Home > Research > Browse

Results for SECURITY

Publications & Outputs

  1. Gender in the crisis and remaking of Europe: re-gendering subsidiarity

    Walby, S., 1/11/2018, In : European Journal of Politics and Gender. 1, 3, p. 307-324 18 p.

    Research output: Contribution to journalJournal article

  2. Realistic Relations? How the Evolving Bilateral Relationship is Understood in China and Australia

    Beeson, M. & Zeng, J., 4/08/2017, In : Pacific focus. 32, 2, p. 159-181 23 p.

    Research output: Contribution to journalJournal article

  3. Early Report: How to Improve Programmers' Expertise at App Security?

    Weir, C., Rashid, A. & Noble, J., 8/04/2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security: co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). Aspinall, D., Cavallaro, L., Seghir, M. & Volkamer, M. (eds.). London, UK: CEUR-WS.org, Vol. 1575. p. 49-50 2 p. 8

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  4. Chinese views of Australian foreign policy: Not a flattering picture

    Beeson, M. & Zeng, J., 2016, In : Australian journal of international affairs. 70, 3, p. 293-310 18 p.

    Research output: Contribution to journalJournal article

  5. Bot, cyborg and automated turing test: (or "putting the humanoid in the protocol")

    Yan, J., 2009, Security protocols: 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin: Springer Verlag, p. 190-197 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5087 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper