From post

Comparison of checking behavior in adults with or without checking symptom of obsessive-compulsive disorder using a novel computer-based measure.

, , , , , и . Comput. Methods Programs Biomed., 108 (1): 434-441 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation., , , и . Sensors, 23 (6): 3000 (марта 2023)Enforcement of Integrated Security Policy in Trusted Operating Systems., , , и . IWSEC, том 4752 из Lecture Notes in Computer Science, стр. 214-229. Springer, (2007)Hooking Graceful Moments: A Security Analysis of Sudo Session Handling., , , и . IWSEC, том 9836 из Lecture Notes in Computer Science, стр. 41-60. Springer, (2016)Working Towards a Primary Binary Analysis System., , , , и . Security and Management, стр. 459-465. CSREA Press, (2010)How to Locate a Target Binary Process and Its Derivatives in System Emulator., , , , и . SAINT, стр. 273-276. IEEE Computer Society, (2010)Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage., , , , и . CCS, стр. 131-145. ACM, (2018)A Heuristic-Based Feature Selection Method for Clustering Spam Emails., , , , и . ICONIP (1), том 6443 из Lecture Notes in Computer Science, стр. 290-297. Springer, (2010)Capturing Information Flow with Concatenated Dynamic Taint Analysis., , , и . ARES, стр. 355-362. IEEE Computer Society, (2009)Provoked arrangement symptoms in obsessive-compulsive disorder using a virtual environment: A preliminary report., , , и . Comput. Biol. Medicine, 42 (4): 422-427 (2012)A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks., , и . EUC Workshops, том 4097 из Lecture Notes in Computer Science, стр. 291-301. Springer, (2006)