Calculated based on number of publications stored in Pure and citations from Scopus
1994 …2024

Research activity per year

Filter
Conference contribution

Search results

  • 2023

    Security Attacks Against the Availability of Low Earth Orbit Satellite Networks

    Yoon, S., Kang, M. & Choi, J. Y., 2023 Dec 15, Proceedings of 2023 the 12th International Conference on Networks, Communication and Computing, ICNCC 2023. Association for Computing Machinery, p. 64-69 6 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2022

    Formal Modeling of Smart Contract-based Trading System

    Park, W. S., Lee, H. & Choi, J. Y., 2022, 24th International Conference on Advanced Communication Technology: Artificial Intelligence Technologies toward Cybersecurity!!, ICACT 2022 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 48-52 5 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2022-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Is a False Positive really False Positive?

    Choi, H. J., Lee, H. & Choi, J. Y., 2022, 24th International Conference on Advanced Communication Technology: Artificial Intelligence Technologies toward Cybersecurity!!, ICACT 2022 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 145-149 5 p. (International Conference on Advanced Communication Technology, ICACT; vol. 2022-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    Formal Modeling of Smart Contract-based Trading System

    Park, W. S., Lee, H. & Choi, J. Y., 2021 Feb 7, 23rd International Conference on Advanced Communication Technology: On-Line Security in Pandemic Era!, ICACT 2021 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 48-52 5 p. 9370462. (International Conference on Advanced Communication Technology, ICACT; vol. 2021-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Is a False Positive really False Positive?

    Choi, H. J., Lee, H. & Choi, J. Y., 2021 Feb 7, 23rd International Conference on Advanced Communication Technology: On-Line Security in Pandemic Era!, ICACT 2021 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 145-149 5 p. 9370442. (International Conference on Advanced Communication Technology, ICACT; vol. 2021-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2020

    Analysis of software weakness detection of CBMC based on CWE

    Byun, M., Lee, Y. & Choi, J. Y., 2020 Feb 1, 22nd International Conference on Advanced Communications Technology: Digital Security Global Agenda for Safe Society, ICACT 2020 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 171-175 5 p. 9061281. (International Conference on Advanced Communication Technology, ICACT; vol. 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Formal Modeling and Verification of Software-Defined Networking with Multiple Controllers

    Kang, M. & Choi, J. Y., 2020, Testbeds and Research Infrastructures for the Development of Networks and Communications - 14th EAI International Conference, TridentCom 2019 - Proceedings. Gao, H., Li, K., Yang, X. & Yin, Y. (eds.). ICST, p. 81-94 14 p. (EAI International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    Risk and avoidance strategy for blocking mechanism of SDN-based security service

    Byun, M., Lee, Y. & Choi, J. Y., 2019 Apr 29, 21st International Conference on Advanced Communication Technology: ICT for 4th Industrial Revolution!, ICACT 2019 - Proceeding. Institute of Electrical and Electronics Engineers Inc., p. 187-190 4 p. 8701887. (International Conference on Advanced Communication Technology, ICACT; vol. 2019-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2017

    MemPatrol: Reliable sideline integrity monitoring for high-performance systems

    Nam, M. J., Nam, W., Choi, J. Y. & Akritidis, P., 2017, Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017. Polychronakis, M. & Meier, M. (eds.). Springer Verlag, p. 48-69 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    Formal modeling and verification for SDN firewall application using pACSR

    Kang, M., Choi, J. Y., Kwak, H. H., Kang, I., Shin, M. K. & Yi, J. H., 2015, Electronics, Communications and Networks IV - Proceedings of the 4th International Conference on Electronics, Communications and Networks, CECNet2014. Hussain, A. & Ivanovic, M. (eds.). CRC Press/Balkema, p. 155-161 7 p. (Electronics, Communications and Networks IV - Proceedings of the 4th International Conference on Electronics, Communications and Networks, CECNet2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Verification for NFV-enabled network services

    Shin, M. K., Choi, Y., Kwak, H. H., Pack, S., Kang, M. & Choi, J. Y., 2015 Dec 11, International Conference on ICT Convergence 2015: Innovations Toward the IoT, 5G, and Smart Media Era, ICTC 2015. Institute of Electrical and Electronics Engineers Inc., p. 810-815 6 p. 7354672. (International Conference on ICT Convergence 2015: Innovations Toward the IoT, 5G, and Smart Media Era, ICTC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)
  • 2012

    Formal specifications for software-defined networking

    Kang, M., Park, J., Shin, J., Nam, K. H., Shin, M. K. & Choi, J. Y., 2012, Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12. p. 51 1 p. (Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Process algebraic specification of software defined networks

    Kang, M., Park, J., Choi, J. Y., Nam, K. H. & Shin, M. K., 2012, Proceedings - 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012. p. 359-363 5 p. 6274368. (Proceedings - 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2010

    A method of measuring the propagation of damage to information communication system

    Yoo, D. Y., Yi, W. S., Lee, G. S. & Choi, J. Y., 2010, 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. p. 192-196 5 p. 5542928. (2nd International Conference on Software Engineering and Data Mining, SEDM 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A process algebraic framework for modeling resource demand and supply

    Philippou, A., Lee, I., Sokolsky, O. & Choi, J. Y., 2010, Formal Modeling and Analysis of Timed Systems - 8th International Conference, FORMATS 2010, Proceedings. p. 183-197 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6246 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • Modeling autonomous military robots using hybrid system framework

    Lee, J., Cha, R., Han, Y., Nam, W., Choi, J. Y., Kim, W. T. & Park, S. M., 2010, 2010 International Conference on Information and Communication Technology Convergence, ICTC 2010. p. 429-430 2 p. 5674805. (2010 International Conference on Information and Communication Technology Convergence, ICTC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Security analysis of smart card based password authentication schemes

    Kim, H. S., Seo, S. & Choi, J. Y., 2010, Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010. p. 352-356 5 p. 5534807. (Proceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2009

    Automatic consistency checking of use case scenarios

    Min, H. & Choi, J. Y., 2009, Proceedings of the 13th IASTED International Conference on Software Engineering and Applications, SEA 2009. p. 166-173 8 p. (Proceedings of the 13th IASTED International Conference on Software Engineering and Applications, SEA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cryptanalysis of secure key exchange protocol between STB and Smart card in IPTV broadcasting

    Lee, S. H., Park, N. S., Kim, S. K. & Choi, J. Y., 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 797-803 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • FMIPv6 based secure binding update authentication in wireless vehicular networks

    Lee, S. H., Choi, J. Y. & Park, N. S., 2009, 2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009. IEEE Computer Society, 4800584. (2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2008

    A calculus to reduce spatial and temporal complexity for specification and analysis of complex real-time systems

    Choi, J., Choi, J. Y., On, J. & Lee, M., 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 8-13 6 p. 4623969. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A lightweight protocol analysis and modification for secure RFID system

    Kim, H. S. & Choi, J. Y., 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks, ICCCN 2008. p. 958-962 5 p. 4674336. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Biometric handshake protocol on telebiometric system mechanism for national infrastructure

    Shin, Y. N., Lee, Y. J., Shin, W. & Choi, J. Y., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 57-60 4 p. 4511534. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Designing fingerprint-recognition-based access control for electronic medical records systems

    Shin, Y., Lee, Y., Shin, W. & Choi, J., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 106-110 5 p. 4482898. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Formal verification of cryptographic protocol for secure RFID system

    Kim, H. S., Oh, J. H., Kim, J. B., Jeong, Y. O. & Choi, J. Y., 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 470-477 8 p. 4624188. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Weaknesses analysis and countermeasure of a verifier-based key agreement protocol

    Kim, H. S., Seo, S. & Choi, J. Y., 2008, Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008. p. 1015-1018 4 p. 4637818. (Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    A light-weight security protocol for RFID system

    Oh, J. H., Kim, H. S. & Choi, J. Y., 2007, Personal Wireless Communications: The 12th IFIP International Conference on Personal Wireless Communications (PWC 2007), Prague, Czech Republic, September 2007. Bestak, R., Simak, B. & Kozlowska, E. (eds.). p. 384-395 12 p. (IFIP International Federation for Information Processing; vol. 245).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A secure communication protocol for low-cost RFID system

    Oh, J. H., Kim, H. S. & Choi, J. Y., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 949-954 6 p. 4385207. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Embedded system modeling based on resource-oriented model

    Kim, J. H. & Choi, J. Y., 2007, Proceedings - 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2007: Raising Expectations of Computer-Based Systems. p. 203-212 10 p. 4148935. (Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Formal embedded operating system model based on resource-based design framework

    Kim, J. H., Sim, J. H., Kim, C. J. & Choi, J. Y., 2007, Proceedings - 7th International Conference on Quality Software, QSIC 2007. p. 244-249 6 p. 4385502. (Proceedings - International Conference on Quality Software).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Formal security policy model for a common criteria evaluation

    Park, J. & Choi, J. Y., 2007, 9th International Conference on Advanced Communication Technology, ICACT 2007. p. 277-281 5 p. 4195134. (International Conference on Advanced Communication Technology, ICACT; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Performance evaluation model for the face recognition system

    Shin, Y. N., Kim, J., Lee, Y. J., Shin, W. & Choi, J., 2007, Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007. p. 704-708 5 p. 4524191. (Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • RFID privacy protection scheme for secure ubiquitous computing

