Calculated based on number of publications stored in Pure and citations from Scopus
1994 …2022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2022

    Formal Modeling of Smart Contract-based Trading System

    Park, W. S., Lee, H. & Choi, J. Y., 2022, 24th International Conference on Advanced Communication Technology: Artificial Intelligence Technologies toward Cybersecurity!!, ICACT 2022 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 48-52 5 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2022-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Is a False Positive really False Positive?

    Choi, H. J., Lee, H. & Choi, J. Y., 2022, 24th International Conference on Advanced Communication Technology: Artificial Intelligence Technologies toward Cybersecurity!!, ICACT 2022 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 145-149 5 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2022-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    Formal Modeling of Smart Contract-based Trading System

    Park, W. S., Lee, H. & Choi, J. Y., 2021 Feb 7, 23rd International Conference on Advanced Communication Technology: On-Line Security in Pandemic Era!, ICACT 2021 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 48-52 5 p. 9370462. (International Conference on Advanced Communication Technology, ICACT; vol. 2021-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Is a False Positive really False Positive?

    Choi, H. J., Lee, H. & Choi, J. Y., 2021 Feb 7, 23rd International Conference on Advanced Communication Technology: On-Line Security in Pandemic Era!, ICACT 2021 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 145-149 5 p. 9370442. (International Conference on Advanced Communication Technology, ICACT; vol. 2021-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2020

    Analysis of software weakness detection of CBMC based on CWE

    Byun, M., Lee, Y. & Choi, J. Y., 2020 Feb 1, 22nd International Conference on Advanced Communications Technology: Digital Security Global Agenda for Safe Society, ICACT 2020 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 171-175 5 p. 9061281. (International Conference on Advanced Communication Technology, ICACT; vol. 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Formal modeling and verification of software-defined networking with multiple controllers

    Kang, M. & Choi, J. Y., 2020, Testbeds and Research Infrastructures for the Development of Networks and Communications - 14th EAI International Conference, TridentCom 2019, Proceedings. Gao, H., Li, K., Yang, X. & Yin, Y. (eds.). Springer, p. 81-94 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 309 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    Risk and avoidance strategy for blocking mechanism of SDN-based security service

    Byun, M., Lee, Y. & Choi, J. Y., 2019 Apr 29, 21st International Conference on Advanced Communication Technology: ICT for 4th Industrial Revolution!, ICACT 2019 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 187-190 4 p. 8701887. (International Conference on Advanced Communication Technology, ICACT; vol. 2019-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    MemPatrol: Reliable sideline integrity monitoring for high-performance systems

    Nam, M. J., Nam, W., Choi, J. Y. & Akritidis, P., 2017, Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017. Polychronakis, M. & Meier, M. (eds.). Springer Verlag, p. 48-69 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    Formal modeling and verification for SDN firewall application using pACSR

    Kang, M., Choi, J. Y., Kwak, H. H., Kang, I., Shin, M. K. & Yi, J. H., 2015, Electronics, Communications and Networks IV - Proceedings of the 4th International Conference on Electronics, Communications and Networks, CECNet2014. Hussain, A. & Ivanovic, M. (eds.). CRC Press/Balkema, p. 155-161 7 p. (Electronics, Communications and Networks IV - Proceedings of the 4th International Conference on Electronics, Communications and Networks, CECNet2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Verification for NFV-enabled network services

    Shin, M. K., Choi, Y., Kwak, H. H., Pack, S., Kang, M. & Choi, J. Y., 2015 Dec 11, International Conference on ICT Convergence 2015: Innovations Toward the IoT, 5G, and Smart Media Era, ICTC 2015. Institute of Electrical and Electronics Engineers Inc., p. 810-815 6 p. 7354672. (International Conference on ICT Convergence 2015: Innovations Toward the IoT, 5G, and Smart Media Era, ICTC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • 2012

    Formal specifications for software-defined networking

    Kang, M., Park, J., Shin, J., Nam, K. H., Shin, M. K. & Choi, J. Y., 2012, Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12. p. 51 1 p. (Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Process algebraic specification of software defined networks

    Kang, M., Park, J., Choi, J. Y., Nam, K. H. & Shin, M. K., 2012, Proceedings - 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012. p. 359-363 5 p. 6274368. (Proceedings - 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2010

    A method of measuring the propagation of damage to information communication system

    Yoo, D. Y., Yi, W. S., Lee, G. S. & Choi, J. Y., 2010, 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. p. 192-196 5 p. 5542928. (2nd International Conference on Software Engineering and Data Mining, SEDM 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A process algebraic framework for modeling resource demand and supply

