• 2445 Citations
  • 22 h-Index
19952020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 2445 Citations
  • 22 h-Index
  • 92 Conference contribution
  • 77 Article
  • 3 Conference article
Filter
Conference contribution
2019

The All-Purpose Sword: North Korea's Cyber Operations and Strategies

Ji-Young, K., Lim, J. I. & Kyoung Gon, K., 2019 May 1, 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon 2019. Signoretti, M., Tolga, I., Minarik, T., Visky, G., Alatalu, S. & Biondi, S. (eds.). NATO CCD COE Publications, 8756954. (International Conference on Cyber Conflict, CYCON; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors

Lee, K. Y., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 323-335 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2017

Automated vulnerability analysis technique for smart grid infrastructure

Kwon, Y., Kim, H. K., Koumadi, K. M., Lim, Y. H. & Lim, J. I., 2017 Oct 26, 2017 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2017. Institute of Electrical and Electronics Engineers Inc., 8085965

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2016

Changes of cybersecurity legal system in East Asia: Focusing on comparison between Korea and Japan

Kim, K., Park, S. & Lim, J. I., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9503. p. 348-356 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9503).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2015

A behavior-based intrusion detection technique for smart grid infrastructure

Kwon, Y. J., Kim, H. K., Lim, Y. H. & Lim, J. I., 2015 Aug 31, 2015 IEEE Eindhoven PowerTech, PowerTech 2015. Institute of Electrical and Electronics Engineers Inc., 7232339

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

A framework of device authentication management in IoT environments

Park, A. J., Kim, H. Y. & Lim, J. I., 2015 Oct 5, 2015 5th International Conference on IT Convergence and Security, ICITCS 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7292918

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Network and system management object modeling for smart grid infrastructure

Kwon, Y., Kim, M. S., Lim, Y. H. & Lim, J. I., 2015 Sep 24, 17th Asia-Pacific Network Operations and Management Symposium: Managing a Very Connected World, APNOMS 2015. Institute of Electrical and Electronics Engineers Inc., p. 588-591 4 p. 7275400

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

A fast and provably secure higher-order masking of AES S-box

Kim, H., Hong, S. & Lim, J. I., 2011 Oct 11, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6917 LNCS. p. 95-107 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6917 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

58 Citations (Scopus)

Privacy-enhanced deniable authentication e-mail service

Ki, J., Yeong Hwang, J., Nyang, D., Lee, D. H. & Lim, J. I., 2011 Sep 2, Communications in Computer and Information Science. Vol. 194 CCIS. p. 16-29 14 p. (Communications in Computer and Information Science; vol. 194 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2009

A regression method to compare network data and modeling data using generalized additive model

Chae, S., Lee, H., Cho, J., Jung, M., Lim, J. I. & Moon, J., 2009 Nov 9, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5379 LNCS. p. 190-200 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Efficient sequential architecture for the AES CCM mode in the 802.16e standard

Ji, J. D., Jung, S. W., Jun, E. A. & Lim, J. I., 2009 Dec 1, ICINIS 2009 - Proceedings of the 2nd International Conference on Intelligent Networks and Intelligent Systems. p. 253-256 4 p. 5364531

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Evaluation of quality of protection adding HVM in wireless network

Lim, S. H., Kim, H. S., Yun, S., Cho, J. W., Yi, O. & Lim, J. I., 2009 Dec 1, Proceedings - 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009. 5302103

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Improved remote user authentication scheme using bilinear pairings

Jun, E. A., Ji, J. D., Lim, J. I. & Jung, S. W., 2009 Dec 1, ACM International Conference Proceeding Series. Vol. 321. p. 602-605 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2008

An efficient key establishment scheme for self-organizing sensor networks

Kim, Y. H., Choi, K. Y., Lim, J. I. & Lee, D. H., 2008 Feb 21, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4904 LNCS. p. 345-349 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4904 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Design and implementation of a tool to detect accounting frauds

Kim, Y., Savoldi, A., Lee, H., Yun, S., Lee, S. & Lim, J. I., 2008 Oct 22, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 547-552 6 p. 4604117

