• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20002021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • Why they ignore English Emails: The challenges of non-native speakers in identifying phishing emails

    Hasegawa, A. A., Yamashita, N., Akiyama, M. & Mori, T., 2021, Proceedings of the 17th Symposium on Usable Privacy and Security, SOUPS 2021. USENIX Association, p. 319-338 20 p. (Proceedings of the 17th Symposium on Usable Privacy and Security, SOUPS 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts

    Watanabe, T., Shioji, E., Akiyama, M., Sasaoka, K., Yagi, T. & Mori, T., 2018 Jul 6, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 323-337 15 p. (Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Understanding the security management of global third-party android marketplaces

    Ishii, Y., Watanabe, T., Kanei, F., Takata, Y., Shioji, E., Akiyama, M., Yagi, T., Sun, B. & Mori, T., 2017 Sep 5, WAMA 2017 - Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, Co-located with FSE 2017. Sarro, F., Shihab, E., Kaimann, D., Nagappan, M. & Platenius, M. C. (eds.). Association for Computing Machinery, Inc, p. 12-18 7 p. (WAMA 2017 - Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, Co-located with FSE 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Understanding the responsiveness of mobile app developers to software library updates

    Yasumatsu, T., Watanabe, T., Kanei, F., Shioji, E., Akiyama, M. & Mori, T., 2019 Mar 13, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 13-24 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Citations (Scopus)
  • Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps

    Yoshida, K., Imai, H., Serizawa, N., Mori, T. & Kanaoka, A., 2018 Jun 8, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, p. 713-718 6 p. 8377952. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps

    Watanabe, T., Akiyama, M., Kanei, F., Shioji, E., Takata, Y., Sun, B., Ishi, Y., Shibahara, T., Yagi, T. & Mori, T., 2017 Jun 29, Proceedings - 2017 IEEE/ACM 14th International Conference on Mining Software Repositories, MSR 2017. IEEE Computer Society, p. 14-24 11 p. 7962351. (IEEE International Working Conference on Mining Software Repositories).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps

    Watanabe, T., Akiyama, M., Sakai, T., Washizaki, H. & Mori, T., 2019, SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security. USENIX Association, p. 241-255 15 p. (SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Traffic engineering using overlay network

    Kawahara, R., Harada, S., Kamiyama, N., Mori, T., Hasegawa, H. & Nakao, A., 2011 Sep 2, 2011 IEEE International Conference on Communications, ICC 2011. 5963441. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Tap 'n ghost: A compilation of novel attack techniques against smartphone touchscreens

    Maruyama, S., Wakabayashi, S. & Mori, T., 2019 May, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 620-637 18 p. 8835251. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Stay on-topic: Generating context-specific fake restaurant reviews

    Juuti, M., Sun, B., Mori, T. & Asokan, N., 2018, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Lopez, J., Zhou, J. & Soriano, M. (eds.). Springer Verlag, p. 132-151 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11098 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Spatio-temporal factorization of log data for understanding network events

    Kimura, T., Ishibashi, K., Mori, T., Sawada, H., Toyono, T., Nishimatsu, K., Watanabe, A., Shimoda, A. & Shiomoto, K., 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 610-618 9 p. 6847986. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    53 Citations (Scopus)
  • Simple and adaptive identification of superspreaders by flow sampling

    Kamiyama, N., Mori, T. & Kawahara, R., 2007, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications. p. 2481-2485 5 p. 4215887. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    33 Citations (Scopus)
  • Simple and accurate identification of high-rate flows by packet sampling

    Kamiyama, N. & Mori, T., 2006, Proceedings - INFOCOM 2006: 25th IEEE International Conference on Computer Communications. 4146977. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    33 Citations (Scopus)
  • ShamFinder: An automated framework for detecting IDN homographs

    Suzuki, H., Chiba, D., Yoneya, Y., Mori, T. & Goto, S., 2019 Oct 21, IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery, p. 449-462 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    12 Citations (Scopus)
  • SFMap: Inferring services over encrypted web flows using dynamical domain name graphs

    Mori, T., Inoue, T., Shimoda, A., Sato, K., Ishibashi, K. & Goto, S., 2015, Traffic Monitoring and Analysis - 7th International Workshop, TMA 2015, Proceedings. Barlet-Ros, P., Bonaventure, O. & Steiner, M. (eds.). Springer Verlag, p. 126-139 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9053).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Seven years in MWS: Experiences of sharing datasets with anti-malware research community in Japan

    Hatada, M., Terada, M. & Mori, T., 2014 Nov 3, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1433-1435 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Sensor in the dark: Building untraceable large-scale honeypots using virtualization technologies

