liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
Nadjm-Tehrani, Simin, ProfessorORCID iD iconorcid.org/0000-0002-1485-0802
Alternative names
Publications (10 of 143) Show all publications
Colaco, V. & Nadjm-Tehrani, S. (2025). Real-Time Evasion Detection in Tree Ensemble Automotive Intrusion Detection Systems. In: 16th IEEE Vehicular Networking Conference (VNC): . Paper presented at 2025 IEEE Vehicular Networking Conference (VNC), Porto, Portugal, JUN 02-04, 2025. IEEE
Open this publication in new window or tab >>Real-Time Evasion Detection in Tree Ensemble Automotive Intrusion Detection Systems
2025 (English)In: 16th IEEE Vehicular Networking Conference (VNC), IEEE, 2025Conference paper, Published paper (Refereed)
Abstract [en]

Safety-critical functions in modern vehicles rely on electronic control units that communicate using the controller area network (CAN) protocol, which lacks vital security features. In this context, machine learning (ML) based intrusion detection systems (IDSs) were proposed as a solution to improve cyber resilience through real-time attack detection. However, these ML-IDSs must also withstand evasion attacks that could compromise vehicular safety. To this end, this paper addresses such attacks in misuse-based tree ensemble IDSs and proposes a method that detects evasion attempts. It uses the ordered set of reached leaf nodes activated by correctly classified training samples as a normality baseline. An autoencoder-based detector then identifies deviations as likely evasion attempts. Our approach does not modify the protected tree ensemble IDS, assumes no knowledge of the process for generating adversarial examples (ensuring generalisability), and works with any additive tree ensemble. We also prove that it is mathematically equivalent to the state-of-the-art, which we advance in terms of detection speed by replacing its Hamming distance-based deviation search with an autoencoder-based model of typical predictive behavior trained using our custom loss function. This enhancement results in a detection process that is orders of magnitude faster. Additionally, our method offers nuanced insights regarding the pre-evasion attack signature prior to the adversarial perturbation, thereby enriching the security analysis of the features targeted during evasion attempts. The prototype system we present, called Maverick, has a very low prediction latency, making it 85-563x faster than the current state-of-the-art while maintaining identical detection accuracy. Finally, Maverick predicts the pre-evasion attack signatures of the evasion samples with an accuracy of more than 93% and has an average prediction time well below the message transmission rate for CAN 2.0 and CAN FD, thereby satisfying the criteria for an evasion-hardened & real-time automotive IDS.

Place, publisher, year, edition, pages
IEEE, 2025
Series
IEEE Vehicular Networking Conference, ISSN 2157-9857, E-ISSN 2157-9865
Keywords
Tree Ensembles, Autoencoders, Intrusion Detection Systems, Real-time Systems, Safety, Security, Controller Area Networks, Adversarial Examples
National Category
Computer Systems
Identifiers
urn:nbn:se:liu:diva-216350 (URN)10.1109/VNC64509.2025.11054177 (DOI)001540461700039 ()2-s2.0-105010777746 (Scopus ID)9798331524371 (ISBN)9798331524388 (ISBN)
Conference
2025 IEEE Vehicular Networking Conference (VNC), Porto, Portugal, JUN 02-04, 2025
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Note

Funding Agencies|Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Available from: 2025-08-14 Created: 2025-08-14 Last updated: 2025-11-13
Colaco, V. & Nadjm-Tehrani, S. (2024). Fast Evasion Detection & Alert Management in Tree-Ensemble-Based Intrusion Detection Systems. In: 2024 IEEE 36TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, ICTAI: . Paper presented at 2024 IEEE 36th International Conference on Tools with Artificial Intelligence (ICTAI), Herndon, VA, OCT 28-30, 2024 (pp. 404-412). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Fast Evasion Detection & Alert Management in Tree-Ensemble-Based Intrusion Detection Systems
2024 (English)In: 2024 IEEE 36TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, ICTAI, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 404-412Conference paper, Published paper (Refereed)
Abstract [en]

Intrusion Detection Systems (IDSs) can help bolster cyber resilience in high-risk systems by promptly detecting anomalies and thwarting security threats which could have catastrophic consequences. While Machine Learning (ML) techniques like Tree Ensembles are well suited for tasks like detecting anomalies, the widespread adoption of these techniques in IDSs faces barriers due to the threat of evasion attacks. Moreover, ML-based IDSs are susceptible to producing a high rate of false positive alerts during detection, causing alert fatigue. To alleviate these problems, we present a method that uses counterexample regions to detect evasion attacks in tree-ensemble-based IDSs. We generate these counterexample regions by defining a modified mapping checker in VoTE, a fast & scalable formal verification tool specialized for tree ensembles. Our method also provides quaternary annotations, empowering security managers with nuanced insights to better handle alerts in the triage queue. Our approach does not require training a separate model and displays good detection performance (≥98 %) in both adversarial & non-adversarial scenarios in four real-world case studies when compared to several approaches in the literature. The prototype system we implement based on our method called Iceman has a very low prediction latency, making it 5-115x faster than the current state-of-the-art in evasion detection for tree ensembles. Finally, empirical evaluations show that Iceman can correctly re-annotate the samples in the presence of evasion attacks for alert management purposes with an accuracy of more than 98 % .

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
Proceedings-International Conference on Tools With Artificial Intelligence, ISSN 1082-3409, E-ISSN 2375-0197
Keywords
Evasion Attacks; Adversarial Defences; Intrusion Detection Systems; Tree Ensembles; Formal Methods
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:liu:diva-211768 (URN)10.1109/ICTAI62512.2024.00065 (DOI)001447778900056 ()2-s2.0-85217421895 (Scopus ID)9798331527242 (ISBN)9798331527235 (ISBN)
Conference
2024 IEEE 36th International Conference on Tools with Artificial Intelligence (ICTAI), Herndon, VA, OCT 28-30, 2024
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Note

Funding Agencies|Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Available from: 2025-02-20 Created: 2025-02-20 Last updated: 2025-11-13
Sivaraman, N., Nadjm-Tehrani, S. & Johansson, T. (2024). Formal Analysis of Julia Key Agreement Protocol. In: 26th International Conference, ICICS 2024, Proceedings, Part II: . Paper presented at 26th International Conference on Information and Communications Security, Mytilene, Greece, August 26–28, 2024. Springer Nature
Open this publication in new window or tab >>Formal Analysis of Julia Key Agreement Protocol
2024 (English)In: 26th International Conference, ICICS 2024, Proceedings, Part II, Springer Nature, 2024Conference paper, Published paper (Refereed)
Abstract [en]

The evolution of the fifth-generation network (5G) increases the demand and use of Internet of Things (IoT) devices extensively. The increased number of IoT devices increases the possibility of new attack surfaces, and thus even resource-constrained IoT devices need secure communication. In this work, we consider the Julia Key Agreement (JKA) protocol, which has been proposed as a secure and efficient protocol for communication among resource-constrained IoT devices. We formally model two variants of the JKA protocol and verify the intended security requirements, such as mutual authentication, forward secrecy, backward secrecy, and resilience to key impersonation attacks, using the Tamarin prover. Our formal analysis shows that the JKA protocol is susceptible to replay attacks under the Dolev-Yao threat model. We also expand the threat model by including several strong threat assumptions to discover interesting attack vectors.

Place, publisher, year, edition, pages
Springer Nature, 2024
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 15057
Keywords
Key Agreement protocol, IoT security, Formal verification, Tamarin
National Category
Communication Systems
Identifiers
urn:nbn:se:liu:diva-211016 (URN)10.1007/978-981-97-8801-9_9 (DOI)001531804300009 ()2-s2.0-85215327330 (Scopus ID)9789819788002 (ISBN)9789819788019 (ISBN)
Conference
26th International Conference on Information and Communications Security, Mytilene, Greece, August 26–28, 2024
Note

Funding Agencies|ELLIIT, Excellence Center at Linkoping-Lund on Information Technology; Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Available from: 2025-01-16 Created: 2025-01-16 Last updated: 2025-09-05
Colaco, V. & Nadjm-Tehrani, S. (2023). Formal Verification of Tree Ensembles against Real-World Composite Geometric Perturbations. In: Pedroza G., Huang X., Chen X.C., Theodorou A., Hernandez-Orallo J., Castillo-Effen M., Mallah R., McDermid J. (Ed.), Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023): . Paper presented at The AAAI-23 Workshop on Artificial Intelligence Safety (SafeAI 2023), Washington DC, USA, February 13-14, 2023. CEUR-WS, 3381, Article ID 38.
Open this publication in new window or tab >>Formal Verification of Tree Ensembles against Real-World Composite Geometric Perturbations
2023 (English)In: Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023) / [ed] Pedroza G., Huang X., Chen X.C., Theodorou A., Hernandez-Orallo J., Castillo-Effen M., Mallah R., McDermid J., CEUR-WS , 2023, Vol. 3381, article id 38Conference paper, Published paper (Refereed)
Abstract [en]

