Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep learning and alternative learning strategies for retrospective real-world clinical data., , , , , , , , and . npj Digit. Medicine, (2019)Subroutine based detection of APT malware., , and . J. Comput. Virol. Hacking Tech., 12 (4): 225-233 (2016)Improving malware classification: bridging the static/dynamic gap., , and . AISec, page 3-14. ACM, (2012)Variable Selection in Bayesian Smoothing Spline ANOVA Models: Application to Deterministic Computer Codes., , and . Technometrics, 51 (2): 110-120 (2009)Analysis of computationally demanding models with continuous and categorical inputs., , , , and . Reliab. Eng. Syst. Saf., (2013)Attack chain detection., , and . Stat. Anal. Data Min., 8 (5-6): 353-363 (2015)Assessment of the Impact of Cosmic-Ray-Induced Neutrons on Hardware in the Roadrunner Supercomputer, , , , , , , , and . IEEE Transactions on Device and Materials Reliability, 12 (2): 445--454 (May 2012)Malware Detection Using Nonparametric Bayesian Clustering and Classification Techniques., , , and . Technometrics, 57 (4): 535-546 (2015)Multiple Kernel Learning Clustering with an Application to Malware., , and . ICDM, page 804-809. IEEE Computer Society, (2012)Power usage of production supercomputers and production workloads., , , , , , , , , and 2 other author(s). Concurr. Comput. Pract. Exp., 28 (2): 274-290 (2016)