kth.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (10 of 22) Show all publications
Hammar, K., Li, T., Stadler, R. & Zhu, Q. (2025). Adaptive Security Response Strategies Through Conjectural Online Learning. IEEE Transactions on Information Forensics and Security, 20, 4055-4070
Open this publication in new window or tab >>Adaptive Security Response Strategies Through Conjectural Online Learning
2025 (English)In: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 20, p. 4055-4070Article in journal (Refereed) Published
Abstract [en]

We study the problem of learning adaptive security response strategies for an IT infrastructure. We formulate the interaction between an attacker and a defender as a partially observed, non-stationary game. We relax the standard assumption that the game model is correctly specified and consider that each player has a probabilistic conjecture about the model, which may be misspecified in the sense that the true model has probability 0. This formulation allows us to capture uncertainty and misconception about the infrastructure and the intents of the players. To learn effective game strategies online, we design Conjectural Online Learning (COL), a novel method where a player iteratively adapts its conjecture using Bayesian learning and updates its strategy through rollout. We prove that the conjectures converge to best fits, and we provide a bound on the performance improvement that rollout enables with a conjectured model. To characterize the steady state of the game, we propose a variant of the Berk-Nash equilibrium. We present COL through an intrusion response use case. Testbed evaluations show that COL produces effective security strategies that adapt to a changing environment. We also find that COL enables faster convergence than current reinforcement learning techniques.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Bayesian learning, Berk-Nash equilibrium, Cybersecurity, game theory, network security, rollout
National Category
Computer Sciences Probability Theory and Statistics
Identifiers
urn:nbn:se:kth:diva-363203 (URN)10.1109/TIFS.2025.3558600 (DOI)001473091500004 ()2-s2.0-105003490797 (Scopus ID)
Note

QC 20250609

Available from: 2025-05-07 Created: 2025-05-07 Last updated: 2025-06-09Bibliographically approved
Hammar, K. & Stadler, R. (2025). Intrusion Tolerance as a Two-Level Game. In: Decision and Game Theory for Security - 15th International Conference, GameSec 2024, Proceedings: . Paper presented at 15th International Conference on Decision and Game Theory for Security, GameSec 2024, October 16-18, 2024, New York, United States of America (pp. 3-23). Springer Nature
Open this publication in new window or tab >>Intrusion Tolerance as a Two-Level Game
2025 (English)In: Decision and Game Theory for Security - 15th International Conference, GameSec 2024, Proceedings, Springer Nature , 2025, p. 3-23Conference paper, Published paper (Refereed)
Abstract [en]

We formulate intrusion tolerance for a system with service replicas as a two-level game: a local game models intrusion recovery and a global game models replication control. For both games, we prove the existence of equilibria and show that the best responses have a threshold structure, which enables efficient computation of strategies. State-of-the-art intrusion-tolerant systems can be understood as instantiations of our game with heuristic control strategies. Our analysis shows the conditions under which such heuristics can be significantly improved through game-theoretic reasoning. This reasoning allows us to derive the optimal control strategies and evaluate them against 10 types of network intrusions on a testbed. The testbed results demonstrate that our game-theoretic strategies can significantly improve service availability and reduce the operational cost of state-of-the-art intrusion-tolerant systems. In addition, our game strategies can ensure any chosen level of service availability and time-to-recovery, bridging the gap between theoretical and operational performance.

Place, publisher, year, edition, pages
Springer Nature, 2025
Keywords
bft, Cybersecurity, game theory, intrusion tolerance, network security, optimal control, reliability theory
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-355925 (URN)10.1007/978-3-031-74835-6_1 (DOI)001416979800001 ()2-s2.0-85207655805 (Scopus ID)
Conference
15th International Conference on Decision and Game Theory for Security, GameSec 2024, October 16-18, 2024, New York, United States of America
Note

Part of ISBN 9783031748349

QC 20241106

Available from: 2024-11-06 Created: 2024-11-06 Last updated: 2025-03-17Bibliographically approved
Li, T., Hammar, K., Stadler, R. & Zhu, Q. (2024). Conjectural Online Learning with First-order Beliefs in Asymmetric Information Stochastic Games. In: 2024 IEEE 63rd Conference on Decision and Control, CDC 2024: . Paper presented at 63rd IEEE Conference on Decision and Control, CDC 2024, Milan, Italy, December 16-19, 2024 (pp. 6780-6785). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Conjectural Online Learning with First-order Beliefs in Asymmetric Information Stochastic Games
2024 (English)In: 2024 IEEE 63rd Conference on Decision and Control, CDC 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 6780-6785Conference paper, Published paper (Refereed)
Abstract [en]

Asymmetric information stochastic games (AISGs) arise in many complex socio-technical systems, such as cyberphysical systems and IT infrastructures. Existing computational methods for AISGs are primarily offline and can not adapt to equilibrium deviations. Further, current methods are limited to particular information structures to avoid belief hierarchies. Considering these limitations, we propose conjectural online learning (COL), an online learning method under generic information structures in AISGs. COL uses a forecaster-actorcritic (FAC) architecture, where subjective forecasts are used to conjecture the opponents' strategies within a lookahead horizon, and Bayesian learning is used to calibrate the conjectures. To adapt strategies to nonstationary environments based on information feedback, COL uses online rollout with cost function approximation (actor-critic). We prove that the conjectures produced by COL are asymptotically consistent with the information feedback in the sense of a relaxed Bayesian consistency. We also prove that the empirical strategy profile induced by COL converges to the Berk-Nash equilibrium, a solution concept characterizing rationality under subjectivity. Experimental results from an intrusion response use case demonstrate COL's faster convergence over state-of-the-art reinforcement learning methods against nonstationary attacks.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-361743 (URN)10.1109/CDC56724.2024.10886479 (DOI)2-s2.0-86000618322 (Scopus ID)
Conference
63rd IEEE Conference on Decision and Control, CDC 2024, Milan, Italy, December 16-19, 2024
Note

Part of ISBN 9798350316339

QC 20250328

Available from: 2025-03-27 Created: 2025-03-27 Last updated: 2025-03-28Bibliographically approved
Hammar, K. & Stadler, R. (2024). Intrusion tolerance for networked systems through two-level feedback control. In: Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024: . Paper presented at 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024, June 24-27 2024, Brisbane, Australia (pp. 338-352). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Intrusion tolerance for networked systems through two-level feedback control
2024 (English)In: Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 338-352Conference paper, Published paper (Refereed)
Abstract [en]

We formulate intrusion tolerance for a system with service replicas as a two-level optimal control problem. On the local level node controllers perform intrusion recovery, and on the global level a system controller manages the replication factor. The local and global control problems can be formulated as classical problems in operations research, namely, the machine replacement problem and the inventory replenishment problem. Based on this formulation, we design TOLERANCE, a novel control architecture for intrusion-tolerant systems. We prove that the optimal control strategies on both levels have threshold structure and design efficient algorithms for computing them. We implement and evaluate TOLERANCE in an emulation environment where we run 10 types of network intrusions. The results show that TOLERANCE can improve service availability and reduce operational cost compared with state-of-the-art intrusion-tolerant systems.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
BFT, Byzantine fault tolerance, CMDP, intrusion recovery, Intrusion tolerance, MDP, optimal control, POMDP
National Category
Computer Engineering
Identifiers
urn:nbn:se:kth:diva-353946 (URN)10.1109/DSN58291.2024.00042 (DOI)001313667600025 ()2-s2.0-85203812073 (Scopus ID)
Conference
54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024, June 24-27 2024, Brisbane, Australia
Note

Part of ISBN: 979-8-3503-4105-8

QC 20241111

Available from: 2024-09-25 Created: 2024-09-25 Last updated: 2024-11-11Bibliographically approved
Hammar, K. & Stadler, R. (2024). Learning Near-Optimal Intrusion Responses Against Dynamic Attackers. IEEE Transactions on Network and Service Management, 21(1), 1158-1177
Open this publication in new window or tab >>Learning Near-Optimal Intrusion Responses Against Dynamic Attackers
2024 (English)In: IEEE Transactions on Network and Service Management, E-ISSN 1932-4537, Vol. 21, no 1, p. 1158-1177Article in journal (Refereed) Published
Abstract [en]

We study automated intrusion response and formulate the interaction between an attacker and a defender as an optimal stopping game where attack and defense strategies evolve through reinforcement learning and self-play. The game-theoretic modeling enables us to find defender strategies that are effective against a dynamic attacker, i.e., an attacker that adapts its strategy in response to the defender strategy. Further, the optimal stopping formulation allows us to prove that best response strategies have threshold properties. To obtain near-optimal defender strategies, we develop Threshold Fictitious Self-Play (T-FP), a fictitious self-play algorithm that learns Nash equilibria through stochastic approximation. We show that T-FP outperforms a state-of-the-art algorithm for our use case. The experimental part of this investigation includes two systems: a simulation system where defender strategies are incrementally learned and an emulation system where statistics are collected that drive simulation runs and where learned strategies are evaluated. We argue that this approach can produce effective defender strategies for a practical IT infrastructure.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Games, Security, Emulation, Reinforcement learning, Observability, Logic gates, History, Cybersecurity, network security, automated security, intrusion response, optimal stopping, Dynkin games, game theory, Markov decision process, MDP, POMDP
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-345922 (URN)10.1109/TNSM.2023.3293413 (DOI)001167106200022 ()2-s2.0-85164381105 (Scopus ID)
Note