    Kim, H. S., Oh, J. H. & Choi, J. Y., 2007, Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007. p. 117-124 8 p. (Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2007; In Conjunction with ICEIS 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security and privacy analysis of RFID authentication protocol for ubiquitous computing

    Kim, H. S. & Choi, J. Y., 2007, Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007. p. 1359-1363 5 p. 4318010. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • The design and verification of RFID authentication protocol for ubiquitous computing

    Kim, H. S. & Choi, J. Y., 2007, Proceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications. p. 693-697 5 p. 4312983. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2006

    A medium access control scheme for providing reliability in wireless ad hoc networks

    Lee, S. H. & Choi, J. Y., 2006, Wireless Algorithms, Systems, and Applications - First International Conference, WASA 2006, Proceedings. Springer Verlag, p. 341-352 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4138 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secrecy analysis of purchase transaction in electronic purses

    Kim, I. G., Kim, H. S., Lee, J. Y., Kang, I. & Choi, J. Y., 2006, Proceedings - 20th International Conference on Advanced Information Networking and Applications. p. 979-984 6 p. 1620313. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Security analysis of RFID authentication for pervasive systems using model checking

    Kim, H. S., Oh, J. H. & Choi, J. Y., 2006, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Short Papers/Workshops/Fast Abstracts/Doctoral Symposium. p. 195-202 8 p. 4020167. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Security and privacy analysis of RFID systems using model checking

    Kim, H. S., Kim, I. G., Han, K. H. & Choi, J. Y., 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 495-504 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • The vulnerabilities analysis and design of the security protocol for RFID system

    Kim, H. S., Oh, J. H., Choi, J. Y. & Kim, J. W., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. 4019943. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Verifying software streaming systems

    Nam, K. H., Park, J. K., Choi, J. Y., Lee, J. J. & Choi, W., 2006, 8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings. p. 367-371 5 p. 1625592. (8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2005

    Analysis and modification of ASK mobile security protocol

    Kim, I. G., Kim, H. S., Lee, J. Y. & Choi, J. Y., 2005, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. p. 79-83 5 p. 1581579. (Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Analyzing the application of e-Commerce in wireless

    Kim, H. S., Kim, I. G. & Choi, J. Y., 2005, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. p. 112-120 9 p. 1581583. (Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Model-based analysis of money accountability in electronic purses

    Kim, I. G., Moon, Y. J., Kang, I., Lee, J. Y., Han, K. H. & Choi, J. Y., 2005, Internet and Network Economics - First International Workshop, WINE 2005, Proceedings. Springer Verlag, p. 346-355 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3828 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2004

    Formal verification of PAP and EAP-MD5 protocols in wireless networks: FDR model checking

    Kim, I. G. & Choi, J. Y., 2004, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (ed.). p. 264-269 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • 2003

    SSR: Statechart with shared resources

    Jang, S. H., Bang, K. S. & Choi, J. Y., 2003, Proceedings - 2003 IEEE Symposium on Human Centric Computing Languages and Environments, HCC 2003. p. 198-200 3 p. 1260229. (Proceedings - 2003 IEEE Symposium on Human Centric Computing Languages and Environments, HCC 2003).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2002

    Bottleneck analysis of a gigabit network interface card: Formal verification approach

    Jin, H. W., Bang, K. S., Yoo, C., Choi, J. Y. & Cha, H. J., 2002, Model Checking Software - 9th International SPIN Workshop, Proceedings. Bosnacki, D. & Leue, S. (eds.). Springer Verlag, p. 170-186 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2318 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2000

    A framework for embedded real-time system design

    Choi, J. Y., Kwak, H. H. & Lee, I., 2000, Parallel and Distributed Processing - 15 IPDPS 2000 Workshops, Proceedings. Rolim, J. (ed.). Springer Verlag, p. 738-742 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1800 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • GAT(Give-And-Take): A Cooperative cache replacement policy for application-controlled file caching

    Kim, G. H., Cho, J. Y., Kang, H. K., Park, M. S. & Choi, J. Y., 2000, Proceedings of the Fifth Joint Conference on Information Sciences, JCIS 2000, Volume 1. Wang, P. P. & Wang, P. P. (eds.). 1 ed. p. 508-511 4 p. (Proceedings of the Joint Conference on Information Sciences; vol. 5, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • LMRU: An Efficient Buffer Management Scheme for Large Sequential and Looping Reference Pattern Applications

    Cho, J. Y., Kim, G. H., Kang, H. K., Park, M. S. & Choi, J. Y., 2000, Proceedings of the Fifth Joint Conference on Information Sciences, JCIS 2000, Volume 1. Wang, P. P. & Wang, P. P. (eds.). 1 ed. p. 504-507 4 p. (Proceedings of the Joint Conference on Information Sciences; vol. 5, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution