BibTeX records: Malcolm Corney

download as .bib file

@inproceedings{DBLP:conf/sigcse/CorneyFHLMM14,
  author       = {Malcolm Corney and
                  Sue Fitzgerald and
                  Brian Hanks and
                  Raymond Lister and
                  Ren{\'{e}}e A. McCauley and
                  Laurie Murphy},
  editor       = {J. D. Dougherty and
                  Kris Nagel and
                  Adrienne Decker and
                  Kurt Eiselt},
  title        = {'explain in plain english' questions revisited: data structures problems},
  booktitle    = {The 45th {ACM} Technical Symposium on Computer Science Education,
                  {SIGCSE} 2014, Atlanta, GA, USA, March 5-8, 2014},
  pages        = {591--596},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2538862.2538911},
  doi          = {10.1145/2538862.2538911},
  timestamp    = {Tue, 23 Mar 2021 10:54:19 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/CorneyFHLMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ace/TeagueCAL13,
  author       = {Donna Teague and
                  Malcolm Corney and
                  Alireza Ahadi and
                  Raymond Lister},
  editor       = {Angela Carbone and
                  Jacqueline L. Whalley},
  title        = {A qualitative think aloud study of the early neo-piagetian stages
                  of reasoning in novice programmers},
  booktitle    = {Proceedings of the Fifteenth Australasian Computing Education Conference,
                  {ACE} '13, Adelaide, Australia, January 29 - February 1, 2013},
  pages        = {87--95},
  publisher    = {Australian Computer Society / {ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2667209},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ace/TeagueCAL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ace/SheardSCCCCDFHL13,
  author       = {Judy Sheard and
                  Simon and
                  Angela Carbone and
                  Donald Chinn and
                  Tony Clear and
                  Malcolm Corney and
                  Daryl J. D'Souza and
                  Joel Fenwick and
                  James Harland and
                  Mikko{-}Jussi Laakso and
                  Donna Teague},
  editor       = {Angela Carbone and
                  Jacqueline L. Whalley},
  title        = {How difficult are exams?: a framework for assessing the complexity
                  of introductory programming exams},
  booktitle    = {Proceedings of the Fifteenth Australasian Computing Education Conference,
                  {ACE} '13, Adelaide, Australia, January 29 - February 1, 2013},
  pages        = {145--154},
  publisher    = {Australian Computer Society / {ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2667215},
  timestamp    = {Thu, 23 Jun 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ace/SheardSCCCCDFHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/CorneyMC11,
  author       = {Malcolm Corney and
                  George M. Mohay and
                  Andrew J. Clark},
  editor       = {Colin Boyd and
                  Josef Pieprzyk},
  title        = {Detection of Anomalies from User Profiles Generated from System Logs},
  booktitle    = {Ninth Australasian Information Security Conference, {AISC} 2011, Perth,
                  Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {116},
  pages        = {23--32},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV116Corney.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/CorneyMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/IslamCMCBRF11,
  author       = {Asadul K. Islam and
                  Malcolm Corney and
                  George M. Mohay and
                  Andrew J. Clark and
                  Shane Bracher and
                  Tobias Raub and
                  Ulrich Flegel},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {Detecting Collusive Fraud in Enterprise Resource Planning Systems},
  booktitle    = {Advances in Digital Forensics {VII} - 7th {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Orlando, FL, USA, January 31 - February
                  2, 2011, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {361},
  pages        = {143--153},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24212-0\_11},
  doi          = {10.1007/978-3-642-24212-0\_11},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/IslamCMCBRF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/IslamCMCBRF10,
  author       = {Asadul K. Islam and
                  Malcolm Corney and
                  George M. Mohay and
                  Andrew J. Clark and
                  Shane Bracher and
                  Tobias Raub and
                  Ulrich Flegel},
  editor       = {Kai Rannenberg and
                  Vijay Varadharajan and
                  Christian Weber},
  title        = {Fraud Detection in {ERP} Systems Using Scenario Matching},
  booktitle    = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
                  International Information Security Conference, {SEC} 2010, Held as
                  Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {330},
  pages        = {112--123},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15257-3\_11},
  doi          = {10.1007/978-3-642-15257-3\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/IslamCMCBRF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CorneyVAM02,
  author       = {Malcolm Corney and
                  Olivier Y. de Vel and
                  Alison Anderson and
                  George M. Mohay},
  title        = {Gender-Preferential Text Mining of E-mail Discourse},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {282--289},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176299},
  doi          = {10.1109/CSAC.2002.1176299},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CorneyVAM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/02/VelACM02,
  author       = {Olivier Y. de Vel and
                  Alison Anderson and
                  Malcolm Corney and
                  George M. Mohay},
  editor       = {Daniel Barbar{\'{a}} and
                  Sushil Jajodia},
  title        = {E-Mail Authorship Attribution for Computer Forensics},
  booktitle    = {Applications of Data Mining in Computer Security},
  series       = {Advances in Information Security},
  pages        = {229--250},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-0953-0\_9},
  doi          = {10.1007/978-1-4615-0953-0\_9},
  timestamp    = {Fri, 26 Jul 2019 10:53:31 +0200},
  biburl       = {https://dblp.org/rec/books/sp/02/VelACM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmod/VelACM01,
  author       = {Olivier Y. de Vel and
                  Alison Anderson and
                  Malcolm Corney and
                  George M. Mohay},
  title        = {Mining Email Content for Author Identification Forensics},
  journal      = {{SIGMOD} Rec.},
  volume       = {30},
  number       = {4},
  pages        = {55--64},
  year         = {2001},
  url          = {https://doi.org/10.1145/604264.604272},
  doi          = {10.1145/604264.604272},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigmod/VelACM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics