| 2024 |
Falco, G., Boschetti, N., Viswanathan, A., Bailey, B., Slay, J., Bennett, S., & Yahia, O. B. (2024). Minimum requirements for space system cybersecurity-ensuring cyber access to space. In Proceedings - 2024 IEEE 10th International Conference on Space Mission Challenges for Information Technology, SMC-IT 2024 (pp. 78-88). US: IEEE. DOI |
| 2023 |
Law, Y. W., Gliponeo, J. J., Singh, D., McGuire, J., Liang, J., Ho, S. Y., & Slay, J. (2023). Detecting and tracking hypersonic glide vehicles: a cybersecurity-engineering analysis of academic literature. In R. L. Curran (Ed.), Proceedings of the 18th International Conference on Cyber Warfare and Security Vol. 18 (pp. 189-198). UK: Academic Conferences International Limited. DOI WoS3 |
| 2023 |
Uhongora, U., Mulinde, R., Law, Y. W., & Slay, J. (2023). Deep-learning-based Intrusion Detection for Software-defined Networking Space Systems. In European Conference on Information Warfare and Security Eccws Vol. 2023-June (pp. 639-647). UK: Academic Conferences and Publishing International Ltd. DOI Scopus7 |
| 2023 |
Edwards, A., Law, Y. W., Mulinde, R., & Slay, J. (2023). Evaluation of Quantum Key Distribution for Secure Satellite-integrated IoT Networks. In R. L. Wilson, & M. B. Curran (Eds.), PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS Vol. 18 (pp. 67-76). UK: ACAD CONFERENCES LTD. DOI WoS2 |
| 2023 |
Uhongora, U., Plotnek, J., Mulinde, R., Thinyane, M., & Slay, J. (2023). Analyzing threats to SDN-based space systems using SPARTA framework. In Accelerating Space Commerce, Exploration, and New Discovery Conference, ASCEND 2023 Vol. 1 (pp. 1-9). US: American Institute of Aeronautics and Astronautics. DOI |
| 2022 |
Law, Y. W., & Slay, J. (2022). SIEM4GS: Security information and event management for a virtual ground station testbed. In T. Eze, N. Khan, & C. Onwubiko (Eds.), Proceedings of the 21st European Conference on Cyber Warfare and Security Vol. 21 (pp. 150-159). UK: Academic Conferences International Limited. |
| 2022 |
Plotnek, J. J., & Slay, J. (2022). A new dawn for space security. In Proceedings Of The 17Th International Conference On Cyber Warfare And Security (ICCWS 2022) Vol. 17 (pp. 253-261). UK: Acada Conferences. DOI |
| 2022 |
Law, Y. W., & Slay, J. (2022). SIEM4GS: Security Information and Event Management for a Virtual Ground Station Testbed. In European Conference on Information Warfare and Security Eccws Vol. 2022-June (pp. 150-159). Academic Conferences and Publishing International Ltd. DOI |
| 2021 |
Ormrod, D., Slay, J., & Ormrod, A. (2021). Cyber-worthiness and cyber-resilience to secure low earth orbit satellites. In J. Lopez, A. Siraj, & K. Perumalla (Eds.), Proceedings of the 16th International Conference on Cyber Warfare and Security (ICCWS 2021) (pp. 257-266). UK: ACI - Academic Conferences International. DOI |
| 2021 |
van der Watt, R., & Slay, J. (2021). Modification of the Lockheed Martin Cyber Kill Chain (LMCKC) for cyber security breaches concerning low earth orbit (LEO) satellites. In Proceedings of the 16th International Conference on Cyber Warfare and Security (ICCWS 2021) (pp. 473-485). UK: Academic Conferences International. DOI |
| 2018 |
Moustafa, N., Creech, G., & Slay, J. (2018). Anomaly detection system using beta mixture models and outlier detection. In Advances in Intelligent Systems and Computing Vol. 710 (pp. 125-135). Switzerland: Springer. DOI |
| 2018 |
Moustafa, N., Creech, G., & Slay, J. (2018). Flow aggregator module for analysing network traffic. In Advances in Intelligent Systems and Computing Vol. 710 (pp. 19-29). Singapore: Springer. DOI |
| 2018 |
Koroniotis, N., Moustafa, N., Sitnikova, E., & Slay, J. (2018). Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques. In J. Hu (Ed.), 9th International Conference on Mobile Networks and Management, MONAMI 2017 (pp. 30-44). US: Springer. DOI |
| 2018 |
Moustafa, N., & Slay, J. (2018). A network forensic scheme using correntropy-variation for attack detection. In IFIP International Conference on Digital Forensics: Advances in Digital Forensics XIV (pp. 225-239). US: Springer. DOI |
| 2017 |
