researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
Filter by Tag
[+]
OR
AND
NOT
1
Meta-Environment
access control
access control policies
analysis
architecture
classification
compiler
context-aware
data-flow
database
empirical
information models
language modeling
mobile
modeling
role-based access control
rule-based
security
social
systematic-approach
Filter by Author
[+]
OR
AND
NOT
1
Adam Doupé
Alexander Pretschner
Anna Cinzia Squicciarini
Anoop Singhal
Bhavani M. Thuraisingham
Danfeng (Daphne) Yao
Elisa Bertino
Gabriel Ghinita
Gail-Joon Ahn
Hongxin Hu
Maanak Gupta
Murat Kantarcioglu
Philip W. L. Fong
Rakesh M. Verma
Ram Krishnan
Ravi S. Sandhu
Shamik Sural
V. N. Venkatakrishnan
Vivek Balachandran
William Enck
Filter by Top terms
[+]
OR
AND
NOT
1
access
acm
analysis
android
application
applications
attacks
control
data
detection
learning
network
preserving
privacy
proceedings
secure
security
systems
usa
using
CODASPY (codaspy)
Editions
Publications
Viewing Publication 1 - 100 from 862
2025
IoTDSCreator: A Framework to Create Labeled Datasets for IoT Intrusion Detection Systems
Hyunwoo Lee 0001
,
Charalampos Katsis
,
Alireza Lotfi
,
Taejun Choi
,
Soeun Kim
,
Ashish Kundu
,
Elisa Bertino
.
codaspy 2024
:
413-418
[doi]
Sherlock: A Dataset for Process-aware Intrusion Detection Research on Power Grid Networks: Dataset Paper
Eric Wagner 0003
,
Lennart Bader
,
Konrad Wolsing
,
Martin Serror
.
codaspy 2024
:
419-424
[doi]
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, IWSPA 2025, Pittsburgh, PA, USA, 6 June 2025
ACM,
2025.
[doi]
CodeX: Contextual Flow Tracking for Browser Extensions
Mohammad M. Ahmadpanah
,
Matías F. Gobbi
,
Daniel Hedin
,
Johannes Kinder
,
Andrei Sabelfeld
.
codaspy 2024
:
6-17
[doi]
Proof of Compliance (PoC): A Consensus Mechanism to Verify the Compliance with Informed Consent Policy in Healthcare
Md. Al-Amin
,
Hemanth Tummala
,
Rushabh Shah
,
Indrajit Ray
.
codaspy 2024
:
119-130
[doi]
CryptMove: Moving Stealthily through Legitimate and Encrypted Communication Channels
Md Rabbi Alam
,
Jinpeng Wei
,
Qingyang Wang
.
codaspy 2024
:
359-370
[doi]
SolRPDS: A Dataset for Analyzing Rug Pulls in Solana Decentralized Finance
Abdulrahman Alhaidari
,
Bhavani Kalal
,
Balaji Palanisamy
,
Shamik Sural
.
codaspy 2024
:
293-298
[doi]
Protecting DeFi Platforms against Non-Price Flash Loan Attacks
Abdulrahman Alhaidari
,
Balaji Palanisamy
,
Prashant Krishnamurthy
.
codaspy 2024
:
281-292
[doi]
Coding Malware in Fancy Programming Languages for Fun and Profit
Theodoros Apostolopoulos
,
Vasilios Koutsokostas
,
Nikolaos Totosis
,
Constantinos Patsakis
,
Georgios Smaragdakis
.
codaspy 2024
:
18-29
[doi]
Exploiting HDMI and USB Ports for GPU Side-Channel Insights
Sayed Erfan Arefin
,
Abdul Serwadda
.
codaspy 2024
:
131-142
[doi]
A Framework for Cryptographic Verifiability of End-to-End AI Pipelines
Kar Balan
,
Robert Learney
,
Tim Wood 0003
.
codaspy 2025
:
49-59
[doi]
Privacy Risks and Protections in 2021 Texas State Abortion Data
Varoon Bashyakarla
,
Prem Radhakrishnan
,
Katelynn Hernandez
,
Alex Hlavka
.
codaspy 2025
:
73-78
[doi]
A Dataset for Evaluating LLMs Vulnerability Repair Performance in Android Applications: Data/Toolset paper
Elisa Braconaro
,
Eleonora Losiouk
.
codaspy 2024
:
353-358
[doi]
Espresso: Robust Concept Filtering in Text-to-Image Models
Anudeep Das
,
Vasisht Duddu
,
Rui Zhang
,
N. Asokan
.
codaspy 2024
:
305-316
[doi]
Enhancing Relationship-Based Access Control Policies with Negative Rule Mining
Ferhat Demirkiran
,
Amir Masoumzadeh 0001
.
codaspy 2024
:
96-106
[doi]
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations
Vasisht Duddu
,
Lachlan J. Gunn
,
N. Asokan
.
codaspy 2024
:
317-328
[doi]
Privacy - From the Ivory Tower to the Trenches in the Parliament
Orr Dunkelman
.
codaspy 2024
:
1-4
[doi]
Defining Security Limits in Biometrics
Axel Durbet
,
Paul-Marie Grollemund
,
Pascal Lafourcade 0001
,
Kevin Thiry-Atighehchi
.
codaspy 2024
:
155-166
[doi]
Analyzing Security & Privacy (S&P) Labels For AI Integrated Social Robots: A Novel User Assessment Based Research Study
Ezra Faith
,
Ankur Chattopadhyay
,
Mohammad Q. Azhar
.
codaspy 2025
:
62-72
[doi]
Trilobyte: Plausibly Deniable Communications Through Single Player Games: Data/Toolset Paper
Yuzhou Feng
,
Sandeep Kiran Pinjala
,
Radu Sion
,
Bogdan Carbunar
.
codaspy 2024
:
395-400
[doi]
Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence
Shuya Feng
,
Meisam Mohammady
,
Hanbin Hong
,
Shenao Yan
,
Ashish Kundu
,
Binghui Wang
,
Yuan Hong 0001
.
codaspy 2024
:
60-71
[doi]
Probabilistic Data Structures in the Wild: A Security Analysis of Redis
Mia Filic
,
Jonas Hofmann
,
Sam A. Markelon
,
Kenneth G. Paterson
,
Anupama Unnikrishnan
.
codaspy 2024
:
167-178
[doi]
Blind Brother: Attribute-Based Selective Video Encryption
Eugene Frimpong
,
Bin Liu
,
Camille Nuoskala
,
Antonis Michalas
.
codaspy 2024
:
371-382
[doi]
Citar: Cyberthreat Intelligence-driven Attack Reconstruction
Sutanu Kumar Ghosh
,
Rigel Gjomemo
,
V. N. Venkatakrishnan
.
codaspy 2024
:
245-256
[doi]
Private Eyes: Zero-Leakage Iris Searchable Encryption
Julie Ha
,
Chloé Cachet
,
Luke Demarest
,
Sohaib Ahmad
,
Benjamin Fuller 0001
.
codaspy 2024
:
383-394
[doi]
VulPatrol: Interprocedural Vulnerability Detection and Localization through Semantic Graph Learning
Asmaa Hailane
,
Paria Shirani
,
Guy-Vincent Jourdan
.
codaspy 2024
:
401-412
[doi]
Using Venom to Flip the Coin and Peel the Onion: Measurement Tool and Dataset for Studying the Bitcoin - Dark Web Synergy: Data/Toolset Paper
Lukas Ingmarsson
,
Karl Duckert Karlsson
,
Niklas Carlsson
.
codaspy 2024
:
299-304
[doi]
Poisoning Attacks against Quantile L1 Regression in CPS Anomaly Detection Frameworks
Mohammad Jaminur Islam
,
Richard T. Meyer
,
Shameek Bhattacharjee
.
codaspy 2025
:
38-48
[doi]
To the Best of Knowledge and Belief: On Eventually Consistent Access Control
Florian Jacob
,
Hannes Hartenstein
.
