Author of the publication

A comparative evaluation of two algorithms for Windows Registry Anomaly Detection.

, , , , , , and . J. Comput. Secur., 13 (4): 659-693 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Genome-wide analysis reveals novel genes influencing temporal lobe structure with relevance to neurodegeneration in Alzheimer's disease., , , , , , , , , and 17 other author(s). NeuroImage, 51 (2): 542-554 (2010)Reconstructing the Phylogeny of Mobile Elements., , , and . RECOMB, volume 4453 of Lecture Notes in Computer Science, page 196-210. Springer, (2007)A Geometric Framework for Unsupervised Anomaly Detection., , , , and . Applications of Data Mining in Computer Security, Springer, (2002)Incorporating prior information into association studies., , , and . Bioinform., 28 (12): 147-153 (2012)Identification of causal genes for complex traits., , , , and . Bioinform., 31 (12): 206-213 (2015)EMINIM: An Adaptive and Memory-Efficient Algorithm for Genotype Imputation., , and . J. Comput. Biol., 17 (3): 547-560 (2010)A Spatial Haplotype Copying Model with Applications to Genotype Imputation., , , and . J. Comput. Biol., 22 (5): 451-462 (2015)A Bayesian Framework for Estimating Cell Type Composition from DNA Methylation Without the Need for Methylation Reference., , , , and . RECOMB, volume 10229 of Lecture Notes in Computer Science, page 207-223. (2017)The Homology Kernel: A Biologically Motivated Sequence Embedding into Euclidean Space., and . CIBCB, page 179-186. IEEE, (2005)Using Network Component Analysis to Dissect Regulatory Networks Mediated by Transcription Factors in Yeast., , , and . PLoS Comput. Biol., (2009)