• 6172 Citations
  • 35 h-Index
19952019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

Detection of Injection Attacks in Compressed CAN Traffic Logs

Gazdag, A., Neubrandt, D., Buttyán, L. & Szalay, Z., Jan 1 2019, Security and Safety Interplay of Intelligent Software Systems - ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Revised Selected Papers. Gallina, B., Shabtai, A., Elovici, Y., Hamid, B. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 111-124 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11552 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Towards Detecting Trigger-Based Behavior in Binaries: Uncovering the Correct Environment

Papp, D., Tarrach, T. & Buttyán, L., Jan 1 2019, Software Engineering and Formal Methods - 17th International Conference, SEFM 2019, Proceedings. Ölveczky, P. C. & Salaün, G. (eds.). Springer Verlag, p. 491-509 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11724 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Problem domain analysis of IoT-driven secure data markets

Horváth, M. & Buttyán, L., Jan 1 2018, Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, Revised Selected Papers. Springer Verlag, p. 57-67 11 p. (Communications in Computer and Information Science; vol. 821).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2017

Efficient lossless compression of CAN traffic logs

Gazdag, A., Buttyán, L. & Szalay, Z., Nov 20 2017, 2017 25th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2017. Institute of Electrical and Electronics Engineers Inc., 8115527

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Towards semi-automated detection of trigger-based behavior for software security assurance

Papp, D., Buttyán, L. & Ma, Z., Aug 29 2017, ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security. Association for Computing Machinery, Vol. Part F130521. a64

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Membrane: A posteriori detection of malicious code loading by memory paging analysis

Pék, G., Lázár, Z., Várnagy, Z., Félegyházi, M. & Buttyán, L., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer Verlag, Vol. 9878 LNCS. p. 199-216 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2015

Embedded systems security: Threats, vulnerabilities, and attack taxonomy

Papp, D., Ma, Z. & Buttyán, L., Aug 31 2015, 2015 13th Annual Conference on Privacy, Security and Trust, PST 2015. Institute of Electrical and Electronics Engineers Inc., p. 145-152 8 p. 7232966

Research output: Chapter in Book/Report/Conference proceedingConference contribution

58 Citations (Scopus)
2014

FlipThem: Modeling targeted attacks with FlipIt for multiple resources

Laszka, A., Horvath, G., Felegyhazi, M. & Buttyán, L., Jan 1 2014, Decision and GameTheory for Security - 5th International Conference, GameSec 2014, Proceedings. Poovendran, R. & Saad, W. (eds.). Springer Verlag, p. 175-194 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8840).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Citations (Scopus)

Formal security verification of transport protocols for wireless sensor networks

Ta, V. T., Dvir, A. & Buttyán, L., Jan 1 2014, Advanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014. Nguyen, N. T., An Le Thi, H. & Van Do, T. (eds.). Springer Verlag, p. 389-403 15 p. (Advances in Intelligent Systems and Computing; vol. 282).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Towards the automated detection of unknown malware on live systems

Pek, G. & Buttyan, L., Jan 1 2014, 2014 IEEE International Conference on Communications, ICC 2014. IEEE Computer Society, p. 847-852 6 p. 6883425. (2014 IEEE International Conference on Communications, ICC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2013

SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains

Dvir, A., Buttyan, L. & Thong, T. V., Jan 1 2013, 2013 IEEE International Conference on Communications, ICC 2013. Institute of Electrical and Electronics Engineers Inc., p. 2073-2078 6 p. 6654831. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2012

A machine learning based approach for predicting undisclosed attributes in social networks

Kótyuk, G. & Buttyan, L., Jun 5 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012. p. 361-366 6 p. 6197511. (2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

A wireless sensor and actuator network for improving the electrical power grid dependability

Grilo, A., Casaca, A., Pereira, P., Buttyan, L., Gonçalves, J. & Fortunato, C., Oct 1 2012, 8th EURO-NF Conference on Next Generation Internet, NGI 2012 - Proceedings. p. 71-78 8 p. 6252167. (8th EURO-NF Conference on Next Generation Internet, NGI 2012 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Game-theoretic robustness of many-to-one networks

Laszka, A., Szeszlér, D. & Buttyán, L., Dec 1 2012, Game Theory for Networks - Third International ICST Conference, GameNets 2012, Revised Selected Papers. p. 88-98 11 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 105 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Invitation-oriented TGDH: Key management for dynamic groups in an asynchronous communication model