    Shimoda, A., Mori, T. & Goto, S., 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 22-30 9 p. 5598179. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Sampling rate scalable lossless audio coding

    Moriya, T., Jin, A., Mori, T., Ikeda, K. & Kaneko, T., 2002, 2002 IEEE Speech Coding Workshop: A Paradigm Shift Toward New Coding Functions for the Broadband Age, SCW 2002 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 123-125 3 p. 1215745

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • QoS control to handle long-duration large flows and its performance evaluation

    Kawahara, R., Mori, T. & Abe, T., 2006 Dec 1, 2006 IEEE International Conference on Communications, ICC 2006. p. 579-584 6 p. 4024190. (IEEE International Conference on Communications; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Poster: Toward automating the generation of malware analysis reports using the sandbox logs

    Sun, B., Fujino, A. & Mori, T., 2016 Oct 24, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1814-1816 3 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Poster: Touchflood: A novel class of attacks against capacitive touchscreens

    Maruyama, S., Wakabayashi, S. & Mori, T., 2017 Oct 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. Part F131467. p. 2551-2553 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Poster: A first look at the privacy risks of voice assistant apps

    Natatsuka, A., Akiyama, M., Iijima, R., Sakai, T., Watanabe, T. & Mori, T., 2019 Nov 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2633-2635 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Poster: Is active electromagnetic side-channel attack practical?

    Wakabayashi, S., Maruyama, S., Mori, T., Goto, S., Kinugawa, M. & Hayashi, Y. I., 2017 Oct 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2587-2589 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Performance evaluation of peer-assisted content distribution

    Kawahara, R., Kamiyama, N., Mori, T. & Hasegawa, H., 2011 Jun 7, 2011 IEEE Consumer Communications and Networking Conference, CCNC'2011. p. 725-729 5 p. 5766586. (2011 IEEE Consumer Communications and Networking Conference, CCNC'2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Optimum identification of worm-infected hosts

    Kamiyama, N., Mori, T., Kawahara, R. & Harada, S., 2008 Nov 28, IP Operations and Management - 8th IEEE International Workshop, IPOM 2008, Proceedings. p. 103-116 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5275 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Optimally designing capacity and location of caches to reduce P2P traffic

    Kamiyama, N., Kawahara, R., Mori, T., Harada, S. & Hasegawa, H., 2010, 2010 IEEE International Conference on Communications, ICC 2010. 5501837. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • On the effectiveness of IP reputation for spam filtering

    Esquivel, H., Akella, A. & Mori, T., 2010, 2010 2nd International Conference on COMmunication Systems and NETworks, COMSNETS 2010. 5431981. (2010 2nd International Conference on COMmunication Systems and NETworks, COMSNETS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)
  • On the characteristics of Internet traffic variability: Spikes and elephants

    Mori, T., Naito, S., Kawahara, R. & Goto, S., 2004, Proceedings - 2004 International Symposium on Applications and the Internet (Saint 2004). p. 99-106 8 p. (Proceedings - International Symposium on Applications and the Internet).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Citations (Scopus)
  • Multicast pre-distribution in VoD services

    Kamiyama, N., Kawahara, R., Mori, T. & Hasegawa, H., 2011 Sep 19, 2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability, CQR 2011. 5996079. (2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability, CQR 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Modal gain controllable all-fiber type multimode fiber amplifier

    Wada, M., Sakamoto, T., Mori, T., Hanzawa, N., Yamamoto, T. & Yamamoto, F., 2013, 2013 18th OptoElectronics and Communications Conference Held Jointly with 2013 International Conference on Photonics in Switching, OECC/PS 2013. 6597395. (2013 18th OptoElectronics and Communications Conference Held Jointly with 2013 International Conference on Photonics in Switching, OECC/PS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Loss recovery method for content pre-distribution in VoD service

    Kamiyama, N., Kawahara, R. & Mori, T., 2014, Proceedings of World Telecommunications Congress 2014, WTC 2014. Institute of Electrical and Electronics Engineers Inc., 6840006. (Proceedings of World Telecommunications Congress 2014, WTC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Limiting pre-distribution and clustering users on multicast pre-distribution VoD

    Kamiyama, N., Kawahara, R., Mori, T. & Hasegawa, H., 2011 Sep 19, Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, IM 2011. p. 706-709 4 p. 5990661. (Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, IM 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • ISP-Operated CDN

    Kamiyama, N., Mori, T., Kawahara, R., Harada, S. & Hasegawa, H., 2009 Oct 12, IEEE INFOCOM Workshops 2009. 5072157. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Inferring popularity of domain names with DNS traffic: exploiting cache timeout heuristics