Senarath, A., Arachchilage, N. A. G., & Slay, J. (2017). Designing privacy for you: a practical approach for user-centric privacy. In T. Tryfonas (Ed.), 5th International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2017 Vol. 10292 (pp. 739-752). US: Springer. DOI |
| 2017 |
Wijayarathna, C., Arachchilage, N. A. G., & Slay, J. (2017). A generic cognitive dimensions questionnaire to evaluate the usability of security APIs. In T. Tryfonas (Ed.), 5th International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2017 Vol. 10292 (pp. 160-173). US: Springer. DOI |
| 2015 |
Elsayed, S., Sarker, R., & Slay, J. (2015). Evaluating the performance of a differential evolution algorithm in anomaly detection. In 2015 IEEE Congress on Evolutionary Computation, CEC 2015 - Proceedings (pp. 2490-2497). US: IEEE. DOI |
| 2015 |
Moustafa, N., & Slay, J. (2015). The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems. In Proceedings - 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2015 (pp. 25-31). US: IEEE. DOI |
| 2015 |
Moustafa, N., & Slay, J. (2015). UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings (pp. 1-6). US: IEEE. DOI |
| 2015 |
Shah, Z., Mahmood, A. N., & Slay, J. (2015). Forensic potentials of solid state drives. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST Vol. 153 (pp. 113-126). US: Springer. DOI |
| 2015 |
Ismail, S., Sitnikova, E., & Slay, J. (2015). SCADA systems cyber security for critical infrastructures: case studies in the transport sector. In J. Zaaiman, & L. Leenen (Eds.), Proceedings of the 10th International Conference on Cyber Warfare and Security, ICCWS 2015 (pp. 425-433). UK: Academic Conferences International Limited. |
| 2015 |
Ismail, S., Sitnikova, E., & Slay, J. (2015). Studying SCADA organisations information security goals: an integrated system theory approach. In Pacific Asia Conference on Information Systems, PACIS 2015 - Proceedings (pp. 1-14). US: Association for Information Systems. |
| 2015 |
Moustafa, N., & Slay, J. (2015). Creating novel features to anomaly network detection using DARPA-2009 data set. In N. Abouzakhar (Ed.), Proceedings of the 14th European Conference on Cyber Warfare and Security (ECCWS-2015) (pp. 204-212). US: Academic Conferences & Publishing International. |
| 2015 |
Moustafa, N., & Slay, J. (2015). A hybrid feature selection for network intrusion detection systems: central points. In B. Hutchinson (Ed.), Australian Information Warfare and Security Conference (pp. 5-13). Australia: Security Research Institute, Edith Cowan University. DOI |
| 2014 |
Ismail, S., Sitnikova, E., & Slay, J. (2014). Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: a pilot study. In 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD14) (pp. 1000-1006). US: IEEE Press. DOI |
| 2014 |
Xie, M., Hu, J., & Slay, J. (2014). Evaluating host-based anomaly detection systems: application of the one-class SVM algorithm to ADFA-LD. In 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD (pp. 978-982). US: IEEE. DOI Scopus70 |
| 2013 |
Ariffin, A., Slay, J., & Choo, K. K. (2013). Data recovery from proprietary-formatted CCTV hard disks. In G. Peterson, & S. Shenoi (Eds.), Advances in digital forensics IX (pp. 213-223). US: Springer. DOI |
| 2013 |
Ariffin, A., Choo, K. K. R., & Slay, J. (2013). Digital camcorder forensics. In C. Thomborson, & U. Parampalli (Eds.), AISC '13 Proceedings of the Eleventh Australasian Information Security Conference (pp. 39-47). Australia: Australian Computer Society. |
| 2013 |
Ariffin, A., D'Orazio, C. J., Choo, K. K., & Slay, J. (2013). iOS forensics: how can we recover deleted image files with timestamp in a forensically sound manner?. In Proceedings: 2013 International Conference on Availability, Reliability and Security: ARES 2013 (pp. 375-382). US: IEEE Press. DOI |
| 2012 |
Osborne, G., Turnbull, B., & Slay, J. (2012). Development of info vis software for digital forensics. In Proceedings : 2012 IEEE 36th International Conference on Computer Software and Applications Workshops (pp. 213-217). US: IEEE. DOI |
| 2012 |
Sitnikova, E., & Slay, J. (2012). Pathway into a security professional: a new cyber security and forensic computing curriculum. In 2012 Proceedings of the Conference on Digital Forensics, Security & Law (pp. 193-203). US: Association of Digital Forensics, Security and Law. |