QC 20240502

Available from: 2024-05-02 Created: 2024-05-02 Last updated: 2024-07-04Bibliographically approved
Shahabsamani, F., Hammar, K. & Stadler, R. (2024). Online Policy Adaptation for Networked Systems using Rollout. In: : . Paper presented at IEEE/IFIP Network Operations and Management Symposium 6–10 May 2024, Seoul, South Korea.
Open this publication in new window or tab >>Online Policy Adaptation for Networked Systems using Rollout
2024 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Dynamic resource allocation in networked systems is needed to continuously achieve end-to-end management objectives. Recent research has shown that reinforcement learning can achieve near-optimal resource allocation policies for realistic system configurations. However, most current solutions require expensive retraining when changes in the system occur. We address this problem and introduce an efficient method to adapt a given base policy to system changes, e.g., to a change in the service offering. In our approach, we adapt a base control policy using a rollout mechanism, which transforms the base policy into an improved rollout policy. We perform extensive evaluations on a testbed where we run applications on a service mesh based on the Istio and Kubernetes platforms. The experiments provide insights into the performance of different rollout algorithms. We find that our approach produces policies that are equally effective as those obtained by offline retraining. On our testbed, effective policy adaptation takes seconds when using rollout, compared to minutes or hours when using retraining. Our work demonstrates that rollout, which has been applied successfully in other domains, is an effective approach for policy adaptation in networked systems.

National Category
Engineering and Technology
Identifiers
urn:nbn:se:kth:diva-346582 (URN)
Conference
IEEE/IFIP Network Operations and Management Symposium 6–10 May 2024, Seoul, South Korea
Note

QC 20240522

Available from: 2024-05-18 Created: 2024-05-18 Last updated: 2024-06-10Bibliographically approved
Samani, F. S., Hammar, K. & Stadler, R. (2024). Online Policy Adaptation for Networked Systems using Rollout. In: Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024: . Paper presented at 2024 IEEE/IFIP Network Operations and Management Symposium, NOMS 2024, Seoul, Korea, May 6 2024 - May 10 2024. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Online Policy Adaptation for Networked Systems using Rollout
2024 (English)In: Proceedings of IEEE/IFIP Network Operations and Management Symposium 2024, NOMS 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024Conference paper, Published paper (Refereed)
Abstract [en]

Dynamic resource allocation in networked systems is needed to continuously achieve end-to-end management objectives. Recent research has shown that reinforcement learning can achieve near-optimal resource allocation policies for realistic system configurations. However, most current solutions require expensive retraining when changes in the system occur. We address this problem and introduce an efficient method to adapt a given base policy to system changes, e.g., to a change in the service offering. In our approach, we adapt a base control policy using a rollout mechanism, which transforms the base policy into an improved rollout policy. We perform extensive evaluations on a testbed where we run applications on a service mesh based on the Istio and Kubernetes platforms. The experiments provide insights into the performance of different rollout algorithms. We find that our approach produces policies that are equally effective as those obtained by offline retraining. On our testbed, effective policy adaptation takes seconds when using rollout, compared to minutes or hours when using retraining. Our work demonstrates that rollout, which has been applied successfully in other domains, is an effective approach for policy adaptation in networked systems.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Istio, Kubernetes, Performance management, policy adaptation, reinforcement learning, rollout, service mesh
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-351011 (URN)10.1109/NOMS59830.2024.10575707 (DOI)001270140300173 ()2-s2.0-85198340187 (Scopus ID)
Conference
2024 IEEE/IFIP Network Operations and Management Symposium, NOMS 2024, Seoul, Korea, May 6 2024 - May 10 2024
Note

Part of ISBN 9798350327939

QC 20240725

Available from: 2024-07-24 Created: 2024-07-24 Last updated: 2024-09-27Bibliographically approved
Hammar, K. (2024). Optimal Security Response to Network Intrusions in IT Systems. (Doctoral dissertation). Stockholm: Kungliga Tekniska högskolan
Open this publication in new window or tab >>Optimal Security Response to Network Intrusions in IT Systems
2024 (English)Doctoral thesis, monograph (Other academic)
Abstract [en]

Cybersecurity is one of the most pressing technological challenges of our time and requires measures from all sectors of society. A key measure is automated security response, which enables automated mitigation and recovery from cyber attacks. Significant strides toward such automation have been made due to the development of rule-based response systems. However, these systems have a critical drawback: they depend on domain experts to configure the rules, a process that is both error-prone and inefficient. Framing security response as an optimal control problem shows promise in addressing this limitation but introduces new challenges. Chief among them is bridging the gap between theoretical optimality and operational performance. Current response systems with theoretical optimality guarantees have only been validated analytically or in simulation, leaving their practical utility unproven.

