Graduate School of Information Study

  • Postal address

    Korea, Republic of

Filter
Conference contribution

Search results

  • A3RP: Anonymous and authenticated ad hoc routing protocol

    Paik, J. H., Kim, B. H. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 67-72 6 p. 4511536. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    26 Citations (Scopus)
  • A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme

    Yoo, J. S., Hwang, J. H., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Proceedings. Heng, S-H. & Lopez, J. (eds.). Springer, p. 20-40 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11879 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A calculus to reduce spatial and temporal complexity for specification and analysis of complex real-time systems

    Choi, J., Choi, J. Y., On, J. & Lee, M., 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 8-13 6 p. 4623969. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • ADAM: Automated detection and attribution of malicious webpages

    Kosba, A. E., Mohaisen, A., West, A., Tonn, T. & Kim, H. K., 2015, Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Rhee, K-H. & Yi, J. H. (eds.). Springer Verlag, p. 3-16 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8909).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Adaptive Splitting Protocols for RFID tag collision arbitration

    Myung, J. & Lee, W., 2006, Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, MOBIHOC 2006. Association for Computing Machinery (ACM), p. 202-213 12 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc); vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    145 Citations (Scopus)
  • A diffie-hellman key exchange protocol without random oracles

    Jeong, I. R., Kwon, J. O. & Lee, D. H., 2006, Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. Springer Verlag, p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • A digital ID purse mechanism using USIM in a mobile environment

    Song, D., Lim, S. H., Yi, O. & Lim, J., 2007, Innovations'07: 4th International Conference on Innovations in Information Technology, IIT. IEEE Computer Society, p. 670-674 5 p. 4430424. (Innovations'07: 4th International Conference on Innovations in Information Technology, IIT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A DRBAC model based on context for smart and secure services in intelligent ubiquitous home

    Park, J. H., Park, J. S., Lee, S. J. & Koh, B. S., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 893-901 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • ADSaS: Comprehensive real-time anomaly detection system

    Lee, S. & Kim, H. K., 2019, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 29-41 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Advanced security assessment for control effectiveness

    You, Y., Oh, S. & Lee, K., 2015, Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Rhee, K-H. & Yi, J. H. (eds.). Springer Verlag, p. 383-393 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8909).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A fast and provably secure higher-order masking of AES S-box

    Kim, H. S., Hong, S. & Lim, J., 2011, Cryptographic Hardware and Embedded Systems - 13th International Workshop, CHES 2011, Proceedings. p. 95-107 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    66 Citations (Scopus)
  • A fast implementation of arithmetic coding

    Kim, H. J., 2010, Advances in Web Technologies and Applications - Proceedings of the 12th Asia-Pacific Web Conference, APWeb 2010. p. 419-423 5 p. 5474097. (Advances in Web Technologies and Applications - Proceedings of the 12th Asia-Pacific Web Conference, APWeb 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A fast inversion algorithm and low-complexity architecture over GF(2 m)

    Kim, S., Chang, N. S., Kim, C. H., Park, Y. H. & Lim, J., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. Springer Verlag, p. 1-8 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A field guide to hidden accounting information detection

    Kim, Y., Bang, J., Lee, G. T., Lee, S. J. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 146-150 5 p. 4426220. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A fingerprint-based user authentication scheme using smart cards in IPTV environments

    Jun, E. A., Rhee, H. S., Jung, S. W. & Lee, D. H., 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480301. (2010 International Conference on Information Science and Applications, ICISA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A framework for anomaly pattern recognition in electronic financial transaction using moving average method

    Kim, A. C., Park, W. H. & Lee, D. H., 2013, IT Convergence and Security 2012. p. 93-99 7 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A framework for embedded real-time system design

    Choi, J. Y., Kwak, H. H. & Lee, I., 2000, Parallel and Distributed Processing - 15 IPDPS 2000 Workshops, Proceedings. Rolim, J. (ed.). Springer Verlag, p. 738-742 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1800 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A framework of device authentication management in IoT environments

