Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2023

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • Conference contribution

    Concrete security analysis of CTR-OFB and CTR-CFB modes of operation

    Sung, J., Lee, S., Lim, J., Lee, W. & Yi, O., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 103-113 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Conditional correlation attack on nonlinear filter generators

    Lee, S., Chee, S., Park, S. & Park, S., 1996, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1163. p. 360-367 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Database forensic investigation based on table relationship analysis techniques

    Lee, D., Choi, J. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404235. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Data hiding in windows executable files

    Shin, D. M., Kim, Y., Byun, K. D. & Lee, S., 2008, Proceedings of the 6th Australian Digital Forensics Conference. p. 153-159 7 p. (Proceedings of the 6th Australian Digital Forensics Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Data leak analysis in a corporate environment

    Lee, S., Lee, K., Savoldi, A. & Lee, S., 2009, 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009. p. 38-43 6 p. 5412531. (2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and implementation of a tool for System Restore Point analysis

    Yun, S. M., Savoldi, A., Gubian, P., Kim, Y., Lee, S. & Lee, S., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 542-546 5 p. 4604116. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and implementation of a tool to detect accounting frauds

    Kim, Y., Savoldi, A., Lee, H., Yun, S., Lee, S. & Lim, J., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 547-552 6 p. 4604117. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Design and implementation of the IMS-IPMP system in convergence home-network environment

    Park, J. H., Lee, S. J., Kim, Y. & Koh, B. S., 2005, Digital Libraries: Implementing Strategies and Sharing Experiences - 8th International Conference on Asian Digital Libraries, ICADL 2005, Proceedings. Springer Verlag, p. 465-466 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3815 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1233-1238 6 p. 4197448. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Design and implementation of the UsMSS: User-centric secure multimedia service system in intelligent home

    Park, J. H., Lee, S., Lee, D. H., Lim, J., Hong, I. H. & Yang, L. T., 2007, Proceedings - 21st International Conference on Advanced Information Networking and Applications, AINA 2007. p. 311-316 6 p. 4220909. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Detecting similar files based on hash and statistical analysis for digital forensic investigation

    Seo, K., Lim, K., Choi, J., Chang, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404198. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Detection and Response of Identity Theft within a Company Utilizing Location Information

    Cho, Y. & Lee, S., 2016 Apr 19, 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7456790

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Detection of hidden information in forensic tools

    Kim, Y., Bang, J., Lee, S. & Lim, J., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 248-252 5 p. 4511571. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Difference distribution attack on DONUT and improved DONUT

    Cheon, D. H., Hong, S., Lee, S., Lee, S. J., Park, K. H. & Yoon, S. H., 2001, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2015. p. 37-48 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Digital evidence collection process in integrity and memory information gathering

    Lee, S., Kim, H., Lee, S. & Lim, J., 2005, Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering. p. 236-247 12 p. 1592536. (Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Digital Forensics Technology Management Platform

    Jeon, S. & Lee, S., 2016 Apr 19, 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7456793

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Discovering methodology and scenario to detect covert database system

    Lee, G. T., Lee, S., Tsomko, E. & Lee, S., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 130-135 6 p. 4426217. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Evidence investigation methodologies for detecting financial fraud based on forensic accounting

    Choi, J., Choi, K. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404202. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Extended OCBP Scheme for MIPv6 over IEEE 802.16e Networks

    Park, H. S., Yun, S., Kim, B. H., Lee, D. C., Yi, O. & Lee, S., 2008, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 732-738 7 p. 4622915. (Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Extraction of residual information in the microsoft powerpoint file from the viewpoint of digital forensics considering PerCom environment

    Park, J., Park, B., Lee, S., Hong, S. & Park, J. H., 2008, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 584-589 6 p. 4517460. (6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Forensic analysis of android phone using Ext4 file system journal log

    Kim, D., Park, J., Lee, K. G. & Lee, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 435-446 12 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Forensic analysis of residual information in adobe PDF files

    Chung, H., Park, J. & Lee, S., 2011, Future Information Technology - 6th International Conference, FutureTech 2011, Proceedings. PART 2 ed. p. 100-109 10 p. (Communications in Computer and Information Science; vol. 185 CCIS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Forensic artifacts left by virtual disk encryption tools

    Lim, S., Park, J., Lim, K. S., Lee, C. & Lee, S., 2010, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563320. (2010 3rd International Conference on Human-Centric Computing, HumanCom 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Forensic investigation method and tool based on the user behaviour analysis

    Son, N. & Lee, S., 2011, Proceedings of the 9th Australian Digital Forensics Conference. p. 125-133 9 p. (Proceedings of the 9th Australian Digital Forensics Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Forgery and key recovery attacks on PMAC and Mitchell's TMAC variant

    Lee, C., Kim, J., Sung, J., Hong, S. & Lee, S., 2006, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings. Springer Verlag, p. 421-431 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4058 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Generalised category attack-improving histogram-based attack on JPEG LSB embedding

    Lee, K., Westfeld, A. & Lee, S., 2007, Information Hiding - 9th International Workshop, IH 2007, Revised Selected Papers. p. 378-391 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4567 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • Hard-core user and bot user classification using game character's growth types

    Lee, J., Kang, S. W. & Kim, H. K., 2016 Jan 13, 2015 International Workshop on Network and Systems Support for Games, NetGames 2015. IEEE Computer Society, 7383000. (Annual Workshop on Network and Systems Support for Games; vol. 2016-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • High-speed RSA crypto-processor with radix-4 modular multiplication and Chinese remainder theorem

    Koo, B., Lee, D., Ryu, G., Chang, T. & Lee, S., 2006, Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings. p. 81-93 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4296 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • HIGHT: A new block cipher suitable for low-resource device

    Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B. S., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J. & Chee, S., 2006, Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings. Springer Verlag, p. 46-59 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4249 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    517 Citations (Scopus)
  • How to construct universal one-way hash functions of order r

    Hong, D., Sung, J., Hong, S. & Lee, S., 2005, Progress in Cryptology - INDOCRYPT 2005 - 6th International Conference on Cryptology in India, Proceedings. Springer Verlag, p. 63-76 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3797 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Image enhancement for reducing LCD backlight power based on human visual characteristics

    Lee, S., Lee, H. & Sull, S., 2010, Proceedings - 2010 Digital Image Computing: Techniques and Applications, DICTA 2010. p. 132-136 5 p. 5692553. (Proceedings - 2010 Digital Image Computing: Techniques and Applications, DICTA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Impossible differential cryptanalysis of reduced round XTEA and TEA

    Moon, D., Hwang, K., Lee, W., Lee, S. & Lim, J., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Daemen, J. & Rijmen, V. (eds.). Springer Verlag, p. 49-60 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    37 Citations (Scopus)
  • Impossible differential cryptanalysis of zodiac

    Hong, D., Sung, J., Moriai, S., Lee, S. & Lim, J., 2002, Fast Software Encryption - 8th International Workshop, FSE 2001, Revised Papers. Matsui, M. (ed.). Springer Verlag, p. 300-311 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Improved fast correlation attack on the shrinking and self-shrinking generators

    Jeong, K., Sung, J., Hong, S., Lee, S., Kim, J. & Hong, D., 2006, Progress in Cryptology, VIETCRYPT 2006 - 1st International Conference on Cryptology in Vietnam, Revised Selected Papers. Springer Verlag, p. 260-270 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4341 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Indifferentiable security analysis of popular hash functions with prefix-free padding

    Chang, D., Lee, S., Nandi, M. & Yung, M., 2006, Advances in Cryptology - ASIACRYPT 2006 - 12th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 283-298 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4284 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    41 Citations (Scopus)
  • Integrated e-mail analysis tool design for digital criminal investigation

    Jeong, C., Lee, K. G., Yoo, B. & Lee, S., 2010, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563315. (2010 3rd International Conference on Human-Centric Computing, HumanCom 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Intelligent multimedia service system based on context awareness in smart home

    Park, J. H., Park, H. S., Lee, S. J., Choi, J. & Lee, D. G., 2005, Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Proceedings. Springer Verlag, p. 1146-1152 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3681 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Known-IV attacks on triple modes of operation of block ciphers

    Hong, D., Sung, J., Hong, S., Lee, W., Lee, S., Lim, J. & Yi, O., 2001, Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Boyd, C. (ed.). Springer Verlag, p. 208-221 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2248).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Citations (Scopus)
  • Live forensic analysis of a compromised linux system using LECT (Linux Evidence Collection Tool)

    Choi, J., Savoldi, A., Gubian, P., Lee, S. & Lee, S., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 231-236 6 p. 4511568. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Methodologies for detecting covert database

    Lee, K. G., Savoldi, A., Gubian, P., Lim, K. S., Lee, S. & Lee, S., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 538-541 4 p. 4604115. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Methodology for digital forensic investigation of iCloud

    Lee, J., Chung, H., Lee, C. & Lee, S., 2012, Information Technology Convergence, Secure and Trust Computing, and Data Management, ITCS 2012 and STA 2012. p. 197-206 10 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Methodology for digital investigation of illegal sharing using BitTorrent

    Park, S., Chung, H., Lee, C. & Lee, S., 2012, Information Technology Convergence, Secure and Trust Computing, and Data Management, ITCS 2012 and STA 2012. p. 187-195 9 p. (Lecture Notes in Electrical Engineering; vol. 180 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Model for digital business forensics

    Ahn, J. & Lee, S., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404231. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • New block cipher DONUT using pairwise perfect decorrelation

    Cheon, D. H., Lee, S., Lim, J. I. & Lee, S. J., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1977. p. 250-258 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1977).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • New steganalysis methodology: LR cube analysis for the detection of LSB steganography

    Lee, K., Jung, C., Lee, S. & Lim, J., 2006, Information Hiding - 7th International Workshop, IH 2005, Revised Selected Papers. Springer Verlag, p. 312-326 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3727 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Notarization and archive system of web postings for litigation

    Kim, A., Kim, Y., Lim, S. & Lee, S., 2010, 2010 3rd International Conference on Human-Centric Computing, HumanCom 2010. 5563316. (2010 3rd International Conference on Human-Centric Computing, HumanCom 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Off-line authentication using watermarks

    Yoo, H., Lee, K., Lee, S. & Lim, J., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 200-213 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Online removal of ocular artifacts from single channel EEG for ubiquitous healthcare applications

    Shin, H., Kim, H., Lee, S. & Kang, J., 2009, Proceedings of the 4th International Conference on Ubiquitous Information Technologies and Applications, ICUT 2009. 5405708. (Proceedings of the 4th International Conference on Ubiquitous Information Technologies and Applications, ICUT 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • On the correlation immune functions and their nonlinearity

    Chee, S., Lee, S., Lee, D. & Sung, S. H., 1996, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1163. p. 232-243 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • On the optimal diffusion layers with practical security against differential and linear cryptanalysis

    Kang, J. S., Park, C., Lee, S. & Lim, J. I., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 38-52 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)