    Shimoda, A., Ishibashi, K., Sato, K., Tsujino, M., Inoue, T., Shimura, M., Takebe, T., Takahashi, K., Mori, T. & Goto, S., 2015, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7417638. (2015 IEEE Global Communications Conference, GLOBECOM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Inferring original traffic pattern from sampled flow statistics

    Mori, T., Kawahara, R., Kamiyama, N. & Harada, S., 2007 Dec 1, 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W. 4090156. (SAINT - 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Increasing the darkness of darknet traffic

    Haga, Y., Saso, A., Mori, T. & Goto, S., 2015, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7416973. (2015 IEEE Global Communications Conference, GLOBECOM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improving deployability of peer-assisted CDN platform with incentive

    Mori, T., Kamiyama, N., Harada, S., Hasegawa, H. & Kawahara, R., 2009 Dec 1, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5425962. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Impact of topology on parallel video streaming

    Kamiyania, N., Kawahara, R., Mori, T., Harada, S. & Hasegawa, H., 2010, Proceedings of the 2010 IEEE/IFIP Network Operations and Management Symposium, NOMS 2010. IEEE Computer Society, p. 607-614 8 p. 5488436. (Proceedings of the 2010 IEEE/IFIP Network Operations and Management Symposium, NOMS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Identifying elephant flows through periodically sampled packets

    Mori, T., Uchida, M., Kawahara, R., Pan, J. & Goto, S., 2004 Dec 1, Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004. p. 115-120 6 p. (Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    144 Citations (Scopus)
  • How is e-mail sender authentication used and misused?

    Mori, T., Takahashi, Y., Sato, K. & Ishibashi, K., 2011 Oct 13, Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS 2011. p. 31-37 7 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Few-mode fiber for optical MIMO transmission with low computational complexity

    Sakamoto, T., Mori, T., Yamamoto, T. & Yamamoto, F., 2013, Next-Generation Optical Communication: Components, Sub-Systems, and Systems II. 86470B. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 8647).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Extracting worm-infected hosts using white list

    Kamiyama, N., Mori, T., Kawahara, R., Harada, S. & Yoshino, H., 2008, Proceedings - 2008 International Symposium on Applications and the Internet, SAINT 2008. p. 68-75 8 p. 4604545. (Proceedings - 2008 International Symposium on Applications and the Internet, SAINT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Expected traffic reduction by content-oriented incentive in peer-assisted content delivery networks

    Maki, N., Nishio, T., Shinkuma, R., Takahashi, T., Mori, T., Kamiyama, N. & Kawahara, R., 2013 May 1, International Conference on Information Networking 2013, ICOIN 2013. p. 450-455 6 p. 6496421. (International Conference on Information Networking).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Estimating top N hosts in cardinality using small memory resources

    Ishibashi, K., Mori, T., Kawahara, R., Hirokawa, Y., Kobayashi, A., Yamamoto, K. & Sakamoto, H., 2006 Jan 1, ICDEW 2006 - Proceedings of the 22nd International Conference on Data Engineering Workshops. Zhou, X. & Barga, R. S. (eds.). Institute of Electrical and Electronics Engineers Inc., 1623824. (ICDEW 2006 - Proceedings of the 22nd International Conference on Data Engineering Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Estimating flow rate from sampled packet streams for detection of performance degradation at TCP flow level

    Kawahara, R., Mori, T., Ishibashi, K., Kamiyama, N. & Abe, T., 2006 Dec 1, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151076. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Eiger: Automated IOC generation for accurate and interpretable endpoint malware detection

    Kurogome, Y., Otsuki, Y., Kawakoya, Y., Iwamura, M., Hayashi, S., Mori, T. & Sen, K., 2019 Dec 9, Proceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019. Association for Computing Machinery, p. 687-701 15 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Citations (Scopus)
  • Efficient timeout checking mechanism for traffic control

    Kamiyama, N., Mori, T., Kawahara, R. & Lua, E. K., 2007 Dec 1, Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007. p. 327-333 7 p. 4317840. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Don't throw me away: Threats caused by the abandoned internet resources used by android apps

    Pariwono, E., Akiyama, M., Chiba, D. & Mori, T., 2018 May 29, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 147-158 12 p. (ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Domain profiler: Discovering domain names abused in future

    Chiba, D., Yagi, T., Akiyama, M., Shibahara, T., Yada, T., Mori, T. & Goto, S., 2016 Sep 29, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 491-502 12 p. 7579766

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names

    Chiba, D., Akiyama, M., Yagi, T., Yada, T., Mori, T. & Goto, S., 2017 Sep 7, Proceedings - 2017 IEEE 41st Annual Computer Software and Applications Conference, COMPSAC 2017. IEEE Computer Society, Vol. 1. p. 643-648 6 p. 8029671

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)