Lám, I., Szebeni, S. & Buttyán, L., Dec 20 2012, Proceedings - 41st International Conference on Parallel Processing Workshops, ICPPW 2012. p. 269-276 8 p. 6337490. (Proceedings of the International Conference on Parallel Processing Workshops).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Linear loss function for the network blocking game: An efficient model for measuring network robustness and link criticality

Laszka, A., Szeszlér, D. & Buttyán, L., Nov 26 2012, Decision and Game Theory for Security - Third International Conference, GameSec 2012, Proceedings. p. 152-170 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7638 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Query auditing for protecting max/min values of sensitive attributes in statistical databases

Thong, T. V. & Buttyán, L., Sep 14 2012, Trust, Privacy and Security in Digital Business - 9th International Conference, TrustBus 2012, Proceedings. p. 192-206 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7449 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Traffic analysis attacks and countermeasures in wireless body area sensor networks

Buttyan, L. & Holczer, T., Sep 24 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - Digital Proceedings. 6263774. (2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - Digital Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Tresorium: Cryptographic file system for dynamic groups over untrusted cloud storage

Lám, I., Szebeni, S. & Buttyán, L., Dec 20 2012, Proceedings - 41st International Conference on Parallel Processing Workshops, ICPPW 2012. p. 296-303 8 p. 6337494. (Proceedings of the International Conference on Parallel Processing Workshops).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)
2011

A secure distributed transport protocol for wireless sensor networks

Buttyan, L. & Grilo, A. M., Sep 2 2011, 2011 IEEE International Conference on Communications, ICC 2011. 5962646. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

CLEARER: CrySyS laboratory security and privacy research roadmap

Buttyán, L., Félegyházi, M. & Bencsáth, B., Dec 23 2011, Proceedings - 1st SysSec Workshop, SysSec 2011. p. 75-78 4 p. 6092769. (Proceedings - 1st SysSec Workshop, SysSec 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

nEther: In-guest detection of out-of-the-guest malware analyzers

Pék, G., Bencsáth, B. & Buttyán, L., Jun 6 2011, Proceedings of the 4th Workshop on European Workshop on System Security, EUROSEC'11. 3. (Proceedings of the 4th Workshop on European Workshop on System Security, EUROSEC'11).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

38 Citations (Scopus)

Optimal selection of sink nodes in wireless sensor networks in adversarial environments

Lászka, Á., Buttyán, L. & Szeszlér, D., Sep 19 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2011 - Digital Proceedings. 5986167. (2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2011 - Digital Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

VeRA - Version number and rank authentication in RPL

Dvir, A., Holczer, T. & Buttyan, L., Dec 16 2011, Proceedings - 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2011. p. 709-714 6 p. 6076674. (Proceedings - 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

92 Citations (Scopus)

XCS based hidden firmware modification on embedded devices

Bencsáth, B., Buttyán, L. & Paulik, T., Nov 23 2011, 2011 International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2011. p. 327-331 5 p. 6064451. (2011 International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2010

Formal verification of secure ad-hoc network routing protocols using deductive model-checking

Buttyán, L. & Vinh Thong, T., Dec 1 2010, 2010 3rd Joint IFIP Wireless and Mobile Networking Conference, WMNC 2010. 5678752. (2010 3rd Joint IFIP Wireless and Mobile Networking Conference, WMNC 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Misbehaving router detection in link-state routing for wireless mesh networks

Ács, G., Buttyán, L. & Dóra, L., Aug 27 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings. 5534995. (2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Perfectly anonymous data aggregation in wireless sensor networks

Buttyán, L. & Holczer, T., Dec 1 2010, 2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010. p. 513-518 6 p. 5663911. (2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Pollution attack defense for coding based sensor storage

Buttýan, L., Czap, Ĺ. & Vajda, I., Nov 1 2010, SUTC 2010 - 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, UMC 2010 - 2010 IEEE International Workshop on Ubiquitous and Mobile Computing. p. 66-73 8 p. 5504639. (SUTC 2010 - 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, UMC 2010 - 2010 IEEE International Workshop on Ubiquitous and Mobile Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Security analysis of reliable transport layer protocols for wireless sensor networks

Buttyán, L. & Csik, L., Jul 1 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010. p. 419-424 6 p. 5470633. (2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)
2009

An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks

Buttyán, L. & Dóra, L., Dec 1 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks and Workshops, WOWMOM 2009. 5282425. (2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks and Workshops, WOWMOM 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Private cluster head election in wireless sensor networks

Buttyán, L. & Holczer, T., Dec 1 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09. p. 1048-1053 6 p. 5337013. (2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

SLOW: A practical pseudonym changing scheme for location privacy in VANETs

Buttyán, L., Holczer, T., Weimerskirch, A. & Whyte, W., Dec 1 2009, 2009 IEEE Vehicular Networking Conference, VNC 2009. 5416380. (2009 IEEE Vehicular Networking Conference, VNC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

81 Citations (Scopus)
2008

Securing coding based distributed storage in wireless sensor networks

Buttyán, L., Czap, L. & Vajda, I., Dec 1 2008, 2008 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2008. p. 821-827 7 p. 4660132. (2008 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)
2007

An authentication scheme for fast handover between WiFi access points

Bohák, A., Buttyán, L. & Dóra, L., Jan 1 2007, WICON 2007 - 3rd International ICST Conference on Wireless Internet. Qiu, L. & Valko, A. (eds.). ICST, 2282. (WICON 2007 - 3rd International ICST Conference on Wireless Internet).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Architecture for secure and private vehicular communications

Papadimitratos, P., Buttyan, L., Hubaux, J. P., Kargl, F., Kung, A. & Raya, M., Dec 1 2007, ITST 2007 - 7th International Conference on Intelligent Transport Systems Telcommunications, Proceedings. p. 339-344 6 p. 4295890. (ITST 2007 - 7th International Conference on Intelligent Transport Systems Telecommunications, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

134 Citations (Scopus)

Barter-based cooperation in delay-tolerant personal wireless networks

Buttyán, L., Dóra, L., Félegyházi, M. & Vajda, I., Dec 1 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM. 4351689. (2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

44 Citations (Scopus)

Group-based private authentication

Avoine, G., Buttyán, L., Holczer, T. & Vajda, I., Dec 1 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM. 4351808. (2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Citations (Scopus)

On the effectiveness of changing pseudonyms to provide location privacy in VANETs

Buttyán, L., Holczer, T. & Vajda, I., Dec 1 2007, Security and Privacy in Ad-hoc and Sensor Networks - 4th European Workshop, ESAS 2007, Proceedings. p. 129-141 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4572 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

117 Citations (Scopus)

PANEL: Position-based aggregator node election in wireless sensor networks

Buttyán, L. & Schaffer, P., Dec 1 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS. 4428643. (2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

42 Citations (Scopus)

The security proof of a link-state routing protocol for wireless sensor networks

Ács, G., Buttyán, L. & Vajda, I., Dec 1 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS. 4428765. (2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)
2006

Modelling adversaries and security objectives for routing protocols in wireless sensor networks

Ács, G., Buttyán, L. & Vajda, I., Dec 1 2006, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 49-58 10 p. (Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Citations (Scopus)

Optimal key-trees for tree-based private authentication

Buttyán, L., Holczer, T. & Vajda, I., Dec 1 2006, Privacy Enhancing Technologies - 6th International Workshop, PET 2006, Revised Selected Papers. p. 332-350 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4258 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

RANBAR: RANSAC-based resilient aggregation in sensor networks

Buttyán, L., Schaffer, P. & Vajda, I., Dec 1 2006, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 83-90 8 p. (Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Citations (Scopus)

Resilient aggregation with attack detection in sensor networks

Buttyán, L., Schaffer, P. & Vajda, I., Oct 31 2006, Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006. p. 332-336 5 p. 1598998. (Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Citations (Scopus)
2005

Cooperative packet forwarding in multi-domain sensor networks

Félegyházi, M., Hubaux, J. P. & Buttyán, L., Dec 1 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops. p. 345-349 5 p. 1392864. (Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Citations (Scopus)

Provable security fof on-demand distance vector routing in wireless ad hoc networks

Ács, G., Buttyán, L. & Vajda, I., Dec 1 2005, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers. p. 113-127 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3813 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Citations (Scopus)

Spontaneous cooperation in multi-domain sensor networks

Buttyán, L., Holczer, T. & Schaffer, P., Dec 1 2005, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers. p. 42-53 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3813 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Statistical wormhole detection in sensor networks

Buttyán, L., Dóra, L. & Vajda, I., Dec 1 2005, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers. p. 128-141 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3813 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

71 Citations (Scopus)
2004

Mitigating the untrusted terminal problem using conditional signatures

Berta, I. Z., Buttyán, L. & Vajda, I., Jul 7 2004, International Conferen ON Information Technology: Coding Computing, ITCC 2004. Srimani, P. K., Abraham, A., Cannataro, M., Domingo-Ferrer, J. & Hashemi, R. (eds.). p. 12-16 5 p. (International Conference on Information Technology: Coding Computing, ITCC; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)