    Philippou, A., Lee, I., Sokolsky, O. & Choi, J. Y., 2010, Formal Modeling and Analysis of Timed Systems - 8th International Conference, FORMATS 2010, Proceedings. p. 183-197 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6246 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Modeling autonomous military robots using hybrid system framework

    Lee, J., Cha, R., Han, Y., Nam, W., Choi, J. Y., Kim, W. T. & Park, S. M., 2010, 2010 International Conference on Information and Communication Technology Convergence, ICTC 2010. p. 429-430 2 p. 5674805. (2010 International Conference on Information and Communication Technology Convergence, ICTC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Security analysis of smart card based password authentication schemes

    Kim, H. S., Seo, S. & Choi, J. Y., 2010, Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010. p. 352-356 5 p. 5534807. (Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2009

    Automatic consistency checking of use case scenarios

    Min, H. & Choi, J. Y., 2009, Proceedings of the 13th IASTED International Conference on Software Engineering and Applications, SEA 2009. p. 166-173 8 p. (Proceedings of the 13th IASTED International Conference on Software Engineering and Applications, SEA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cryptanalysis of secure key exchange protocol between STB and Smart card in IPTV broadcasting

    Lee, S. H., Park, N. S., Kim, S. K. & Choi, J. Y., 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 797-803 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • FMIPv6 based secure binding update authentication in wireless vehicular networks

    Lee, S. H., Choi, J. Y. & Park, N. S., 2009, 2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009. IEEE Computer Society, 4800584. (2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2008

    A calculus to reduce spatial and temporal complexity for specification and analysis of complex real-time systems

    Choi, J., Choi, J. Y., On, J. & Lee, M., 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 8-13 6 p. 4623969. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A lightweight protocol analysis and modification for secure RFID system

    Kim, H. S. & Choi, J. Y., 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks, ICCCN 2008. p. 958-962 5 p. 4674336. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Biometric handshake protocol on telebiometric system mechanism for national infrastructure

    Shin, Y. N., Lee, Y. J., Shin, W. & Choi, J. Y., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 57-60 4 p. 4511534. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Designing fingerprint-recognition-based access control for electronic medical records systems

    Shin, Y., Lee, Y., Shin, W. & Choi, J., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 106-110 5 p. 4482898. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Formal verification of cryptographic protocol for secure RFID system

    Kim, H. S., Oh, J. H., Kim, J. B., Jeong, Y. O. & Choi, J. Y., 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 470-477 8 p. 4624188. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Weaknesses analysis and countermeasure of a verifier-based key agreement protocol

    Kim, H. S., Seo, S. & Choi, J. Y., 2008, Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008. p. 1015-1018 4 p. 4637818. (Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    A light-weight security protocol for RFID system

    Oh, J. H., Kim, H. S. & Choi, J. Y., 2007, Personal Wireless Communications: The 12th IFIP International Conference on Personal Wireless Communications (PWC 2007), Prague, Czech Republic, September 2007. Bestak, R., Simak, B. & Kozlowska, E. (eds.). p. 384-395 12 p. (IFIP International Federation for Information Processing; vol. 245).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A secure communication protocol for low-cost RFID system

    Oh, J. H., Kim, H. S. & Choi, J. Y., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 949-954 6 p. 4385207. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Embedded system modeling based on resource-oriented model

    Kim, J. H. & Choi, J. Y., 2007, Proceedings - 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2007: Raising Expectations of Computer-Based Systems. p. 203-212 10 p. 4148935. (Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Formal embedded operating system model based on resource-based design framework

    Kim, J. H., Sim, J. H., Kim, C. J. & Choi, J. Y., 2007, Proceedings - 7th International Conference on Quality Software, QSIC 2007. p. 244-249 6 p. 4385502. (Proceedings - International Conference on Quality Software).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Formal security policy model for a common criteria evaluation

    Park, J. & Choi, J. Y., 2007, 9th International Conference on Advanced Communication Technology, ICACT 2007. p. 277-281 5 p. 4195134. (International Conference on Advanced Communication Technology, ICACT; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Performance evaluation model for the face recognition system

    Shin, Y. N., Kim, J., Lee, Y. J., Shin, W. & Choi, J., 2007, Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007. p. 704-708 5 p. 4524191. (Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • RFID privacy protection scheme for secure ubiquitous computing

    Kim, H. S., Oh, J. H. & Choi, J. Y., 2007, Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007. p. 117-124 8 p. (Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security and privacy analysis of RFID authentication protocol for ubiquitous computing

    Kim, H. S. & Choi, J. Y., 2007, Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007. p. 1359-1363 5 p. 4318010. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • The design and verification of RFID authentication protocol for ubiquitous computing

