Malcolm Corney
Malcolm Corney
Kelvin Grove State College
Verified email at
Cited by
Cited by
Mining e-mail content for author identification forensics
O De Vel, A Anderson, M Corney, G Mohay
ACM Sigmod Record 30 (4), 55-64, 2001
Gender-preferential text mining of e-mail discourse
M Corney, O De Vel, A Anderson, G Mohay
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
Language and gender author cohort analysis of e-mail for computer forensics
O De Vel, M Corney, A Anderson, G Mohay
Proceedings of Digital Forensics Research Workshop:, 1-16, 2002
Analysing e-mail text authorship for forensic purposes
MW Corney
Queensland University of Technology, 2003
Multi-topic e-mail authorship attribution forensics
O De Vel, AM Anderson, MW Corney, GM Mohay
ACM, 2001
Engaging students in programming
MW Corney, DM Teague, RN Thomas
Conferences in Research and Practice in Information Technology, Vol. 103 …, 2010
Identifying the Authors of Suspect Email
MW Corney, AM Anderson, GM Mohay, O De Vel
A qualitative think aloud study of the early neo-piagetian stages of reasoning in novice programmers
DM Teague, MW Corney, A Ahadi, R Lister
Proceedings of 15th Australasian Computing Education Conference, 2013
Some empirical results for neo-Piagetian reasoning in novice programmers and the relationship to code explanation questions
M Corney, D Teague, A Ahadi, R Lister
Proceedings of the fourteenth australasian computing education conference …, 2012
Early relational reasoning and the novice programmer: swapping as the'hello world'of relational reasoning
M Corney, R Lister, D Teague
Proceedings of the Thirteenth Australiasian Computing Education Conference …, 2011
How difficult are exams? A framework for assessing the complexity of introductory programming exams
J Sheard, A Carbone, D Chinn, T Clear, M Corney, D D'Souza, J Fenwick, ...
Australian Computer Society (ACS) 136, 145-154, 2013
Fraud Detection in ERP Systems Using Scenario Matching
AK Islam, M Corney, G Mohay, A Clark, S Bracher, T Raub, U Flegel
25th IFIP TC11 International Information Security Conference, SEC 2010, 112-123, 2010
Detection of anomalies from user profiles generated from system logs
M Corney, G Mohay, A Clark
Proceedings of the Ninth Australasian Information Security Conference:, 23-31, 2011
E-mail authorship attribution for computer forensics
O de Vel, A Anderson, M Corney, G Mohay
Applications of Data Mining in Computer Security, 229-250, 2002
'explain in plain english'questions revisited: data structures problems
M Corney, S Fitzgerald, B Hanks, R Lister, R McCauley, L Murphy
Proceedings of the 45th ACM technical symposium on Computer science …, 2014
Transaction mining for fraud detection in ERP Systems
RQ Khan, MW Corney, AJ Clark, GM Mohay
Industrial engineering and management systems 9 (2), 141-156, 2010
Using neo-Piagetian theory, formative in-Class tests and think alouds to better understand student thinking: a preliminary report on computer programming
DM Teague, MW Corney, CJ Fidge, MG Roggenkamp, A Ahadi, R Lister
Proceedings of 2012 Australasian Association for Engineering Education (AAEE …, 2012
Toward a shared understanding of competency in programming: An invitation to the BABELnot project
R Lister, MW Corney, J Curran, D D'Souza, CJ Fidge, R Gluga, ...
Proceedings of the 14th Australasian Computing Education Conference (ACE2012 …, 2012
Detecting anomalous user activity
U Flegel, S Bracher, P Hochwarth, H Resch, P Sala, S Wollny, H Wang, ...
US Patent 9,710,857, 2017
Swapping as the" Hello World" of relational reasoning: replications, reflections and extensions
DM Teague, MW Corney, A Ahadi, R Lister
Proceedings of Conferences in Research and Practice in Information …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20