Mining e-mail content for author identification forensics O De Vel, A Anderson, M Corney, G Mohay ACM Sigmod Record 30 (4), 55-64, 2001 | 752 | 2001 |
Gender-preferential text mining of e-mail discourse M Corney, O De Vel, A Anderson, G Mohay 18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002 | 274 | 2002 |
Language and gender author cohort analysis of e-mail for computer forensics O De Vel, M Corney, A Anderson, G Mohay Proceedings of Digital Forensics Research Workshop, 1-16, 2002 | 123 | 2002 |
Analysing e-mail text authorship for forensic purposes MW Corney Queensland University of Technology, 2003 | 86 | 2003 |
Engaging students in programming M Corney, D Teague, R Thomas Proceedings of the twelfth Australasian computing education conference, 63-72, 2010 | 72 | 2010 |
Multi-topic e-mail authorship attribution forensics O De Vel, A Anderson, M Corney, G Mohay Proceedings ACM Conference on Computer Security-Workshop on Data Mining for …, 2001 | 69 | 2001 |
Identifying the Authors of Suspect Email MW Corney, AM Anderson, GM Mohay, O De Vel | 59* | 2001 |
Early relational reasoning and the novice programmer: swapping as the'hello world'of relational reasoning M Corney, R Lister, D Teague Proceedings of the Thirteenth Australiasian Computing Education Conference …, 2011 | 57 | 2011 |
A qualitative think aloud study of the early neo-piagetian stages of reasoning in novice programmers D Teague, M Corney, A Ahadi, R Lister Proceedings of the 15th Australasian Computing Education Conference …, 2013 | 53 | 2013 |
'Explain in plain English'questions revisited: Data structures problems M Corney, S Fitzgerald, B Hanks, R Lister, R McCauley, L Murphy Proceedings of the 45th ACM technical symposium on Computer science …, 2014 | 50 | 2014 |
Some empirical results for neo-Piagetian reasoning in novice programmers and the relationship to code explanation questions M Corney, D Teague, A Ahadi, R Lister Proceedings of the fourteenth australasian computing education conference …, 2012 | 50 | 2012 |
How difficult are exams? A framework for assessing the complexity of introductory programming exams J Sheard, A Carbone, D Chinn, T Clear, M Corney, D D'Souza, J Fenwick, ... Australian Computer Society (ACS), 2013 | 42 | 2013 |
Fraud Detection in ERP Systems Using Scenario Matching AK Islam, M Corney, G Mohay, A Clark, S Bracher, T Raub, U Flegel 25th IFIP TC11 International Information Security Conference, SEC 2010, 112-123, 2010 | 37 | 2010 |
Detection of anomalies from user profiles generated from system logs M Corney, G Mohay, A Clark Proceedings of the Ninth Australasian Information Security Conference, 23-31, 2011 | 36 | 2011 |
Detecting anomalous user activity U Flegel, S Bracher, P Hochwarth, H Resch, P Sala, S Wollny, H Wang, ... US Patent 9,710,857, 2017 | 33 | 2017 |
Transaction mining for fraud detection in ERP Systems R Khan, M Corney, A Clark, G Mohay Industrial engineering and management systems 9 (2), 141-156, 2010 | 28 | 2010 |
E-mail authorship attribution for computer forensics O de Vel, A Anderson, M Corney, G Mohay Applications of Data Mining in Computer Security, 229-250, 2002 | 24 | 2002 |
Using neo-Piagetian theory, formative in-Class tests and think alouds to better understand student thinking: a preliminary report on computer programming D Teague, M Corney, C Fidge, M Roggenkamp, A Ahadi, R Lister Proceedings of the 23rd Annual Conference of the Australasian Association …, 2012 | 21 | 2012 |
Toward a shared understanding of competency in programming: An invitation to the BABELnot project R Lister, M Corney, J Curran, D D'Souza, C Fidge, R Gluga, M Hamilton, ... Proceedings of the Fourteenth Australasian Computing Education Conference …, 2012 | 19* | 2012 |
Swapping as the'Hello World'of relational reasoning: Replications, reflections and extensions D Teague, M Corney, A Ahadi, R Lister Proceedings of the Fourteenth Australasian Computing Education Conference …, 2012 | 18 | 2012 |