    Kim, H. S. & Choi, J. Y., 2007, Proceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications. p. 693-697 5 p. 4312983. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2006

    A medium access control scheme for providing reliability in wireless ad hoc networks

    Lee, S. H. & Choi, J. Y., 2006, Wireless Algorithms, Systems, and Applications - First International Conference, WASA 2006, Proceedings. Springer Verlag, p. 341-352 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4138 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secrecy analysis of purchase transaction in electronic purses

    Kim, I. G., Kim, H. S., Lee, J. Y., Kang, I. & Choi, J. Y., 2006, Proceedings - 20th International Conference on Advanced Information Networking and Applications. p. 979-984 6 p. 1620313. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Security analysis of RFID authentication for pervasive systems using model checking

    Kim, H. S., Oh, J. H. & Choi, J. Y., 2006, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Short Papers/Workshops/Fast Abstracts/Doctoral Symposium. p. 195-202 8 p. 4020167. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Security and privacy analysis of RFID systems using model checking

    Kim, H. S., Kim, I. G., Han, K. H. & Choi, J. Y., 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 495-504 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • The vulnerabilities analysis and design of the security protocol for RFID system

    Kim, H. S., Oh, J. H., Choi, J. Y. & Kim, J. W., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. 4019943. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Verifying software streaming systems

    Nam, K. H., Park, J. K., Choi, J. Y., Lee, J. J. & Choi, W., 2006, 8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings. p. 367-371 5 p. 1625592. (8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2005

    Analysis and modification of ASK mobile security protocol

    Kim, I. G., Kim, H. S., Lee, J. Y. & Choi, J. Y., 2005, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. p. 79-83 5 p. 1581579. (Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Analyzing the application of e-Commerce in wireless

    Kim, H. S., Kim, I. G. & Choi, J. Y., 2005, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. p. 112-120 9 p. 1581583. (Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Model-based analysis of money accountability in electronic purses

    Kim, I. G., Moon, Y. J., Kang, I., Lee, J. Y., Han, K. H. & Choi, J. Y., 2005, Internet and Network Economics - First International Workshop, WINE 2005, Proceedings. Springer Verlag, p. 346-355 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3828 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2004

    Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking

    Kim, I. G. & Choi, J. Y., 2004, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (ed.). p. 264-269 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • 2003

    SSR: Statechart with shared resources

    Jang, S. H., Bang, K. S. & Choi, J. Y., 2003, Proceedings - 2003 IEEE Symposium on Human Centric Computing Languages and Environments, HCC 2003. p. 198-200 3 p. 1260229. (Proceedings - 2003 IEEE Symposium on Human Centric Computing Languages and Environments, HCC 2003).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2002

    Bottleneck analysis of a gigabit network interface card: Formal verification approach

    Jin, H. W., Bang, K. S., Yoo, C., Choi, J. Y. & Cha, H. J., 2002, Model Checking Software - 9th International SPIN Workshop, Proceedings. Bosnacki, D. & Leue, S. (eds.). Springer Verlag, p. 170-186 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2318 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2000

    A framework for embedded real-time system design

    Choi, J. Y., Kwak, H. H. & Lee, I., 2000, Parallel and Distributed Processing - 15 IPDPS 2000 Workshops, Proceedings. Rolim, J. (ed.). Springer Verlag, p. 738-742 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1800 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • GAT(Give-And-Take): A Cooperative cache replacement policy for application-controlled file caching

    Kim, G. H., Cho, J. Y., Kang, H. K., Park, M. S. & Choi, J. Y., 2000, Proceedings of the Fifth Joint Conference on Information Sciences, JCIS 2000, Volume 1. Wang, P. P. & Wang, P. P. (eds.). 1 ed. p. 508-511 4 p. (Proceedings of the Joint Conference on Information Sciences; vol. 5, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • LMRU: An Efficient Buffer Management Scheme for Large Sequential and Looping Reference Pattern Applications

    Cho, J. Y., Kim, G. H., Kang, H. K., Park, M. S. & Choi, J. Y., 2000, Proceedings of the Fifth Joint Conference on Information Sciences, JCIS 2000, Volume 1. Wang, P. P. & Wang, P. P. (eds.). 1 ed. p. 504-507 4 p. (Proceedings of the Joint Conference on Information Sciences; vol. 5, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1999

    Formal verification of RACE protocol using SSM

    Kim, H., Choi, J. Y., Ki, A. & Han, W. J., 1999, IEEE Region 10 Annual International Conference, Proceedings/TENCON. Institute of Electrical and Electronics Engineers Inc., p. 1083-1086 4 p. (IEEE Region 10 Annual International Conference, Proceedings/TENCON; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)