codaspy 2024
:
107-118
[doi]
PromptShield: Deployable Detection for Prompt Injection Attacks
Dennis Jacob
,
Hend Alzahrani
,
Zhanhao Hu
,
Basel Alomair
,
David A. Wagner 0001
.
codaspy 2024
:
341-352
[doi]
Differentially Private Iterative Screening Rules for Linear Regression
Amol Khanna
,
Fred Lu
,
Edward Raff
.
codaspy 2024
:
72-83
[doi]
Secure and Efficient Video Inferences with Compressed 3-Dimensional Deep Neural Networks
Bingyu Liu
,
Ali Arastehfard
,
Rujia Wang
,
Weiran Liu
,
Zhongjie Ba
,
Shanglin Zhou
,
Yuan Hong 0001
.
codaspy 2024
:
185-196
[doi]
Exploring Prompt Patterns for Effective Vulnerability Repair in Real-World Code by Large Language Models
Yining Luo
,
Baobao Li
,
Anoop Singhal
,
Peiyu Tseng
,
Lan Zhang
,
Qingtian Zou
,
Xiaoyan Sun
,
Peng Liu
.
codaspy 2025
:
23-33
[doi]
Sparse Moving Averages for Lifelong Open-Ended Probabilistic Prediction
Omid Madani
.
codaspy 2025
:
60-61
[doi]
Generative AI vs. Human Deception: A Comparative Analysis of ChatGPT, Gemini, and Human-Generated Disinformation
Christopher Mason
,
Ahmed AlEroud
,
Abdullah Melhem
,
Zain A. Halloush
,
Jason A. Williams
.
codaspy 2025
:
13-22
[doi]
Spend Your Budget Wisely: Towards an Intelligent Distribution of the Privacy Budget in Differentially Private Text Rewriting
Stephen Meisenbacher
,
Chaeeun Joy Lee
,
Florian Matthes
.
codaspy 2024
:
84-95
[doi]
How Feasible is Augmenting Fake Nodes with Learnable Features as a Counter-strategy against Link Stealing Attacks?
Mir Imtiaz Mostafiz
,
Imtiaz Karim
,
Elisa Bertino
.
codaspy 2024
:
233-244
[doi]
Evaluating Website Data Leaks through Spam Collection on Honeypots
Oghenerukevwe Elohor Oyinloye
,
Carol Fung
.
codaspy 2024
:
42-53
[doi]
Secure and attack-resilient Release of Timed Information using Blockchains
Balaji Palanisamy
.
codaspy 2025
:
36-37
[doi]
Enhanced Threat Modeling and Attack Scenario Generation for OAuth 2.0 Implementations: Data/Toolset paper
Pieter Philippaerts
,
Stef Verreydt
,
Wouter Joosen
.
codaspy 2024
:
54-59
[doi]
The Ephemeral Threat: Assessing the Security of Algorithmic Trading Systems powered by Deep Learning
Advije Rizvani
,
Giovanni Apruzzese
,
Pavel Laskov
.
codaspy 2024
:
329-340
[doi]
SmishViz: Towards A Graph-based Visualization System for Monitoring and Characterizing Ongoing Smishing Threats
Seyed Mohammad Sanjari
,
Ashfak Md Shibli
,
Maraz Mia
,
Maanak Gupta
,
Mir Mehedi Ahsan Pritom
.
codaspy 2024
:
257-268
[doi]
Why You've Got Mail: Evaluating Inbox Privacy Implications of Email Marketing Practices in Online Apps and Services
Scott Seidenberger
,
Oluwasijibomi Ajisegiri
,
Noah Pursell
,
Fazil Raja
,
Anindya Maiti
.
codaspy 2024
:
221-232
[doi]
Enhancing Security Insights with KnowGen-RAG: Combining Knowledge Graphs, LLMs, and Multimodal Interpretability
Arnav Nishith Sharma
,
Khandakar Ashrafi Akbar
,
Bhavani Thuraisingham
,
Latifur Khan
.
codaspy 2025
:
2-12
[doi]
Padding Matters - Exploring Function Detection in PE Files: Data/Toolset paper
Raphael Springer
,
Alexander Schmitz
,
Artur Leinweber
,
Tobias Urban
,
Christian Dietrich 0005
.