Since machine learning components are now being considered for integration in safety-critical systems, safety stakeholdersshould be able to provide convincing arguments that the systems are safe for use in realistic deployment settings. In the caseof vision-based systems, the use of tree ensembles calls for formal stability verification against a host of composite geometricperturbations that the system may encounter. Such perturbations are a combination of an affine transformation like rotation,scaling, or translation and a pixel-wise transformation like changes in lighting. However, existing verification approachesmostly target small norm-based perturbations, and do not account for composite geometric perturbations. In this work,we present a novel method to precisely define the desired stability regions for these types of perturbations. We propose afeature space modelling process that generates abstract intervals which can be passed to VoTE, an efficient formal verificationengine that is specialised for tree ensembles. Our method is implemented as an extension to VoTE by defining a new propertychecker. The applicability of the method is demonstrated by verifying classifier stability and computing metrics associatedwith stability and correctness, i.e., robustness, fragility, vulnerability, and breakage, in two case studies. In both case studies,targeted data augmentation pre-processing steps were applied for robust model training. Our results show that even modelstrained with augmented data are unable to handle these types of perturbations, thereby emphasising the need for certifiedrobust training for tree ensembles.

Place, publisher, year, edition, pages
CEUR-WS, 2023
Series
CEUR Workshop Proceedings, ISSN 1613-0073 ; 3381
Keywords
Machine Learning, Formal Verification, Tree Ensembles, Composite Perturbations, Geometric Perturbations, Random Forests, Gradient Boosting Machines, Semantic Perturbations, Stability, Robustness, Trustworthy AI, Trustworthy Computing
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-195996 (URN)2-s2.0-85159287306 (Scopus ID)
Conference
The AAAI-23 Workshop on Artificial Intelligence Safety (SafeAI 2023), Washington DC, USA, February 13-14, 2023
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2023-06-30 Created: 2023-06-30 Last updated: 2025-11-13Bibliographically approved
Eckhart, M., Ekelhart, A., Allison, D., Almgren, M., Ceesay-Seitz, K., Janicke, H., . . . Yampolskiy, M. (2023). Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. IEEE Security and Privacy, 21(6), 64-75
Open this publication in new window or tab >>Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives
Show others...
2023 (English)In: IEEE Security and Privacy, ISSN 1540-7993, E-ISSN 1558-4046, Vol. 21, no 6, p. 64-75Article in journal (Refereed) Published
Abstract [en]

The term "digital twin" (DT) has become a key theme of the cyber-physical systems (CPSs) area, while remaining vaguely defined as a virtual replica of an entity. This article identifies DT characteristics essential for enhancing CPS security and discusses indicators to evaluate them.

Place, publisher, year, edition, pages
IEEE COMPUTER SOC, 2023
Keywords
Security; Behavioral sciences; Emulation; Testing; Mathematical models; Network systems; Digital twins
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-195770 (URN)10.1109/MSEC.2023.3271225 (DOI)001005921400001 ()
Note

Funding Agencies|Federal Ministry for Climate Action, Environment, Energy, Mobility, Innovation and Technology (BMK); Federal Ministry for Labor and Economy (BMAW); federal state of Vienna; FFG via the BRIDGE 1 program [880609]; CDL-SQI; Christian Doppler Research Association; Austrian Federal Ministry for Digital and Economic Affairs; National Foundation for Research, Technology and Development; RICS Center on Resilient Information; Swedish Civil Contingencies Agency (MSB); U.S. Department of Commerce; National Institute of Standards and Technology [NIST-70NANB21H121, NIST-70NANB19H170]

Available from: 2023-06-27 Created: 2023-06-27 Last updated: 2024-10-10Bibliographically approved
Toczé, K., Fahs, A. J., Pierre, G. & Nadjm-Tehrani, S. (2023). VioLinn: Proximity-aware Edge Placement with Dynamic and Elastic Resource Provisioning. ACM TRANSACTIONS ON INTERNET OF THINGS, 4(1), Article ID 7.
Open this publication in new window or tab >>VioLinn: Proximity-aware Edge Placement with Dynamic and Elastic Resource Provisioning
2023 (English)In: ACM TRANSACTIONS ON INTERNET OF THINGS, E-ISSN 2577-6207, Vol. 4, no 1, article id 7Article in journal (Refereed) Published
Abstract [en]