| 2012 |
Osborne, G., Thinyane, H., & Slay, J. (2012). Visualizing information in digital forensics. In G. Peterson, & S. Shenoi (Eds.), Advances in digital forensics VIII (pp. 35-47). Germany: Springer. DOI |
| 2011 |
Simon, M. P., & Slay, J. (2011). Recovery of pidgin chat communication artefacts from physical memory: a pilot test to determine feasibility. In Proceedings of the sixth international conference on availability, reliability and security ARES 2011 (pp. 183-188). US: IEEE. DOI |
| 2011 |
Osborne, G., & Slay, J. (2011). Digital forensics infovis: an implementation of a process for visualisation of digital evidence. In Proceedings of the Sixth International Conference on Availability, Reliability and Security ARES 2011 (pp. 196-201). US: IEEE. DOI |
| 2011 |
Hunt, R., & Slay, J. (2011). A new approach to developing attack taxonomies for network security - including case studies. In Proceedings of the 17th IEEE International Conference on Networks (pp. 281-286). Singapore: IEEE. DOI |
| 2010 |
Simon, M., & Slay, J. (2010). Recovery of Skype application activity data from physical memory. In Proceedings of the Fifth International Conference on Availability, Reliability and Security ARES 2010 (pp. 283-288). US: IEEE. DOI |
| 2010 |
Guo, Y., & Slay, J. (2010). A function oriented methodology to validate and verify forensic copy function of digital forensic tools. In Proceedings of the Fifth International Conference on Availability, Reliability and Security (pp. 665-670). US: IEEE. DOI |
| 2010 |
Hunt, R., & Slay, J. (2010). The design of real-time adaptive forensically sound secure critical infrastructure. In Proceedings of the 4th international conference on network and system security (pp. 328-333). US: IEEE. DOI |
| 2010 |
Hunt, R., & Slay, J. (2010). Achieving critical infrastructure protection through the interaction of computer security and network forensics. In Proceedings of the 8th annual conference on privacy, security and trust (pp. 23-30). US: IEEE. DOI |
| 2010 |
Simon, M., & Slay, J. (2010). What are you looking for: identification of remnant communication artefacts in physical memory!. In C. Valli (Ed.), Proceedings of the 2010 international cyber resilience conference. Australia: Edith Cowan University. |
| 2010 |
Osborne, G., Turnbull, B., & Slay, J. (2010). The 'Explore, Investigate and Correlate' (EIC) conceptual framework for digital forensics information visualisation. In Proceedings of the Fifth International Conference on Availability, Reliability and Security (pp. 629-634). US: IEEE. DOI |
| 2009 |
Simon, M., & Slay, J. (2009). Enhancement of forensic computing investigations through memory forensic techniques. In Proceedings of the International Conference on Availability, Reliability and Security ARES 2009 (pp. 995-1000). US: IEEE. DOI |
| 2009 |
Sitnikova, E., & Slay, J. (2009). Enhancing industrial control systems cyber-security capabilities: strategic plans, prevention and response. In 2009 Automation & Communication Technologies in Power Conference (pp. 1-7). Australia: IDC Technologies. |
| 2009 |
Slay, J., Sitnikova, E., Campbell, A. P., Daniels, W. M., & May, R. (2009). Process control system security and forensics: a risk management simulation. In E. Leigh (Ed.), SIMTECT 2009: Simulation Concepts Capability and Technology (pp. 349-353). Australia: Simulation Industry Association Of Australia. |
| 2008 |
Slay, J., & Sitnikova, E. (2008). Developing SCADA systems security course within a systems engineering program. In Proceedings of the 12th Colloquium for Information systems security education (CISSE) (pp. 101-108). US: CISSE. |
| 2008 |
Broadway, J., Turnbull, B., & Slay, J. (2008). Improving the analysis of lawfully intercepted network packet data captured for forensic analysis. In Third international conference on availability, security and reliability ARES 08 (pp. 1361-1368). US: IEEE. DOI |
| 2008 |
Lin, Y. C., Slay, J., & Lin, I. L. (2008). Computer forensics and culture. In IEEE International Conference on Intelligence and Security Informatics, ISI 2008 Workshops: PAISI, PACCF, and SOCO 2008 Vol. 5075 (pp. 288-297). US: Springer. DOI |
| 2008 |
Turnbull, B., & Slay, J. (2008). Wi-Fi network signals as a source of digital evidence: wireless network forensics. In S. Jakoubi, S. Tjoa, & E. R. Weippl (Eds.), Third international conference on availability, security and reliability proceedings (ARES 08) (pp. 1355-1360). US: IEEE. DOI |
| 2008 |
Slay, J., & Simon, M. (2008). Voice over IP forensics. In M. Sorell, & L. White (Eds.), e-forensics: 1st international conference on forensic applications and techniques in telecommunications, information and multimedia (pp. 1-6). US: ACM. DOI |
| 2007 |
Lin, Y. C., Slay, J., & Lin, P. (2007). A study on the necessity of integrating non-repudiation into MANET : from computer forensic perspective. In Cyberspace 2007 : Cyber Security, Cyber Crime and Cyber Law. Taiwan: National Library Publisher. |
| 2007 |
Turnbull, B. P., & Slay, J. (2007). Wireless forensic analysis tools for use in the electronic evidence collection process. In Proceedings of the 40th annual Hawaii international conference on system sciences (pp. 267a). USA: IEEE Computer Society. DOI |
| 2007 |
Simon, M. P., & Slay, J. (2007). Forensic computing training, certification and accreditation: an Australian overview. In L. Futcher, & R. Dodge (Eds.), Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA (pp. 109-112). US: Springer,. DOI |
| 2007 |
Radenovic, V., & Slay, J. (2007). An investigation into the suitability of unidirectional networks for use in e-Commerce Security. In R. Remenyi, & D. D. (Eds.), Proceedings of the 6th European Conference on Information Warfare and Security. Reading, UK: Academic Conference International. |
| 2007 |
Morrison, J. B., & Slay, J. (2007). Does knowledge management theory support the achievment of knowledge superiority in defence?. In Simulation : Improving capability and competitiveness. Queensland: Simulation Industry Association of Australia. |
| 2007 |
Beckett, J. J., & Slay, J. (2007). Digital forensics : validation and verification in a dynamic work environment. In Proceedings of the 40th annual Hawaii international conference on system sciences (pp. 266a). USA: IEEE Computer Society. DOI |
| 2007 |
Slay, J., & Przibilla, A. T. (2007). iPod forensics : forensically sound examination of an Apple iPod. In Proceedings of the 40th annual Hawaii international conference on system sciences (pp. 267c). USA: IEEE Computer Society. DOI |
| 2006 |
Lin, Y., & Slay, J. (2006). QoS Issues of Using Probabilistic Non-Repudiation Protocol in Mobile Ad Hoc Network Environment. In 4th Australian Information Security Management Conference. Perth. |
| 2006 |
Wilsdon, T. W., & Slay, J. (2006). Forensic Computing Tool Testing utilizing Black Box Techniques. In 4th Australian Digital Forensics Conference. Edith Cowan University. |
| 2006 |
Beckett, J. J., Slay, J., & Turnbull, B. P. (2006). Forensic computing: developing specialist expertise within the CS curriculum. In Proceedings of the 10th Colloquium for Information Systems Security Education. Florida: The Printing House Inc. |
| 2006 |
Simon, M. P., & Slay, J. (2006). Voice over IP : forensic computing implications. In Proceedings of the 4th Australian digital forensics conference. Western Australia: Edith Cowan University. |
| 2006 |
Slay, J., & Miller, M. B. (2006). A Security Architecture for SCADA Networks. In ACIS 2006 Proceedings. Australia: Australiasian Association for Information Systems. |
| 2006 |
Slay, J., & Turnbull, B. P. (2006). The need for a technical approach to digital forensic evidence collection for wireless technologies. In Proceedings of the 2006 IEEE workshop on information assurance (pp. 124-132). United States: IEEE. DOI |
| 2006 |
Mubarak, S., & Slay, J. (2006). An explorative study on information security of trust accounts within law firms in South Australia : implications for IT security management. In P. Pichappah, & P. Pit (Eds.), Proceedings : First IEEE International Conference on Digital Information Management (pp. 55-62). United States: IEEE. DOI |
| 2006 |
Lin, Y. C., & Slay, J. (2006). All-or-nothing solution to the problem in the utilization of probabilistic non-repudiation protocol in MANETs. In Proceedings of the 2006 Conference on Information Management and Practices. Taiwan: NTCB. |
| 2006 |
Wilsdon, T. W., & Slay, J. (2006). Validation of forensic computing software utilizing black box testing techniques. In Proceedings of the 4th Australian Digital Forensics Conference. Western Australia: Edith Cowan University. |
| 2005 |
Blundell, B. D., Huang, D., Slay, J., Turnbull, B. P., & Wilsdon, T. W. (2005). Development of a zero-skills forensic laptop registration and identification tool. In European Conference of Information Warfare Glamorgan. |
| 2005 |
Slay, J., Dong, X., Blundell, B., Turnbull, B. P., & Wilsdon, T. W. (2005). Development of a 'zero-skills' forensic laptop registration and identification tool. In Proceedings of the European Conference on Information Warfare. University of Glamorgan, UK: Academic Conferences. |
| 2005 |
Turnbull, B. P., Blundell, B. D., & Slay, J. (2005). Googling Forensics- an analysis of the Google Desktop Search. In 3rd Australian Network, Information and Computer Forensics Conference. Perth Australia. |
| 2005 |
Slay, J. (2005). Developing the cross-disciplinary nature of information assurance in the undergraduate curriculum. In Proceedings of the 9th Colloquium for Information Systems Security Education. Georgia: Georgia Institute of Technology. |
| 2005 |
Lin, Y. C., & Slay, J. (2005). Non-repudiation in pure mobile ad hoc network. In Proceedings of the 3rd Australian Information Security Management Conference. Western Australia: Edith Cowan University. |
| 2005 |
Wilsdon, T. W., & Slay, J. (2005). Digital forensics: Exploring validation, verification and certification. In Proceedings of the first international workshop on systematic approaches to digital forensic engineering (pp. 48-55). USA: IEEE. DOI |
| 2005 |
Slay, J., & Turnbull, B. P. (2005). The 802.11 technology gap - case studies in crime. In Tencon 2005 - 2005 IEEE region 10 proceeding (pp. 1-7). USA: IEEE. DOI |
| 2005 |
Slay, J., & Lock, P. (2005). Developing an undergraduate IT security stream: industry certification and the development of graduate qualities. In Success Through Information Security Knowledge: Proceedings of the IFIP TC11 WG 11.8. Russia: Moscow Engineering Physics Institute. |
| 2005 |
Wilsdon, T. W., & Slay, J. (2005). Towards a validation framework for forensic computing tools in Australia. In Proceedings of the 4th European Conference on Information Warfare and Security. UK: Academic Conferences. |
| 2005 |
Turnbull, B. P., Blundell, B., & Slay, J. (2005). Googling forensics. In Proceedings of the 3rd Australian Computer Network and Information Forensics Conference. W Australia, online: http://scissec.scis.ecu.edu.au/wordpress/conference_proceedings/2005/forensics/: Edith Cowan University. |
| 2005 |
Slay, J., & Jorgensen, K. (2005). Applying filter clusters to reduce search state space. In Advances in digital forensics : IFIP International Conference on Digital Forensics, National Center for Forensic Science Vol. 194 (pp. 295-301). US: Springer. DOI |
| 2004 |
Li, X., & Slay, J. (2004). Securing wireless ad hoc networks: towards agent security architecture. In Proceedings of the Fifth Australian Information Warfare and Security Conference: From Information Warfare to Information Operations (pp. 1-5). Western Australia: Edith Cowan University. |
| 2004 |
Slay, J., & Turnbull, B. P. (2004). The uses and limitations of unidirectional network bridges in a secure electronic commerce environment. In Proceedings of the 4th International Network Conference. UK: University of Plymouth. |
| 2004 |
Slay, J., Hannan, M. B., Broucek, V., & Turner, P. (2004). Developing forensic computing tools and techniques within a holistic framework: an Australian approach. In Proceedings from the 5th IEEE SMC (systems, man and cybernetics) information assurance workshop (pp. 394-400). Piscataway, NJ, USA: IEEE. DOI |
| 2004 |
Wilsdon, T. W., & Slay, J. (2004). A review of the security and performance issues in the use of voice over IP for rural telecommunication provision. In EICAR 2004 Conference: Best Paper Proceedings. France: EICAR (Ecole Internationale de Creation Audiovisuelle et de Realisation). |