This thesis tackles the aforementioned challenges by developing a practical methodology for optimal security response in IT infrastructures. It encompasses two systems. First, it includes an emulation system that replicates key components of the target infrastructure. We use this system to gather measurements and logs, based on which we identify a game-theoretic model. Second, it includes a simulation system where game-theoretic response strategies are optimized through stochastic approximation to meet a given objective, such as quickly mitigating potential attacks while maintaining operational services. These strategies are then evaluated and refined in the emulation system to close the gap between theoretical and operational performance.

We present CSLE, an open-source platform that implements our methodology. This platform allows us to experimentally validate the methodology on several instances of the security response problem, including intrusion prevention, intrusion response, intrusion tolerance, and defense against advanced persistent threats. We prove structural properties of optimal response strategies and derive efficient algorithms for computing them. This enables us to solve a previously unsolved problem: demonstrating optimal security response against network intrusions on an IT infrastructure.

Abstract [sv]

Cybersäkerhet är en av vår tids mest angelägna teknologiska utmaningar och kräver åtgärder från alla samhällssektorer. En nyckelåtgärd är automatiseringav säkerhetsrespons, vilket möjliggör automatisk avvärjning och återhämtning från cyberangrepp. Betydande framsteg mot sådan automatisering har gjorts genom utvecklingen av regelbaserade responssystem. Dessa system har dock en kritisk nackdel: de är beroende av domänexperter för att konfigurera reglerna, en process som är både felbenägen och ineffektiv. Modellering av säkerhetsrespons som ett reglertekniskt optimeringsproblem är ett lovande sätt att hantera denna begränsning men medför nya utmaningar. Främst bland dem är att överbrygga gapet mellan teoretisk optimalitet och operativ prestanda. Nuvarande responssystem med teoretiska optimalitetsgarantier har endast validerats i simulering, vilket lämnar deras praktiska nytta oprövad.

Den här avhandlingen behandlar ovannämnda utmaningar genom att utveckla en praktisk metodik för optimal säkerhetsrespons. Metodiken omfattar två system. För det första inkluderar den ett emuleringssystem som replikerar it-infrastrukturer i en virtuell miljö. Från detta system samlar vi in mätvärden och loggar som vi sedan använder för att identifiera en spelteoretisk modell. För det andra innefattar metodiken ett simuleringssystem där spelteoretiska responsstrategier optimeras genom stokastisk approximation för att uppnå ett givet mål, exempelvis att minimera responssystemets driftkostnad samt maximera dess förmåga att automatiskt stävja potentiella cyberangrepp. De optimerade responsstrategierna utvärderas och förfinas sedan i emuleringssystemet för att minska klyftan mellan teoretisk och operativ prestanda.

Vi presenterar CSLE, en originell plattform med öppen källkod som implementerar vår metodik. Med hjälp av denna plattform utvärderar vi vår metodik experimentellt på flera användningsområden, inklusive förebyggande av intrång, intrångssvar, intrångstolerans och försvar mot avancerade bestående hot. Vi bevisar strukturella egenskaper hos optimala responsstrategier och härleder effektiva algoritmer för att beräkna dem. Detta gör det möjligt för oss att lösa ett tidigare olöst problem: att demonstrera optimal säkerhetsrespons mot nätverksintrång på en it-infrastruktur.

Place, publisher, year, edition, pages
Stockholm: Kungliga Tekniska högskolan, 2024. p. 338
Series
TRITA-EECS-AVL ; 2024:85
Keywords
Cybersecurity, Game theory, Decision theory, Control theory, Causality, Optimal stopping, security response
National Category
Computer Engineering
Research subject
Electrical Engineering
Identifiers
urn:nbn:se:kth:diva-356193 (URN)978-91-8106-093-5 (ISBN)
Public defence
2024-12-05, https://kth-se.zoom.us/j/64592772191, F3, Lindstedtsvägen 26, Stockholm, 14:00 (English)
Opponent
Supervisors
Note

Academic Dissertation which, with due permission of the KTH Royal Institute of Technology, is submitted for public defence for the Degree of Doctor of Philosophy on Thursday the 5th December 2024, at 14:00 in F3, Lindstedtsvägen 26, Stockholm.