    Park, A. J., Kim, H. Y. & Lim, J. I., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292918. (2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Aggregating CL-signatures revisited: Extended functionality and better efficiency

    Lee, K., Lee, D. H. & Yung, M., 2013, Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers. p. 171-188 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • A grid-based architecture for recording and replay of civil-engineering hybrid remote experiment

    Sun, J., Jang, H. L. & Wonjun, L., 2008, 2008 International Conference on Information Networking, ICOIN. 4472800. (2008 International Conference on Information Networking, ICOIN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A key distribution scheme for wireless sensor networks

    Kim, Y. H., Lee, H. & Lee, D. H., 2008, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 572-577 6 p. 4517458. (6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A key management scheme for commodity sensor networks

    Kim, Y. H., Kim, M. H., Lee, D. H. & Kim, C., 2005, Ad-Hoc, Mobile, and Wireless Networks - 4th International Conference, ADHOC-NOW 2005, Proceedings. Springer Verlag, p. 113-126 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3738 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A key management scheme for large scale distributed sensor networks

    Kim, Y. H., Lee, H., Lee, D. H. & Lim, J., 2006, Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings. Cuenca, P. & Orozco-Barbosa, L. (eds.). Springer Verlag, p. 437-446 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4217 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Citations (Scopus)
  • Alert correlation using diamond model for cyber threat intelligence

    Shin, Y., Lim, C., Park, M., Cho, S., Han, I., Oh, H. & Lee, K., 2019, Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Cruz, T. & Simoes, P. (eds.). Curran Associates Inc., p. 444-450 7 p. (European Conference on Information Warfare and Security, ECCWS; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A lightweight protocol analysis and modification for secure RFID system

    Kim, H. S. & Choi, J. Y., 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks, ICCCN 2008. p. 958-962 5 p. 4674336. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A light-weight security protocol for RFID system

    Oh, J. H., Kim, H. S. & Choi, J. Y., 2007, Personal Wireless Communications: The 12th IFIP International Conference on Personal Wireless Communications (PWC 2007), Prague, Czech Republic, September 2007. Bestak, R., Simak, B. & Kozlowska, E. (eds.). p. 384-395 12 p. (IFIP International Federation for Information Processing; vol. 245).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A longitudinal analysis of .i2p leakage in the public DNS infrastructure

    Jeong, S. H., Kang, A. R., Kim, J., Kim, H. K. & Mohaisen, A., 2016 Aug 22, SIGCOMM 2016 - Proceedings of the 2016 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery, Inc, p. 557-558 2 p. 2960423. (SIGCOMM 2016 - Proceedings of the 2016 ACM Conference on Special Interest Group on Data Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A medium access control scheme for providing reliability in wireless ad hoc networks

    Lee, S. H. & Choi, J. Y., 2006, Wireless Algorithms, Systems, and Applications - First International Conference, WASA 2006, Proceedings. Springer Verlag, p. 341-352 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4138 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A method of measuring the propagation of damage to information communication system

    Yoo, D. Y., Yi, W. S., Lee, G. S. & Choi, J. Y., 2010, 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. p. 192-196 5 p. 5542928. (2nd International Conference on Software Engineering and Data Mining, SEDM 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A methodology for forensic analysis of embedded systems

    Lim, K. S. & Lee, S., 2008, Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008. p. 283-286 4 p. 4734223. (Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • A Model for Detecting Cryptocurrency Transactions with Discernible Purpose

    Baek, H., Oh, J., Kim, C. Y. & Lee, K., 2019 Jul, ICUFN 2019 - 11th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, p. 713-717 5 p. 8806126. (International Conference on Ubiquitous and Future Networks, ICUFN; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A model for security vulnerability pattern

    Kang, H., Kim, K., Hong, S. & Lee, D. H., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag, p. 385-394 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3982 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Amplified boomerang attack against reduced-round shacal

    Kim, J., Moon, D., Lee, W., Hong, S., Lee, S. & Jung, S., 2002, Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Zheng, Y. (ed.). Springer Verlag, p. 243-253 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Analysis and modification of ASK mobile security protocol

    Kim, I. G., Kim, H. S., Lee, J. Y. & Choi, J. Y., 2005, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. p. 79-83 5 p. 1581579. (Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Analysis framework to detect artifacts of portable web browser

    Choi, J. H., Lee, K. G., Park, J., Lee, C. & Lee, S., 2012, Information Technology Convergence, Secure and Trust Computing, and Data Management, ITCS 2012 and STA 2012. p. 207-214 8 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Analysis of connection information for database server detection

    Han, J., Lee, K. G., Choi, J., Lim, K. S. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404207. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Analysis of smartphone-based location information

    Kim, D., Bang, J. & Lee, S., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 43-53 11 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Analysis of software weakness detection of CBMC based on CWE

    Byun, M., Lee, Y. & Choi, J. Y., 2020 Feb 1, 22nd International Conference on Advanced Communications Technology: Digital Security Global Agenda for Safe Society, ICACT 2020 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 171-175 5 p. 9061281. (International Conference on Advanced Communication Technology, ICACT; vol. 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Analysis of the Asymmetrical Relationships between State Actors and APT Threat Groups

    Kim, Y. K., Lee, J. J., Go, M. H. & Lee, K., 2020 Oct 21, ICTC 2020 - 11th International Conference on ICT Convergence: Data, Network, and AI in the Age of Untact. IEEE Computer Society, p. 695-700 6 p. 9289506. (International Conference on ICT Convergence; vol. 2020-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Analysis of the HIKVISION DVR file system

    Han, J., Jeong, D. & Lee, S., 2015, Digital Forensics and Cyber Crime - 7th International Conference, ICDF2C 2015, Revised Selected Papers. Breitinger, F. & James, J. I. (eds.). Springer Verlag, p. 189-199 11 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 157).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Analysis of the power consumption of secure communication in wireless networks

    Kim, K., Hong, J. & Lim, J., 2006, Database and Expert Systems Applications - 17th International Conference, DEXA 2006, Proceedings. Springer Verlag, p. 894-903 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4080 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Analysis of time information for digital investigation

    Bang, J., Yoo, B., Kim, J. & Lee, S., 2009, NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC. p. 1858-1864 7 p. 5331448. (NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Analysis of window Transactional NTFS(TxF) and Transactional Registry(TxR) in the digital forensic perspective

    Yoo, B., Bang, J., Lim, K. S. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404233. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Analysis on vulnerability of home healthcare medical devices and development of protection profile based on Common Criteria version 3.1

    Lee, C., Kim, S., Lee, K. & Won, D., 2011, Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011. p. 240-247 8 p. 5954315. (Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Analyzing the application of e-Commerce in wireless

    Kim, H. S., Kim, I. G. & Choi, J. Y., 2005, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. p. 112-120 9 p. 1581583. (Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Analyzing the effect of the distortion compensation in reversible watermarking

    Kim, S. & Kim, H. J., 2014, Fifth International Conference on Graphic and Image Processing, ICGIP 2013. 90690P. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9069).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An analysis of economic impact on IoT under GDPR

    Seo, J., Kim, K., Park, M., Park, M. & Lee, K., 2017 Dec 12, International Conference on Information and Communication Technology Convergence: ICT Convergence Technologies Leading the Fourth Industrial Revolution, ICTC 2017. Institute of Electrical and Electronics Engineers Inc., p. 879-881 3 p. (International Conference on Information and Communication Technology Convergence: ICT Convergence Technologies Leading the Fourth Industrial Revolution, ICTC 2017; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • An analysis of Multi-Function Peripheral with a digital forensics perspective

    Lee, K., Kim, S., Lee, C., Won, D. & Park, N., 2011, Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011. p. 252-257 6 p. 5954317. (Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An anonymous asymmetric public key traitor tracing scheme

    Choi, E. Y., Hwang, J. Y. & Lee, D. H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer Verlag, p. 104-114 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • An attempt to generalize distortion measure for JPEG steganography

    Sachnev, V. & Kim, H. J., 2013, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 69-82 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution