Author of the publication

Comparison of checking behavior in adults with or without checking symptom of obsessive-compulsive disorder using a novel computer-based measure.

, , , , , and . Comput. Methods Programs Biomed., 108 (1): 434-441 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hooking Graceful Moments: A Security Analysis of Sudo Session Handling., , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 41-60. Springer, (2016)TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote., , , and . IEICE Trans. Inf. Syst., 91-D (5): 1338-1347 (2008)Virtual reality prototype for measurement of expression characteristics in emotional situations., , , , , , , , , and . Comput. Biol. Medicine, 39 (2): 173-179 (2009)Pilot Study for Assessing the Behaviors of Patients with Schizophrenia towards a Virtual Avatar., , , , , , , , and . Cyberpsy., Behavior, and Soc. Networking, 9 (5): 531-539 (2006)Working Towards a Primary Binary Analysis System., , , , and . Security and Management, page 459-465. CSREA Press, (2010)An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation., , , , , , , , and . IEICE Trans. Inf. Syst., 94-D (9): 1778-1791 (2011)How to Locate a Target Binary Process and Its Derivatives in System Emulator., , , , and . SAINT, page 273-276. IEEE Computer Society, (2010)Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage., , , , and . CCS, page 131-145. ACM, (2018)A Heuristic-Based Feature Selection Method for Clustering Spam Emails., , , , and . ICONIP (1), volume 6443 of Lecture Notes in Computer Science, page 290-297. Springer, (2010)Capturing Information Flow with Concatenated Dynamic Taint Analysis., , , and . ARES, page 355-362. IEEE Computer Society, (2009)