codaspy 2024
:
179-184
[doi]
Covert Social Influence Operations: Past, Present, and Future
V. S. Subrahmanian
.
codaspy 2024
:
5
[doi]
Buffalo: A Practical Secure Aggregation Protocol for Buffered Asynchronous Federated Learning
Riccardo Taiello
,
Clémentine Gritti
,
Melek Önen
,
Marco Lorenzi
.
codaspy 2024
:
197-208
[doi]
SemFinder: A Semantics-Based Approach to Enhance Vulnerability Analysis in Web Applications
Neil P. Thimmaiah
,
Rigel Gjomemo
,
V. N. Venkatakrishnan
.
codaspy 2024
:
30-41
[doi]
TerrARA: Automated Security Threat Modeling for Infrastructure as Code
Anh Duy Tran
,
Laurens Sion
,
Koen Yskout
,
Wouter Joosen
.
codaspy 2024
:
269-280
[doi]
LLMs Under Attack: Understanding the Adversarial Mindset
Bryan E. Tuck
.
codaspy 2025
:
34-35
[doi]
Real-time Analytics for APT Detection and Threat Hunting Using Cyber-threat Intelligence and Provenance Graphs
V. N. Venkatakrishnan
.
codaspy 2025
:
1
[doi]
Multi-Device Context-Sensitive Attacks Against Privacy
Edgardo Alberto Barsallo Yi
,
Joshua David Oetting Majors
,
Aditya Vardhan Padala
,
Darren Wu
,
Aravind Machiry
,
Saurabh Bagchi
.
codaspy 2024
:
209-220
[doi]
VS-TEE: A Framework for Virtualizing TEEs in ARM Cloud Contexts
Matteo Zoia
,
Marco Cutecchia
,
Davide Rusconi
,
Andrea Monzani
,
Mirco Picca
,
Danilo Bruschi
,
Andrea Lanzi
.
codaspy 2024
:
143-154
[doi]
2024
Re-pseudonymization Strategies for Smart Meter Data Are Not Robust to Deep Learning Profiling Attacks
Ana-Maria Cretu 0002
,
Miruna Rusu
,
Yves-Alexandre de Montjoye
.
codaspy 2024
:
295-306
[doi]
Guarding the Wi-Fi 4-Way Handshake against Channel-based MiTM: A Case Study on KRACK Attack
Anand Agrawal
,
Rajib Ranjan Maiti
.
codaspy 2024
:
147-149
[doi]
Review of Existing Methods for Generating and Detecting Fake and Partially Fake Audio
Abdulazeez AlAli
,
George Theodorakopoulos 0001
.
codaspy 2024
:
35-36
[doi]
Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of Signal
Mashari Alatawi
,
Nitesh Saxena
.
codaspy 2024
:
277-288
[doi]
Crypto'Graph: Leveraging Privacy-Preserving Distributed Link Prediction for Robust Graph Learning
Sofiane Azogagh
,
Zelma Aubin Birba
,
Sébastien Gambs
,
Marc-Olivier Killijian
.
codaspy 2024
:
199-210
[doi]
Malware Research: History, Milestones, and Open Questions
Davide Balzarotti
.
codaspy 2024
:
5-6
[doi]
Automated Generation and Update of Structured ABAC Policies
Anna Bamberger
,
Maribel Fernández
.
codaspy 2024
:
31-40
[doi]
Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" Deployments
Luke A. Bauer
,
James K. Howes IV
,
Sam A. Markelon
,
Vincent Bindschaedler
,
Thomas Shrimpton
.
codaspy 2024
:
67-78
[doi]
Privacy Preserving Biometric Authentication for Fingerprints and Beyond
Marina Blanton
,
Dennis Murphy
.
codaspy 2024
:
367-378
[doi]
IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operational Phase Using Payload Fuzzing
Priyanka Rushikesh Chaudhary
,
N. Pranav Krishna
,
Rajib Ranjan Maiti
.