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Detection of hidden information in forensic tools

Kim, Y., Bang, J., Lee, S. & Lim, J., 2008 Sep 15, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 248-252 5 p. 4511571. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2007

A digital ID purse mechanism using USIM in a mobile environment

Song, D., Lim, S. H., Yi, O. & Lim, J., 2007 Jan 1, Innovations'07: 4th International Conference on Innovations in Information Technology, IIT. IEEE Computer Society, p. 670-674 5 p. 4430424. (Innovations'07: 4th International Conference on Innovations in Information Technology, IIT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

A field guide to hidden accounting information detection

Kim, Y., Bang, J., Lee, G., Lee, S. & Lim, J. I., 2007 Dec 1, Proceedings of Future Generation Communication and Networking, FGCN 2007. Vol. 2. p. 146-150 5 p. 4426220

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Approach of the secure communication mechanism in aero-wireless environment

Kim, K., Hong, J. & Lim, J. I., 2007 Dec 31, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1070-1075 6 p. 4197419

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A secure handover protocol design in wireless networks with formal verification

Lim, S. H., Bang, K. S., Yi, O. & Lim, J., 2007 Jan 1, Wired/Wireless Internet Communications - 5th International Conference, WWIC 2007, Proceedings. Springer Verlag, p. 67-78 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4517 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

A tool for the detection of hidden data in microsoft compound document file format

Kwon, H., Yeog, K., Lee, S. & Lim, J. I., 2007 Dec 1, Proceedings of the International Conference on Information Science and Security, ICISS 2008. p. 141-146 6 p. 4438224

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Bogus data filtering in sensor networks

Kim, Y. H., Park, J. H., Lee, D. H. & Lim, J. I., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4819 LNAI. p. 629-635 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Classification of key management schemes for wireless sensor networks

Lee, H., Kim, Y. H., Lee, D. H. & Lim, J., 2007 Dec 1, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. p. 664-673 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

Park, J. H., Lee, S., Lee, D. H., Lim, J. I., Hong, I. H. & Yang, L. T., 2007 Dec 31, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1233-1238 6 p. 4197448

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

Park, J. H., Lee, S., Lee, D. H., Lim, J. I., Hong, I. H. & Yang, L. T., 2007 Sep 25, Proceedings - International Conference on Advanced Information Networking and Applications, AINA. p. 311-316 6 p. 4220909

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Dynamic activation of role on RBAC for ubiquitous applications

Kim, Y. G. & Lim, J., 2007 Dec 1, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 1148-1153 6 p. 4420412. (2007 International Conference on Convergence Information Technology, ICCIT 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Efficient an implementation method research of a smart card atomic operation

Jun, E. A., Jung, S. W., Kim, J. G. & Lim, J. I., 2007 Jan 1, Computational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings. PART 2 ed. Springer Verlag, p. 113-121 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4706 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Enhanced doubling attacks on signed-all-bits set recoding

Kim, H. S., Kim, T. H., Ryoo, J. C., Han, D. G., Kim, H. W. & Lim, J., 2007 Dec 20, Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Proceedings. p. 39-52 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4462 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fast secure communication establishing mechanism for aero-wireless networks

Kim, K., Hong, J. & Lim, J., 2007 Dec 1, ICECS 2007 - 14th IEEE International Conference on Electronics, Circuits and Systems. p. 1360-1363 4 p. 4511251. (Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

HMM-based approach for evaluating risk propagation

Kim, Y. G. & Lim, J. I., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4430 LNCS. p. 325-326 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Location-aware random pair-wise keys scheme for wireless sensor networks

Ji, Y. C., Yong, H. K., Lim, J. I. & Lee, D. H., 2007 Dec 1, Proceedings - 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2007. p. 31-36 6 p. 4279767

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Modeling and simulation for security risk propagation in critical information systems

Kim, Y. G., Jeong, D., Park, S. H., Lim, J. I. & Baik, D. K., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4456 LNAI. p. 858-868 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4456 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Optimized cryptographic binding protocol using MIPv6 over IEEE 802.16e

