Malcolm Corney
Malcolm Corney
Kelvin Grove State College
Bestätigte E-Mail-Adresse bei eq.edu.au
Titel
Zitiert von
Zitiert von
Jahr
Mining e-mail content for author identification forensics
O De Vel, A Anderson, M Corney, G Mohay
ACM Sigmod Record 30 (4), 55-64, 2001
6472001
Gender-preferential text mining of e-mail discourse
M Corney, O De Vel, A Anderson, G Mohay
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
2192002
Language and gender author cohort analysis of e-mail for computer forensics
O De Vel, M Corney, A Anderson, G Mohay
Proceedings of Digital Forensics Research Workshop:, 1-16, 2002
872002
Analysing e-mail text authorship for forensic purposes
MW Corney
Queensland University of Technology, 2003
732003
Multi-topic e-mail authorship attribution forensics
O De Vel, AM Anderson, MW Corney, GM Mohay
ACM, 2001
612001
Engaging students in programming
MW Corney, DM Teague, RN Thomas
Conferences in Research and Practice in Information Technology, Vol. 103 …, 2010
552010
Identifying the Authors of Suspect Email
MW Corney, AM Anderson, GM Mohay, O De Vel
46*2001
A qualitative think aloud study of the early neo-piagetian stages of reasoning in novice programmers
DM Teague, MW Corney, A Ahadi, R Lister
Proceedings of 15th Australasian Computing Education Conference, 2013
402013
Some empirical results for neo-Piagetian reasoning in novice programmers and the relationship to code explanation questions
M Corney, D Teague, A Ahadi, R Lister
Proceedings of the fourteenth australasian computing education conference …, 2012
372012
How difficult are exams? A framework for assessing the complexity of introductory programming exams
J Sheard, A Carbone, D Chinn, T Clear, M Corney, D D'Souza, J Fenwick, ...
Australian Computer Society (ACS) 136, 145-154, 2013
312013
Early relational reasoning and the novice programmer: swapping as the'hello world'of relational reasoning
M Corney, R Lister, D Teague
Proceedings of the Thirteenth Australiasian Computing Education Conference …, 2011
312011
Fraud Detection in ERP Systems Using Scenario Matching
AK Islam, M Corney, G Mohay, A Clark, S Bracher, T Raub, U Flegel
25th IFIP TC11 International Information Security Conference, SEC 2010, 112-123, 2010
252010
Detection of anomalies from user profiles generated from system logs
M Corney, G Mohay, A Clark
Proceedings of the Ninth Australasian Information Security Conference:, 23-31, 2011
212011
E-mail authorship attribution for computer forensics
O de Vel, A Anderson, M Corney, G Mohay
Applications of Data Mining in Computer Security, 229-250, 2002
212002
'explain in plain english'questions revisited: data structures problems
M Corney, S Fitzgerald, B Hanks, R Lister, R McCauley, L Murphy
Proceedings of the 45th ACM technical symposium on Computer science …, 2014
182014
Transaction mining for fraud detection in ERP Systems
RQ Khan, MW Corney, AJ Clark, GM Mohay
Industrial engineering and management systems 9 (2), 141-156, 2010
182010
Using neo-Piagetian theory, formative in-Class tests and think alouds to better understand student thinking: a preliminary report on computer programming
DM Teague, MW Corney, CJ Fidge, MG Roggenkamp, A Ahadi, R Lister
Proceedings of 2012 Australasian Association for Engineering Education (AAEE …, 2012
172012
Toward a shared understanding of competency in programming: An invitation to the BABELnot project
R Lister, MW Corney, J Curran, D D'Souza, CJ Fidge, R Gluga, ...
Proceedings of the 14th Australasian Computing Education Conference (ACE2012 …, 2012
16*2012
Swapping as the" Hello World" of relational reasoning: replications, reflections and extensions
DM Teague, MW Corney, A Ahadi, R Lister
Proceedings of Conferences in Research and Practice in Information …, 2012
132012
Detecting anomalous user activity
U Flegel, S Bracher, P Hochwarth, H Resch, P Sala, S Wollny, H Wang, ...
US Patent 9,710,857, 2017
112017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20