Malcolm Corney
Malcolm Corney
Kelvin Grove State College
Verified email at eq.edu.au
Title
Cited by
Cited by
Year
Mining e-mail content for author identification forensics
O De Vel, A Anderson, M Corney, G Mohay
ACM Sigmod Record 30 (4), 55-64, 2001
6702001
Gender-preferential text mining of e-mail discourse
M Corney, O De Vel, A Anderson, G Mohay
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
2232002
Language and gender author cohort analysis of e-mail for computer forensics
O De Vel, M Corney, A Anderson, G Mohay
Proceedings of Digital Forensics Research Workshop:, 1-16, 2002
912002
Analysing e-mail text authorship for forensic purposes
MW Corney
Queensland University of Technology, 2003
742003
Multi-topic e-mail authorship attribution forensics
O De Vel, AM Anderson, MW Corney, GM Mohay
ACM, 2001
622001
Engaging students in programming
MW Corney, DM Teague, RN Thomas
Conferences in Research and Practice in Information Technology, Vol. 103 …, 2010
562010
Identifying the Authors of Suspect Email
MW Corney, AM Anderson, GM Mohay, O De Vel
50*2001
A qualitative think aloud study of the early neo-piagetian stages of reasoning in novice programmers
DM Teague, MW Corney, A Ahadi, R Lister
Proceedings of 15th Australasian Computing Education Conference, 2013
422013
Some empirical results for neo-Piagetian reasoning in novice programmers and the relationship to code explanation questions
M Corney, D Teague, A Ahadi, R Lister
Proceedings of the fourteenth australasian computing education conference …, 2012
382012
Early relational reasoning and the novice programmer: swapping as the'hello world'of relational reasoning
M Corney, R Lister, D Teague
Proceedings of the Thirteenth Australiasian Computing Education Conference …, 2011
332011
How difficult are exams? A framework for assessing the complexity of introductory programming exams
J Sheard, A Carbone, D Chinn, T Clear, M Corney, D D'Souza, J Fenwick, ...
Australian Computer Society (ACS) 136, 145-154, 2013
322013
Fraud Detection in ERP Systems Using Scenario Matching
AK Islam, M Corney, G Mohay, A Clark, S Bracher, T Raub, U Flegel
25th IFIP TC11 International Information Security Conference, SEC 2010, 112-123, 2010
262010
Detection of anomalies from user profiles generated from system logs
M Corney, G Mohay, A Clark
Proceedings of the Ninth Australasian Information Security Conference:, 23-31, 2011
232011
E-mail authorship attribution for computer forensics
O de Vel, A Anderson, M Corney, G Mohay
Applications of Data Mining in Computer Security, 229-250, 2002
212002
'explain in plain english'questions revisited: data structures problems
M Corney, S Fitzgerald, B Hanks, R Lister, R McCauley, L Murphy
Proceedings of the 45th ACM technical symposium on Computer science …, 2014
202014
Transaction mining for fraud detection in ERP Systems
RQ Khan, MW Corney, AJ Clark, GM Mohay
Industrial engineering and management systems 9 (2), 141-156, 2010
192010
Using neo-Piagetian theory, formative in-Class tests and think alouds to better understand student thinking: a preliminary report on computer programming
DM Teague, MW Corney, CJ Fidge, MG Roggenkamp, A Ahadi, R Lister
Proceedings of 2012 Australasian Association for Engineering Education (AAEE …, 2012
172012
Toward a shared understanding of competency in programming: An invitation to the BABELnot project
R Lister, MW Corney, J Curran, D D'Souza, CJ Fidge, R Gluga, ...
Proceedings of the 14th Australasian Computing Education Conference (ACE2012 …, 2012
17*2012
Detecting anomalous user activity
U Flegel, S Bracher, P Hochwarth, H Resch, P Sala, S Wollny, H Wang, ...
US Patent 9,710,857, 2017
152017
Swapping as the" Hello World" of relational reasoning: replications, reflections and extensions
DM Teague, MW Corney, A Ahadi, R Lister
Proceedings of Conferences in Research and Practice in Information …, 2012
132012
The system can't perform the operation now. Try again later.
Articles 1–20