codaspy 2024
:
171-173
[doi]
Environment Aware Deep Learning Based Access Control Model
Pankaj Chhetri
,
Smriti Bhatt
,
Paras Bhatt
,
Mohammad Nur Nobi
,
James O. Benson
,
Ram Krishnan
.
codaspy 2024
:
81-89
[doi]
Exploring the Impact of Increased Health Information Accessibility in Cyberspace on Trust and Self-care Practices
Ommo Clark
,
Tera L. Reynolds
,
Emmanuel C. Ugwuabonyi
,
Karuna P. Joshi
.
codaspy 2024
:
61-70
[doi]
Privkit: A Toolkit of Privacy-Preserving Mechanisms for Heterogeneous Data Types
Mariana Cunha
,
Guilherme Duarte
,
Ricardo Andrade
,
Ricardo Mendes
,
João P. Vilela
.
codaspy 2024
:
319-324
[doi]
Privacy-Enhancing Technologies for AI Systems: A Tutorial
Liv Galliker d'Aliberti
,
Evan Gronberg
,
Joseph Kovba
.
codaspy 2024
:
69-70
[doi]
Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files
Aleksandr Dolgavin
,
Mark Yampolskiy
,
Moti Yung
.
codaspy 2024
:
211-220
[doi]
Coherent Multi-Table Data Synthesis for Tabular and Time-Series Data with GANs
Clément Elliker
,
Emeric Tonnelier
,
Aymen Shabou
.
codaspy 2024
:
245-252
[doi]
Process-Aware Intrusion Detection in MQTT Networks
Philip Empl
,
Fabian Böhm
,
Günther Pernul
.
codaspy 2024
:
91-102
[doi]
Machine Learning Techniques for Python Source Code Vulnerability Detection
Talaya Farasat
,
Joachim Posegga
.
codaspy 2024
:
151-153
[doi]
SAFEHIVE: Secure Attestation Framework for Embedded and Heterogeneous IoT Devices in Variable Environments
Lorenzo Ferro
,
Enrico Bravi
,
Silvia Sisinni
,
Antonio Lioy
.
codaspy 2024
:
41-50
[doi]
Legally Binding but Unfair? Towards Assessing Fairness of Privacy Policies
Vincent Freiberger
,
Erik Buchmann
.
codaspy 2024
:
15-22
[doi]
Exploiting Update Leakage in Searchable Symmetric Encryption
Jacob Haltiwanger
,
Thang Hoang
.
codaspy 2024
:
115-126
[doi]
CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs
Kedrian James
,
Kevin Valakuzhy
,
Kevin Z. Snow
,
Fabian Monrose
.
codaspy 2024
:
337-347
[doi]
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2025, Pittsburgh, PA, USA, June 4-6, 2025
James Joshi
,
Jaideep Vaidya
,
Haya Schulmann
, editors,
ACM,
2024.
[doi]
CoCoT: Collaborative Contact Tracing
Trevor Kann
,
Lujo Bauer
,
Robert K. Cunningham
.
codaspy 2024
:
175-186
[doi]
Estimating the Runtime and Global Network Traffic of SMPC Protocols
Andreas Klinger
,
Vincent Ehrmanntraut
,
Ulrike Meyer
.
codaspy 2024
:
7-18
[doi]
SLIM-View: Sampling and Private Publishing of Multidimensional Databases
Ala Eddine Laouir
,
Abdessamad Imine
.
codaspy 2024
:
391-402
[doi]
FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices
Jinghui Liao
,
Niusen Chen
,
Lichen Xia
,
Bo Chen 0028
,
Weisong Shi
.
codaspy 2024
:
265-276
[doi]
A-COPILOT: Android Covert Operation for Private Information Lifting and OTP Theft: A study on how Malware Masquerading as Legitimate Applications compromise Security and Privacy
Joseph Guan Quan Lim
,
Zhen Yu Kwok
,
Isaac Soon
,
Jun Xian Yong
,
Samuel Song Yuhao
,
Siti Halilah Binte Rosley
,
Vivek Balachandran
.
codaspy 2024
:
155-157
[doi]
WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing Website Detection: Data/Toolset Paper
Gabriel Loiseau
,
Valentin Lefils
,
Maxime Meyer
,
Damien Riquet
.
