http://researchonline.federation.edu.au/vital/access/manager/Index ${session.getAttribute("locale")} 5 Application of rank correlation, clustering and classification in information security http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4708 Wed 07 Apr 2021 13:44:14 AEST ]]> Establishing phishing provenance using orthographic features http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3667 Wed 07 Apr 2021 13:34:40 AEST ]]> Rees matrix constructions for clustering of data http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2363 Wed 07 Apr 2021 13:33:26 AEST ]]> An experiment in task decomposition and ensembling for a modular artificial neural network http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:1345 Wed 07 Apr 2021 13:32:23 AEST ]]> Unsupervised and supervised data classification via nonsmooth and global optimisation http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:77 Wed 07 Apr 2021 13:30:53 AEST ]]>