| 2004 |
Kuusisto, T., Slay, J., & Kuusisto, R. (2004). An information security culture approach to knowledge security. In H. Hutchinson, & W. William (Eds.), Proceedings of 5th Australian Information Warfare and Security Conference. Australia: Edith Cowan University. |
| 2004 |
Slay, J., & Quirchmayr, G. (2004). A formal model for the relationship between culture and trust within IS security management. In 2nd Australian Information Security Management Conference: Securing the Future. Western Australia: Edith Cowan University. |
| 2004 |
Slay, J. (2004). Embedding industry standards within the undergraduate IT security curriculum : an Australian implementation. In Proceedings from the eighth colloquium for information systems security education : June 7-10, 2004, West Point, New York. USA: CISSE. |
| 2004 |
Li, X., Gordon, S. D., & Slay, J. (2004). On demand public key management for wireless ad hoc networks. In Australian Telecommunication Networks & Applications Conference (ATNAC) 2004. Australia: ATNAC 2004. |
| 2004 |
Slay, J., & Drymalik, C. P. (2004). An investigation of the effect of work place culture on the security of user passwords. In The 3rd European Conference of Information Warfare and Security Proceedings. UK: Academic Conferences International. |
| 2003 |
Quirchmayr, G., Slay, J., Koronios, A. P., & Darzanos, K. (2003). A business process engineering based approach towards incorporating security in the design of global information systems. In Proceedings of the Seventh Pacific Asia Conference on Information Systems. Australia. |
| 2003 |
Kurzel, F., Slay, J., & Hagenus, K. (2003). Personalising the learning environment. In 2003 Informing Science and Information Technology Education. USA: Informing Science Institute. |
| 2003 |
Turnbull, B. P., & Slay, J. (2003). Separated networks and unidirectional network bridges in a secure electronic commerce environment. In Proceedings of the 4th Australian Information Warfare and IT Security Conference (pp. 341-346). Australia: University of South Australia. |
| 2003 |
Darzanos, K., Wahlstrom, K. A., Slay, J., Mills, J. E., & Ayre, M. (2003). Increasing the participation of female students in IT education: a University of South Australia case study. In S. Spencer (Ed.), AusWIT2003 Participation, Progress and Potential: Proceedings of the 2003 Australian Women in IT Conference. Australia: University of Tasmania. |
| 2003 |
Kurzel, F., & Slay, J. (2003). Towards a personalised learning environment. In AUSWEB2003. Lismore, Australia: Southern Cross University. |
| 2003 |
Kurzel, F., & Slay, J. (2003). The development of a personalised learning environment. In Information Communication Technologies in Education. http://www.ineag.gr/icicte/papers2003/toc.htm: National and Kapodistrian University of Athens. |
| 2003 |
Slay, J., Quirchmayr, G., Kurzel, F., & Hagenus, K. (2003). Adaptive learning environments for CS education - from AMLE to live spaces. In Proceedings of the Fifth Australasian Computing Education Conference. Australia: Australian Computer Society Inc. |
| 2003 |
Turnbull, B. P., Nicholson, D. J., & Slay, J. (2003). Wireless networking security - a practical summary of 802.11b in Adelaide, Australia. In Proceedings of the 4th Australian Information Warfare and IT Security Conference (pp. 347-355). Australia: University of South Australia. |
| 2003 |
Wilsdon, T. W., Drymalik, C. P., & Slay, J. (2003). The vulnerabilities of 3G wireless systems with respect to proposed Australian implementations: a literary review. In Proceedings of the 4th Australian Information Warfare and IT Security Conference (pp. 379-390). Australia: University of South Australia. |
| 2003 |
Slay, J. (2003). Modern information warfare with an historical Chinese face: the case of Falun Gong. In Proceedings of the 2nd European Conference on Information Warfare. na: Academic Conferences Limited. |
| 2002 |
Kurzel, F., & Slay, J. (2002). Towards an adaptive multimedia learning environment: An Australian solution to cross-cultural offshore delivery issues. In Proceedings of the Third International Network Conference. UK: University of Plymouth, Network Research Group. |