Deciding where to handle services and tasks, as well as provisioning an adequate amount of computing resources for this handling, is a main challenge of edge computing systems. Moreover, latency-sensitive services constrain the type and location of edge devices that can provide the needed resources. When available resources are scarce there is a possibility that some resource allocation requests are denied. In this work, we propose the VioLinn system to tackle the joint problems of task placement, service placement, and edge device provisioning. Dealing with latency-sensitive services is achieved through proximityaware algorithms that ensure the tasks are handled close to the end-user. Moreover, the concept of spare edge device is introduced to handle sudden load variations in time and space without having to continuously over-provision. Several spare device selection algorithms are proposed with different cost/performance tradeoffs. Evaluations are performed both in a Kubernetes-based testbed and using simulations and show the benefit of using spare devices for handling localized load spikes with higher quality of service (QoS) and lower computing resource usage. The study of the different algorithms shows that it is possible to achieve this increase in QoS with different tradeoffs against cost and performance.

Place, publisher, year, edition, pages
ASSOC COMPUTING MACHINERY, 2023
Keywords
Edge/fog computing; resource management; Kubernetes; elasticity
National Category
Computer Systems
Identifiers
urn:nbn:se:liu:diva-193143 (URN)10.1145/3573125 (DOI)000949035400007 ()2-s2.0-85150308341 (Scopus ID)
Note

Funding Agencies|CUGS national graduate school; ELLIIT strategic research area; IRISA collaboration from Rennes Metropole

Available from: 2023-04-18 Created: 2023-04-18 Last updated: 2025-10-02Bibliographically approved
Saar de Moraes, R. & Nadjm-Tehrani, S. (2022). Concept Level Exploration of IMA-based Networked Platforms with Mixed Time-Sensitive Communication Requirements. In: 33rd Congress of the International Council of the Aeronautical Sciences, Stockholm, Sweden, 2022: . Paper presented at ICAS2022, Stockholm, Sweden, 4-9 September, 2022 (pp. 1700-1710). International Council of the Aeronautical Sciences
Open this publication in new window or tab >>Concept Level Exploration of IMA-based Networked Platforms with Mixed Time-Sensitive Communication Requirements
2022 (English)In: 33rd Congress of the International Council of the Aeronautical Sciences, Stockholm, Sweden, 2022, International Council of the Aeronautical Sciences , 2022, p. 1700-1710Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we apply a grammar-based approach to generate computation and communication platforms for avionic applications with mixed classes of time-sensitive communication messages. Then, we propose an evolutionary algorithm to schedule communication in the platform considering the interaction between timetriggered and bandwidth-constrained traffic. Together, the platform generation approach and the scheduling algorithm support the exploration of avionic systems at the concept level.

Place, publisher, year, edition, pages
International Council of the Aeronautical Sciences, 2022
Series
ICAS proceedings, ISSN 2958-4647 
Keywords
platform architecture exploration; time-sensitive networks; mixed-critical communication; communication scheduling; timeliness analysis
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-203165 (URN)2-s2.0-85159656333 (Scopus ID)9781713871163 (ISBN)
Conference
ICAS2022, Stockholm, Sweden, 4-9 September, 2022
Available from: 2024-04-30 Created: 2024-04-30 Last updated: 2025-01-31Bibliographically approved
Lin, C.-Y. & Nadjm-Tehrani, S. (2021). A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks. In: Abie, Habtamu; Ranise, Silvio; Verderame, Luca; Cambiaso, Enrico; Ugarelli, Rita; Giunta, Gabriele; Praça, Isabel; Battisti, Federica (Ed.), Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers. Paper presented at International Workshop on Cyber-Physical Security for Critical Infrastructures Protection (pp. 207-223). Springer
Open this publication in new window or tab >>A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks
2021 (English)In: Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers / [ed] Abie, Habtamu; Ranise, Silvio; Verderame, Luca; Cambiaso, Enrico; Ugarelli, Rita; Giunta, Gabriele; Praça, Isabel; Battisti, Federica, Springer, 2021, p. 207-223Conference paper, Published paper (Refereed)
Abstract [en]

Supervisory and Data Acquisition (SCADA) systems control and monitor modern power networks. As attacks targeting SCADA systems are increasing, significant research is conducted to defend SCADA networks including variations of anomaly detection. Due to the sensitivity of real data, many defence mechanisms have been tested only in small testbeds or emulated traffic that were designed with assumptions on how SCADA systems behave. This work provides a timing characterization of IEC-104 spontaneous traffic and compares the results from emulated traffic and real traffic to verify if the network characteristics appearing in testbeds and emulated traffic coincide with real traffic. Among three verified characteristics, two of them appear in the real dataset but in a less regular way, and one does not appear in the collected real data. The insights from these observations are discussed in terms of presumed differences between emulated and real traffic and how those differences are generated.

