Follow
Malcolm Corney
Malcolm Corney
Kelvin Grove State College
Verified email at eq.edu.au
Title
Cited by
Cited by
Year
Mining e-mail content for author identification forensics
O De Vel, A Anderson, M Corney, G Mohay
ACM Sigmod Record 30 (4), 55-64, 2001
7562001
Gender-preferential text mining of e-mail discourse
M Corney, O De Vel, A Anderson, G Mohay
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
2762002
Language and gender author cohort analysis of e-mail for computer forensics
O De Vel, M Corney, A Anderson, G Mohay
Proceedings of Digital Forensics Research Workshop, 1-16, 2002
1242002
Analysing e-mail text authorship for forensic purposes
MW Corney
Queensland University of Technology, 2003
862003
Engaging students in programming
M Corney, D Teague, R Thomas
Proceedings of the twelfth Australasian computing education conference, 63-72, 2010
732010
Multi-topic e-mail authorship attribution forensics
O De Vel, A Anderson, M Corney, G Mohay
Proceedings ACM Conference on Computer Security-Workshop on Data Mining for …, 2001
692001
Identifying the Authors of Suspect Email
MW Corney, AM Anderson, GM Mohay, O De Vel
59*2001
Early relational reasoning and the novice programmer: swapping as the'hello world'of relational reasoning
M Corney, R Lister, D Teague
Proceedings of the Thirteenth Australiasian Computing Education Conference …, 2011
582011
A qualitative think aloud study of the early neo-piagetian stages of reasoning in novice programmers
D Teague, M Corney, A Ahadi, R Lister
Proceedings of the 15th Australasian Computing Education Conference …, 2013
562013
Some empirical results for neo-Piagetian reasoning in novice programmers and the relationship to code explanation questions
M Corney, D Teague, A Ahadi, R Lister
Proceedings of the fourteenth australasian computing education conference …, 2012
522012
'Explain in plain English'questions revisited: Data structures problems
M Corney, S Fitzgerald, B Hanks, R Lister, R McCauley, L Murphy
Proceedings of the 45th ACM technical symposium on Computer science …, 2014
502014
How difficult are exams? A framework for assessing the complexity of introductory programming exams
J Sheard, A Carbone, D Chinn, T Clear, M Corney, D D'Souza, J Fenwick, ...
Australian Computer Society (ACS), 2013
422013
Fraud Detection in ERP Systems Using Scenario Matching
AK Islam, M Corney, G Mohay, A Clark, S Bracher, T Raub, U Flegel
25th IFIP TC11 International Information Security Conference, SEC 2010, 112-123, 2010
382010
Detection of anomalies from user profiles generated from system logs
M Corney, G Mohay, A Clark
Proceedings of the Ninth Australasian Information Security Conference, 23-31, 2011
362011
Detecting anomalous user activity
U Flegel, S Bracher, P Hochwarth, H Resch, P Sala, S Wollny, H Wang, ...
US Patent 9,710,857, 2017
332017
Transaction mining for fraud detection in ERP Systems
R Khan, M Corney, A Clark, G Mohay
Industrial engineering and management systems 9 (2), 141-156, 2010
312010
E-mail authorship attribution for computer forensics
O de Vel, A Anderson, M Corney, G Mohay
Applications of Data Mining in Computer Security, 229-250, 2002
242002
Using neo-Piagetian theory, formative in-Class tests and think alouds to better understand student thinking: a preliminary report on computer programming
D Teague, M Corney, C Fidge, M Roggenkamp, A Ahadi, R Lister
Proceedings of the 23rd Annual Conference of the Australasian Association …, 2012
212012
Toward a shared understanding of competency in programming: An invitation to the BABELnot project
R Lister, M Corney, J Curran, D D'Souza, C Fidge, R Gluga, M Hamilton, ...
Proceedings of the Fourteenth Australasian Computing Education Conference …, 2012
19*2012
Swapping as the'Hello World'of relational reasoning: Replications, reflections and extensions
D Teague, M Corney, A Ahadi, R Lister
Proceedings of the Fourteenth Australasian Computing Education Conference …, 2012
182012
The system can't perform the operation now. Try again later.
Articles 1–20