Park, H. S., Lim, S. H., Yun, S., Yi, O. & Lim, J., 2007 Dec 1, ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings. p. 1225-1230 6 p. 4392204. (ISCIT 2007 - 2007 International Symposium on Communications and Information Technologies Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Password recovery using an evidence collection tool and countermeasures

Lee, S., Savoldi, A., Lee, S. & Lim, J. I., 2007 Dec 1, Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007.. Vol. 2. p. 97-102 6 p. 4457662

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

PPIDS: Privacy preserving intrusion detection system

Park, H. A., Lee, D. H., Lim, J. I. & Cho, S. H., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4430 LNCS. p. 269-274 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Quantitative risk analysis and evaluation in information systems: A case study

Kim, Y. G. & Lim, J. I., 2007 Dec 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 3 ed. Vol. 4489 LNCS. p. 1040-1047 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4489 LNCS, no. PART 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

Jeong, K., Lee, C., Sung, J., Hong, S. & Lim, J., 2007 Jan 1, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. Springer Verlag, p. 143-157 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Secure signed radix-r recoding methods for constrained-embedded devices

Han, D. G., Kim, S. K., Kim, H. W., Chung, K. I. & Lim, J. I., 2007 Dec 20, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4464 LNCS. p. 238-253 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4464 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SPA countermeasure based on unsigned left-to-right recodings

Kim, S. K., Han, D. G., Kim, H. W., Chung, K. I. L. & Lim, J., 2007 Dec 1, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. p. 286-295 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The evidence collection of DoS attack in WLAN by using WLAN forensic profiling system

Yim, D., Lim, J. Y., Yun, S., Lim, S. H., Yi, O. & Lim, J. I., 2007 Dec 1, Proceedings of the International Conference on Information Science and Security, ICISS 2008. p. 197-204 8 p. 4438234

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Verification method of network simulation for pervasive environments

Cho, K., Lee, J., Lim, J. & Moon, J., 2007 Dec 1, Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. p. 155-161 7 p. 4550323. (Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Windows pagefile collection and analysis for a live forensics context

Lee, S., Savoldi, A., Lee, S. & Lim, J., 2007 Jan 1, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 97-101 5 p. 4426211. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2006

A key management scheme for large scale distributed sensor networks

Kim, Y. H., Lee, H., Lee, D. H. & Lim, J. I., 2006 Oct 31, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4217 LNCS. p. 437-446 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4217 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Analysis of the power consumption of secure communication in wireless networks

Kim, K., Hong, J. & Lim, J. I., 2006 Oct 10, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4080 LNCS. p. 894-903 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4080 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

An efficient public key cryptosystem with a privacy enhanced double decryption mechanism

Youn, T. Y., Park, Y. H., Kim, C. H. & Lim, J. I., 2006 Jul 10, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3897 LNCS. p. 144-158 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3897 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

A weak key class of XTEA for a related-key rectangle attack

Lee, E., Hong, D., Chang, D., Hong, S. & Lim, J., 2006 Dec 1, Progress in Cryptology, VIETCRYPT 2006 - 1st International Conference on Cryptology in Vietnam, Revised Selected Papers. p. 286-297 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4341 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Efficient and provably secure client-to-client password-based key exchange protocol

Byun, J. W., Lee, D. H. & Lim, J. I., 2006 Jul 6, Frontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings. p. 830-836 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3841 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

Efficient conjunctive keyword search on encrypted data storage system

Byun, J. W., Lee, D. H. & Lim, J. I., 2006 Jul 27, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4043 LNCS. p. 184-196 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

54 Citations (Scopus)

Further security analysis of XTR

Han, D. G., Takagi, T. & Lim, J. I., 2006 Jul 10, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3903 LNCS. p. 33-44 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3903 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Generic cryptanalysis of combined countermeasures with randomized BSD representations

Kim, T. H., Han, D. G., Okeya, K. & Lim, J. I., 2006 Jul 14, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3928 LNCS. p. 119-134 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3928 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)