Malcolm Corney
Malcolm Corney
Kelvin Grove State College
Verified email at
Cited by
Cited by
Mining e-mail content for author identification forensics
O De Vel, A Anderson, M Corney, G Mohay
ACM Sigmod Record 30 (4), 55-64, 2001
Gender-preferential text mining of e-mail discourse
M Corney, O De Vel, A Anderson, G Mohay
18th Annual Computer Security Applications Conference, 2002. Proceedings …, 2002
Language and gender author cohort analysis of e-mail for computer forensics
O De Vel, M Corney, A Anderson, G Mohay
Digital Investigation, 2002
Analysing e-mail text authorship for forensic purposes
MW Corney
Queensland University of Technology, 2003
Engaging students in programming
M Corney, D Teague, R Thomas
Proceedings of the twelfth Australasian computing education conference, 63-72, 2010
Multi-topic e-mail authorship attribution forensics
O De Vel, A Anderson, M Corney, G Mohay
Proceedings ACM Conference on Computer Security-Workshop on Data Mining for …, 2001
Identifying the Authors of Suspect Email
MW Corney, AM Anderson, GM Mohay, O De Vel
Early relational reasoning and the novice programmer: swapping as the "hello world" of relational reasoning
M Corney, R Lister, D Teague
Proceedings of the Thirteenth Australasian Computing Education Conference …, 2011
A qualitative think aloud study of the early neo-piagetian stages of reasoning in novice programmers
D Teague, M Corney, A Ahadi, R Lister
Proceedings of the Fifteenth Australasian Computing Education Conference …, 2013
Some empirical results for neo-Piagetian reasoning in novice programmers and the relationship to code explanation questions
M Corney, D Teague, A Ahadi, R Lister
Proceedings of the fourteenth australasian computing education conference …, 2012
How difficult are exams? A framework for assessing the complexity of introductory programming exams
J Sheard, A Carbone, D Chinn, T Clear, M Corney, D D'Souza, J Fenwick, ...
Australian Computer Society (ACS) 136, 145-154, 2013
'explain in plain english'questions revisited: data structures problems
M Corney, S Fitzgerald, B Hanks, R Lister, R McCauley, L Murphy
Proceedings of the 45th ACM technical symposium on Computer science …, 2014
Fraud Detection in ERP Systems Using Scenario Matching
AK Islam, M Corney, G Mohay, A Clark, S Bracher, T Raub, U Flegel
25th IFIP TC11 International Information Security Conference, SEC 2010, 112-123, 2010
Detection of Anomalies from User Profiles Generated from System Logs.
M Corney, GM Mohay, AJ Clark
AISC 11, 23-32, 2011
Detecting anomalous user activity
U Flegel, S Bracher, P Hochwarth, H Resch, P Sala, S Wollny, H Wang, ...
US Patent 9,710,857, 2017
Transaction mining for fraud detection in ERP Systems
R Khan, M Corney, A Clark, G Mohay
Industrial engineering and management systems 9 (2), 141-156, 2010
E-mail authorship attribution for computer forensics
O de Vel, A Anderson, M Corney, G Mohay
Applications of Data Mining in Computer Security, 229-250, 2002
Using neo-Piagetian theory, formative in-Class tests and think alouds to better understand student thinking: a preliminary report on computer programming
D Teague, M Corney, C Fidge, M Roggenkamp, A Ahadi, R Lister
Proceedings of the 23rd Annual Conference of the Australasian Association …, 2012
Swapping as the'Hello World'of relational reasoning: Replications, reflections and extensions
D Teague, M Corney, A Ahadi, R Lister
Proceedings of the Fourteenth Australasian Computing Education Conference …, 2012
Toward a shared understanding of competency in programming: An invitation to the BABELnot project
R Lister, M Corney, J Curran, D D'Souza, C Fidge, R Gluga, M Hamilton, ...
Proceedings of the Fourteenth Australasian Computing Education Conference …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20