Place, publisher, year, edition, pages
Springer, 2021
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349
Keywords
SCADA, Traffic characterization, IEC-104, Timing analysis
National Category
Computer Engineering
Identifiers
urn:nbn:se:liu:diva-189696 (URN)10.1007/978-3-030-69781-5_14 (DOI)2-s2.0-85102736813 (Scopus ID)9783030697808 (ISBN)9783030697815 (ISBN)
Conference
International Workshop on Cyber-Physical Security for Critical Infrastructures Protection
Funder
Swedish Civil Contingencies Agency
Available from: 2022-11-03 Created: 2022-11-03 Last updated: 2024-08-27
Saar de Moraes, R., Bernardi, S. & Nadjm-Tehrani, S. (2021). A model-based approach for analysing network communication timeliness in IMA systems at concept level. In: Proceedings of the 29th International Conference on Real-Time Networks and Systems: . Paper presented at RTNS'2021: 29th International Conference on Real-Time Networks and Systems NANTES France April 7 - 9, 2021 (pp. 78-88). Association for Computing Machinery
Open this publication in new window or tab >>A model-based approach for analysing network communication timeliness in IMA systems at concept level
2021 (English)In: Proceedings of the 29th International Conference on Real-Time Networks and Systems, Association for Computing Machinery , 2021, p. 78-88Conference paper, Published paper (Refereed)
Abstract [en]

Analyzing the resource adequacy of complex cyber-physical systems at concept development stage can be a challenging task since there are a lot of uncertainties about the system at this stage. In Integrated Modular Avionics (IMA) systems, with a life-cycle over several decades and potential functionality changes, we need to estimate resource needs at the early stage but leave capacity to absorb future modifications. Given an envisaged set of functions and a mapping to a candidate platform, one needs to assure that the selected network configuration will provide adequate resources to meet communication timeliness. In particular, whether the set of switches, the topology, and the available bandwidth are sufficient to meet the envisaged needs. In this paper, timeliness requirements are expressed as constraints on the freshness of data and a strict bounding of end-to-end latency. We support generation of UML/MARTE-based specifications by creating a domain-specific meta-model for IMA systems and a resource modelling approach for the study of time-critical systems. The instances of this model then specify the application requirements and various network configurations that can be formally analyzed. We present a tool, M2NC, for automatic derivation of a network calculus model through model transformation, and use the state-of-art NC tools for deriving the bounds for end-to-end timeliness. The approach is illustrated on an example avionics case study, consisting of 91 computational processes that exchange 629 different types of messages. The results of the analysis show that our approach can efficiently provide feedback on configurations that are compliant with the requirements imposed by the application and the toolchain provides a systematic mechanism to quickly identify potential future bottlenecks.

Place, publisher, year, edition, pages
Association for Computing Machinery, 2021
Series
RTNS ’21
Keywords
UML-MARTE, Real-Time Systems, Network Resource Adequacy, Model Verification, Concept Analysis
National Category
Computer Systems
Identifiers
urn:nbn:se:liu:diva-203160 (URN)10.1145/3453417.3453427 (DOI)000933139900008 ()9781450390019 (ISBN)
Conference
RTNS'2021: 29th International Conference on Real-Time Networks and Systems NANTES France April 7 - 9, 2021
Note

Funding: This work was supported by the Swedish Governmental Agency for Innovation Systems- Vinnova, as part of the national projects on aeronautics, NFFP7, project CLASSICS (NFFP7 2017-04890). Simona Bernardi was partially supported by the project Medrese (RTI2018098543-B-I00) by the Spanish Ministry of Science, Innovation and Universities.

Available from: 2024-04-30 Created: 2024-04-30 Last updated: 2024-11-22
Toczé, K. & Nadjm-Tehrani, S. (2021). Corrigendum to “A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing” (vol 2018, 7476201, 2018). Wireless Communications & Mobile Computing, 2021, Article ID 9876126.
Open this publication in new window or tab >>Corrigendum to “A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing” (vol 2018, 7476201, 2018)
2021 (English)In: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2021, article id 9876126Article in journal (Other academic) Published
Abstract [en]

n/a

Place, publisher, year, edition, pages
Wiley Hindawi, 2021
National Category
Communication Systems
Identifiers
urn:nbn:se:liu:diva-184115 (URN)10.1155/2021/9876126 (DOI)000770932000008 ()
Available from: 2022-04-11 Created: 2022-04-11 Last updated: 2022-06-20
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-1485-0802

Search in DiVA

Show all publications