codaspy 2024
:
361-366
[doi]
Synthetic Data Digital Twins and Data Trusts Control for Privacy in Health Data Sharing
Richard K. Lomotey
,
Sandra Kumi
,
Madhurima Ray
,
Ralph Deters
.
codaspy 2024
:
1-10
[doi]
A Unified Time Series Analytics based Intrusion Detection Framework for CAN BUS Attacks
Maisha Maliha
,
Shameek Bhattacharjee
.
codaspy 2024
:
19-30
[doi]
1-Diffractor: Efficient and Utility-Preserving Text Obfuscation Leveraging Word-Level Metric Differential Privacy
Stephen Meisenbacher
,
Maulik Chevli
,
Florian Matthes
.
codaspy 2024
:
23-33
[doi]
Machine Learning Training on Encrypted Data with TFHE
Luis Montero
,
Jordan Fréry
,
Celia Kherfallah
,
Roman Bredehoft
,
Andrei Stoian
.
codaspy 2024
:
71-76
[doi]
The Avg-Act Swap and Plaintext Overflow Detection in Fully Homomorphic Operations Over Deep Circuits
Ihyun Nam
.
codaspy 2024
:
127-138
[doi]
The Encryption Debate: An Enduring Struggle
Bart Preneel
.
codaspy 2024
:
1-3
[doi]
Transformer-based Language Models and Homomorphic Encryption: An Intersection with BERT-tiny
Lorenzo Rovida
,
Alberto Leporati
.
codaspy 2024
:
3-13
[doi]
Communicate Less, Learn More: A Locally Differential Private Approach for Counting Triangles with Better Accuracy
Sasi Bhushan V. Saladi
,
Nagesh Bhattu Sristy
.
codaspy 2024
:
159-161
[doi]
TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis
Kiavash Satvat
,
Rigel Gjomemo
,
V. N. Venkatakrishnan
.
codaspy 2024
:
349-360
[doi]
Modeling and Security Analysis of Attacks on Machine Learning Systems
Anoop Singhal
.
codaspy 2024
:
1-2
[doi]
NVM-Flip: Non-Volatile-Memory BitFlips on the System Level
Felix Staudigl
,
Jan Philipp Thoma
,
Christian Niesler
,
Karl J. X. Sturm
,
Rebecca Pelke
,
Dominik Germek
,
Jan Moritz Joseph
,
Tim Güneysu
,
Lucas Davi
,
Rainer Leupers
.
codaspy 2024
:
11-20
[doi]
Investigating TLS Version Downgrade in Enterprise Software
Ka Fun Tang
,
Ka Lok Wu
,
Sze Yiu Chau
.
codaspy 2024
:
31-42
[doi]
Smishing Dataset I: Phishing SMS Dataset from Smishtank.com
Daniel Timko
,
Muhammad Lutfor Rahman
.
codaspy 2024
:
289-294
[doi]
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2024, Porto, Portugal, June 19-21, 2024
João P. Vilela
,
Haya Schulmann
,
Ninghui Li
, editors,
ACM,
2024.
[doi]
From Theory to Comprehension: A Comparative Study of Differential Privacy and k-Anonymity
Saskia Nuñez von Voigt
,
Luise Mehner
,
Florian Tschorsch
.
codaspy 2024
:
221-232
[doi]
HETCOM: Heterogeneous Container Migration Based on TEE- or TPM-established Trust
Felix Wruck
,
Maximilian Peisl
,
Christian Epple
,
Michael Weiß
.
codaspy 2024
:
51-60
[doi]
A Simple Mobile Plausibly Deniable System Using Image Steganography and Secure Hardware
Lichen Xia
,
Jinghui Liao
,
Niusen Chen
,
Bo Chen 0028
,
Weisong Shi
.
codaspy 2024
:
21-29
[doi]
Mining Domain-Based Policies
Si Zhang
,
Philip W. L. Fong
.
codaspy 2024
:
403-414
[doi]
Sign in
or
sign up
to see more results.