Author of the publication

Comparison of checking behavior in adults with or without checking symptom of obsessive-compulsive disorder using a novel computer-based measure.

, , , , , and . Comput. Methods Programs Biomed., 108 (1): 434-441 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation., , , and . Sensors, 23 (6): 3000 (March 2023)Enforcement of Integrated Security Policy in Trusted Operating Systems., , , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 214-229. Springer, (2007)Hooking Graceful Moments: A Security Analysis of Sudo Session Handling., , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 41-60. Springer, (2016)Working Towards a Primary Binary Analysis System., , , , and . Security and Management, page 459-465. CSREA Press, (2010)How to Locate a Target Binary Process and Its Derivatives in System Emulator., , , , and . SAINT, page 273-276. IEEE Computer Society, (2010)Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage., , , , and . CCS, page 131-145. ACM, (2018)A Heuristic-Based Feature Selection Method for Clustering Spam Emails., , , , and . ICONIP (1), volume 6443 of Lecture Notes in Computer Science, page 290-297. Springer, (2010)Capturing Information Flow with Concatenated Dynamic Taint Analysis., , , and . ARES, page 355-362. IEEE Computer Society, (2009)Provoked arrangement symptoms in obsessive-compulsive disorder using a virtual environment: A preliminary report., , , and . Comput. Biol. Medicine, 42 (4): 422-427 (2012)A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 291-301. Springer, (2006)