Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using artificial neural networks to detect unknown computer worms., , , , and . Neural Comput. Appl., 18 (7): 663-674 (2009)A Comparative Evaluation of Full-text, Concept-based, and Context-sensitive Search, , , , and . Journal of the American Medical Informatics Association, 14 (2): 164 - 174 (2007)Unknown malcode detection via text categorization and the imbalance problem., , , , and . ISI, page 156-161. IEEE, (2008)Unknown malcode detection - A chronological evaluation., , and . ISI, page 267-268. IEEE, (2008)Application of Information Technology: A Comparative Evaluation of Full-text, Concept-based, and Context-sensitive Search., , , , and . JAMIA, 14 (2): 164-174 (2007)The Digital Electronic Guideline Library (DeGeL): A Hybrid Framework for Representation and Use of Clinical Guidelines., , , , , , and . CGP, volume 101 of Studies in Health Technology and Informatics, page 147-151. IOS Press, (2004)TIRPClo: efficient and complete mining of time intervals-related patterns., and . Data Min. Knowl. Discov., 37 (5): 1806-1857 (September 2023)Active learning to improve the detection of unknown computer worms activity., , , and . FUSION, page 1-8. IEEE, (2008)ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files., , , , , , and . JISIC, page 91-98. IEEE, (2014)Helping Physicians to Organize Guidelines Within Conceptual Hierarchies., , and . AIME, volume 3581 of Lecture Notes in Computer Science, page 141-145. Springer, (2005)