| 2002 |
Slay, J. (2002). IS security, trust and culture: a theoretical framework for managing IS security in multicultural settings. In Proceedings of the 3rd International Network Conference. UK: University of Plymouth, Network Research Group. |
| 2002 |
Kurzel, F., Slay, J., & Chau, Y. (2002). Towards an adaptive multimedia learning environment. In E. Cohen (Ed.), Information Science and IT Education Conference. http://ecommerce.lebow.drexel.edu/eli/2002Proceedings/toc.htm: Informing Science. |
| 2002 |
Slay, H., & Slay, J. (2002). Augmented reality as a visualisation tool within information visualisation. In P. Kotze, L. Venter, & J. Barrow (Eds.), Proceedings of SAICSIT 2002 (pp. 252). South Africa: SAICSIT. |
| 2002 |
Kurzel, F., Slay, J., & Chau, Y. (2002). Towards an adaptive multimedia learning environment: Enhancing the student experience. In P. Barker, & S. Rebelsky (Eds.), World Conference of Educational Multimedia, Hypermedia and Telecommunications. USA: AACE. |
| 2002 |
Nafalski, A., Gol, O., Slay, J., & McDermott, K. J. (2002). Innovation in information and Communcation Technology Education at University of South Australia. In International Conferences on: ICT in Higher Education for the New Economy. |
| 2002 |
Kurzel, F., Slay, J., & Chau, Y. (2002). Toward an Effective Online Learning Environment: An Adaptive Multimedia Solution. In Proceedings of Ausweb 2002. na: na. |
| 2001 |
Quirchmayr, G., & Slay, J. (2001). Identifying emerging web-communication patterns between government and citizens. In 12th International workshop on database and expert systems applications (pp. 419-422). Piscataway, NJ, United States: IEEE Computer Society. DOI |
| 2001 |
Slay, J., & Burke, M. (2001). A world view analysis of the effect of culture within C2. In Proceedings: 6th International Command and Control Research and Technology Symposium. Annapolis, MD: Command and Control Research Program (CCRP). |
| 2001 |
Slay, J., & Burke, M. (2001). Simulating the dynamics of information and knowledge operations. In Proceedings: 6th International Command and Control Research and Technology Symposium. www.dodccrp.org/6thICCRTS/cd/index.htm. |
| 2001 |
Quirchmayr, G., & Slay, J. (2001). A BPR-based architecture for changing corporate approaches to security. In Proceedings of the 5th Australian Security Research Symposium. Perth: Edith Cowan University. |
| 2001 |
Slay, J. (2001). Culture and sensemaking in information warfare. In W. Hutchinson (Ed.), Survival in the e-conomy. Perth: Edith Cowan University. |
| 2001 |
Li, K., Vipahasna, P., & Slay, J. (2001). The Integration of Adaptive Techniques into an Educational Hypermedia System. In Proceedings of ICCE2001. N/A: N/A. |
| 2000 |
Slay, J., & Li, K. W. (2000). Implementing Modern Approaches to Teacher Computer Science: A Cross-Cultural Perspective. In S. Young, J. Greer, H. Maurer, & Y. Chee (Eds.), Learning Societies in the New Millennium: Creativity, Caring and Commitments. Taipei, Taiwan: National Tsing Hua Uniersity, Taiwan. |
| 2000 |
Slay, J. (2000). Students' Conceptualisations of Nature: A Chinese and Australian Cross-Cultural Comparison. In D. Yang (Ed.), Improving Classroom Research Through International Collaboration. Perth, WA: National key Centre for SSM, CUT, Perth, Australia. |
| 2000 |
Warren, J. R., Slay, J., & Li, K. W. (2000). An authoring shell with intelligent reuse. In S. Young, J. Greer, H. Maurer, & Y. Chee (Eds.), Learning Societies in the New Millennium: Creativity, Caring and Commitments. Taipei, Taiwan: National Tsing Hua University, Taiwan. |
| 2000 |
Slay, J. (2000). Implementing modern approaches to teaching computer science: a life long learning perspective. In D. Benzie, & D. Passey (Eds.), Proceedings of Conference on Educational Uses of Information and Communication Technologies. Beijing, China: Publishing House of Electronics Industry,. |
| 1998 |
Slay, J. (1998). Using the WWW to create an effective cross cultural learning environment. In Teleteaching '98: Distnace learning, Training and Education, Proceedings II: proceedings of the XV IFIP Wor[l]d computer congress 31 August - 3 September 1998. Vienna, Austria. |
Available For Media Comment.