Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph-based malware detection using dynamic analysis., , , , and . J. Comput. Virol., 7 (4): 247-258 (2011)Subroutine based detection of APT malware., , and . J. Comput. Virol. Hacking Tech., 12 (4): 225-233 (2016)Deep learning and alternative learning strategies for retrospective real-world clinical data., , , , , , , , and . npj Digit. Medicine, (2019)Attack chain detection., , and . Stat. Anal. Data Min., 8 (5-6): 353-363 (2015)Assessment of the Impact of Cosmic-Ray-Induced Neutrons on Hardware in the Roadrunner Supercomputer, , , , , , , , and . IEEE Transactions on Device and Materials Reliability, 12 (2): 445--454 (May 2012)Malware Detection Using Nonparametric Bayesian Clustering and Classification Techniques., , , and . Technometrics, 57 (4): 535-546 (2015)Multiple Kernel Learning Clustering with an Application to Malware., , and . ICDM, page 804-809. IEEE Computer Society, (2012)Improving the delivery of palliative care through predictive modeling and healthcare informatics., , , , , , , , , and 6 other author(s). J. Am. Medical Informatics Assoc., 28 (6): 1065-1073 (2021)Sequential Optimization in Locally Important Dimensions., , , and . Technometrics, 63 (2): 236-248 (2021)Power usage of production supercomputers and production workloads., , , , , , , , , and 2 other author(s). Concurr. Comput. Pract. Exp., 28 (2): 274-290 (2016)