The defense will be streamed via Zoom: https://kth-se.zoom.us/j/64592772191

Candidate: Kim Hammar

Supervisor: Professor Rolf Stadler, KTH, Sweden

Opponent: Professor Tansu Alpcan, The University of Melbourne, Australia

Grading committee:

 - Professor Emil Lupu, Imperial College London, UK

 - Professor Alina Oprea, Northeastern University, USA

 - Professor Karl H. Johansson, KTH, Sweden

Reviewer: Professor Henrik Sandberg, KTH, Sweden

QC 20241111

Available from: 2024-11-11 Created: 2024-11-11 Last updated: 2024-11-11Bibliographically approved
Samani, F. S., Hammar, K. & Stadler, R. (2023). Demonstrating a System for Dynamically Meeting Management Objectives on a Service Mesh. In: Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023: . Paper presented at 36th IEEE/IFIP Network Operations and Management Symposium, NOMS 2023, Miami, United States of America, May 8 2023 - May 12 2023. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Demonstrating a System for Dynamically Meeting Management Objectives on a Service Mesh
2023 (English)In: Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, Institute of Electrical and Electronics Engineers (IEEE) , 2023Conference paper, Published paper (Refereed)
Abstract [en]

We demonstrate a management system that lets a service provider achieve end-to-end management objectives under varying load for applications on a service mesh based on the Istio and Kubernetes platforms. The management objectives for the demonstration include end-to-end delay bounds on service requests, throughput objectives, and service differentiation. Our method for finding effective control policies includes a simulator and a control module. The simulator is instantiated with traces from a testbed, and the control module trains a reinforcement learning (RL) agent to efficiently learn effective control policies on the simulator. The learned policies are then transfered to the testbed to perform dynamic control actions based on monitored system metrics. We show that the learned policies dynamically meet management objectives on the testbed and can be changed on the fly.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
Keywords
digital twin, Istio, Kubernetes, Performance management, reinforcement learning (RL), service mesh
National Category
Computer Sciences Control Engineering
Identifiers
urn:nbn:se:kth:diva-334446 (URN)10.1109/NOMS56928.2023.10154365 (DOI)2-s2.0-85164731961 (Scopus ID)
Conference
36th IEEE/IFIP Network Operations and Management Symposium, NOMS 2023, Miami, United States of America, May 8 2023 - May 12 2023
Note

Part of ISBN 9781665477161

QC 20230821

Available from: 2023-08-21 Created: 2023-08-21 Last updated: 2024-06-10Bibliographically approved
Hammar, K. & Stadler, R. (2023). Digital Twins for Security Automation. In: Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023: . Paper presented at 36th IEEE/IFIP Network Operations and Management Symposium, NOMS 2023, Miami, United States of America, May 8 2023 - May 12 2023. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Digital Twins for Security Automation
2023 (English)In: Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023, Institute of Electrical and Electronics Engineers (IEEE) , 2023Conference paper, Published paper (Refereed)
Abstract [en]

We present a novel emulation system for creating high-fidelity digital twins of IT infrastructures. The digital twins replicate key functionality of the corresponding infrastructures and allow to play out security scenarios in a safe environment. We show that this capability can be used to automate the process of finding effective security policies for a target infrastructure. In our approach, a digital twin of the target infrastructure is used to run security scenarios and collect data. The collected data is then used to instantiate simulations of Markov decision processes and learn effective policies through reinforcement learning, whose performances are validated in the digital twin. This closed-loop learning process executes iteratively and provides continuously evolving and improving security policies. We apply our approach to an intrusion response scenario. Our results show that the digital twin provides the necessary evaluative feedback to learn near-optimal intrusion response policies.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
Keywords
automation, bMDP, cybersecurity, Digital twin, network security, POMDP, reinforcement learning
National Category
Computer Systems Information Systems
Identifiers
urn:nbn:se:kth:diva-334449 (URN)10.1109/NOMS56928.2023.10154288 (DOI)2-s2.0-85164728152 (Scopus ID)
Conference
36th IEEE/IFIP Network Operations and Management Symposium, NOMS 2023, Miami, United States of America, May 8 2023 - May 12 2023
Note

Part of ISBN 9781665477161

QC 20230821

Available from: 2023-08-21 Created: 2023-08-21 Last updated: 2023-08-21Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-1773-8354

Search in DiVA

Show all publications