}, url = {https://doi.org/10.1145/604264.604272}, doi = {10.1145/604264.604272}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigmod/VelACM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.