Author of the publication

A hierarchical algorithm for fast debye summation with applications to small angle scattering.

, , , and . J. Comput. Chem., 33 (25): 1981-1996 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hierarchical algorithm for fast debye summation with applications to small angle scattering., , , and . J. Comput. Chem., 33 (25): 1981-1996 (2012)Deep neural network based malware detection using two dimensional binary program features., and . MALWARE, page 11-20. IEEE Computer Society, (2015)Improving Zero-Day Malware Testing Methodology Using Statistically Significant Time-Lagged Test Samples., and . CoRR, (2016)That Escalated Quickly: An ML Framework for Alert Prioritization., , , and . CoRR, (2023)Web Content Filtering Through Knowledge Distillation of Large Language Models., , and . CAMLIS, volume 3652 of CEUR Workshop Proceedings, page 1-21. CEUR-WS.org, (2023)Performance of a GPU-based Direct Summation Algorithm for Computation of Small Angle Scattering Profile., , , and . CoRR, (2013)AI Total: Analyzing Security ML Models with Imperfect Data in Production., and . VizSec, page 10-14. IEEE, (2021)eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys, and . (2017)cite arxiv:1702.08568.Malicious Behavior Detection using Windows Audit Logs., , and . AISec@CCS, page 35-44. ACM, (2015)A Simple and Agile Cloud Infrastructure to Support Cybersecurity Oriented Machine Learning Workflows., and . CoRR, (2020)