Mr Peter Hannay will present a SIG Seminar on 21 August in which he discusses identifying and tracing a compiler bug to its root cause.
Support Melanoma Research by purchasing a ticket to see a special screening of the latest Mission Impossible movie at Event Cinemas Innaloo on Monday, 10 August 2015.
Without the help of hundreds of 'citizen scientists' there's no way we could possibly monitor the decline of one of WA's iconic, endangered birds, the Carnaby's black-cockatoo.
Details of the Security Research Institute's Special Interest Group Seminars for Semester 2, 2015.
Krishnun Sansurooah will present a SIG Seminar on 17 August discussing the problems and challenges of BYOD in environments with stringent privacy and security requirements.
Professor Rob Newton welcomed Philadelphia Eagles NFL Coach Mr Josh Hingst to the Health and Wellness Institute last week.
ECU marine scientists present their research at national conference.
ECU well represented as marine science students present their research at Rottnest Island.
Centre for Marine Ecosystems Research student grant win supports light quality research on seagrasses.
ECU's Security Research Institute is recognised as a world leader in cybersecurity research. The Institute's Director Professor Craig Valli says Australia has a bigger role to play on the world stage.
Two ECU ICT projects will represent WA at the national iAwards later this year after being named state finalists at the prestigious WAiTTA Incite Awards.
To win the Tour de France a competitor has to be a rare breed indeed ECU researchers Chris Abbiss and Paolo Menaspà take a look at what's required.
Professor Rob Newton will talk about fighting chronic disease with exercise at the next The West Australian ECU Lecture Series event.
Karen Stones will present a SIG Seminar on 31 July in which she will discuss social media and privacy and the potential for identity theft.
Dr Mike Johnstone will present a SIG Seminar on 7 July in which he examines the potential for cyber-attack on the systems that control traffic lights, highlighting key risks and suggest mitigation strategies against this form of cyber-attack.