kth.sePublications
Change search
Link to record
Permanent link

Direct link
Papadimitratos, PanosORCID iD iconorcid.org/0000-0002-3267-5374
Alternative names
Publications (10 of 176) Show all publications
Jin, H. & Papadimitratos, P. (2025). Accountable, Scalable and DoS-resilient Secure Vehicular Communication. Computers & Security, 156, Article ID 104469.
Open this publication in new window or tab >>Accountable, Scalable and DoS-resilient Secure Vehicular Communication
2025 (English)In: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 156, article id 104469Article in journal (Refereed) Published
Abstract [en]

Standardized Vehicular Communication (VC), mainly Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs), is paramount to vehicle safety, carrying vehicle status information and reports of traffic/road-related events respectively. Broadcasted CAMs and DENMs are pseudonymously authenticated for security and privacy protection, with each node needing to have all incoming messages validated within an expiration deadline. This creates an asymmetry that can be easily exploited by external adversaries to launch a clogging Denial of Service (DoS) attack: each forged VC message forces all neighboring nodes to cryptographically validate it; at increasing rates, easy to generate forged messages gradually exhaust processing resources and severely degrade or deny timely validation of benign CAMs/DENMs. The result can be catastrophic when awareness of neighbor vehicle positions or critical reports are missed. We address this problem making the standardized VC pseudonymous authentication DoS-resilient. We propose efficient cryptographic constructs, which we term message verification facilitators, to prioritize processing resources for verification of potentially valid messages among bogus messages and verify multiple messages based on one signature verification. Any message acceptance is strictly based on public-key based message authentication/verification for accountability, i.e., non-repudiation is not sacrificed, unlike symmetric key based approaches. This further enables drastic misbehavior detection, also exploiting the newly introduced facilitators, based on probabilistic signature verification and cross-checking over multiple facilitators verifying the same message; while maintaining verification latency low even when under attack, trading off modest communication overhead. Our facilitators can also be used for efficient discovery and verification of DENM or any event-driven message, including misbehavior evidence used for our scheme. Even when vehicles are saturated by adversaries mounting a clogging DoS attack, transmitting high-rate bogus CAMs/DENMs, our scheme achieves an average 50 ms verification delay with message expiration ratio less than 1%- a huge improvement over the current standard that verifies every message signature in a First-Come First-Served (FCFS) manner and suffers from having 50% to nearly 100% of the received benign messages expiring.

Place, publisher, year, edition, pages
Elsevier BV, 2025
Keywords
Accountability, Non-repudiation, Privacy, Pseudonymous authentication, Efficiency
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-364044 (URN)10.1016/j.cose.2025.104469 (DOI)001484700400001 ()2-s2.0-105003723127 (Scopus ID)
Note

QC 20250602

Available from: 2025-06-02 Created: 2025-06-02 Last updated: 2025-08-28Bibliographically approved
Zhou, Z., Jin, H. & Papadimitratos, P. (2025). Clogging DoS Resilient Bootstrapping of Efficient V2V Validation. In: 40th Annual ACM Symposium On Applied Computing: . Paper presented at 40th Symposium on Applied Computing-SAC, MAR 31-APR 04, 2025, Catania, ITALY (pp. 1857-1866). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Clogging DoS Resilient Bootstrapping of Efficient V2V Validation
2025 (English)In: 40th Annual ACM Symposium On Applied Computing, Association for Computing Machinery (ACM) , 2025, p. 1857-1866Conference paper, Published paper (Refereed)
Abstract [en]

In Vehicular Communication (VC) systems, neighboring vehicles exchange authenticated transportation safety messages, informing about own mobility and the environment. Verifying all received messages in a dense neighborhood introduces significant cryptographic computation overhead for resource-constrained vehicular On-Board Units (OBUs). Attackers can exploit this to launch Denial of Service (DoS) attacks to clog OBUs by broadcasting bogus messages at a high rate. This attack is particularly effective due to an inherent asymmetry and amplification factor: each safety message is to be validated by all receiving neighboring vehicles. This imbalance can lead to significant delays in sifting benign messages amidst a deluge of bogus messages. Even worse, failure to promptly verify a significant amount of benign messages can paralyze Vehicle-to-Vehicle (V2V) enabled applications. We address this challenge, proposing a mechanism that thwarts such attacks: puzzle-based pre-validation that prioritizes verification of potentially valid messages with yet unknown (i.e., unverified) Pseudonymous Certificates (PCs). Verification of such PCs (and their corresponding messages) can bootstrap the efficient pre-validation of follow-up messages authenticated by the same PCs. We show experimental results confirming our scheme can effectively mitigate unsophisticated clogging DoS attacks that do not attempt to solve puzzles. We further show our scheme also significantly raises the bar for sophisticated adversaries: it can be configured to force attackers to solve puzzles for their bogus messages actively - something possible only by investing in significantly higher (hundreds of times more) computational power than that of the targeted benign vehicles. Last but not least, our scheme can be adaptive while remaining compatible to standardized V2V security.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025
Keywords
Pseudonymous authentication, Puzzle, Neighbor discovery
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-368401 (URN)10.1145/3672608.3707914 (DOI)001497934400249 ()2-s2.0-105006438233 (Scopus ID)979-8-4007-0629-5 (ISBN)
Conference
40th Symposium on Applied Computing-SAC, MAR 31-APR 04, 2025, Catania, ITALY
Note

QC 20250818

Available from: 2025-08-18 Created: 2025-08-18 Last updated: 2025-08-18Bibliographically approved
Spanghero, M. & Papadimitratos, P. (2025). Consumer INS coupled with carrier phase measurements for GNSS spoofing detection. In: : . Paper presented at ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA. Long Beach, CA, USA: Institute of Navigation
Open this publication in new window or tab >>Consumer INS coupled with carrier phase measurements for GNSS spoofing detection
2025 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Global Navigation Satellite Systems enable precise localization and timing even for highly mobile devices, but legacy implementations provide only limited support for the new generation of security-enhanced signals. Inertial Measurement Units have proved successful in augmenting the accuracy and robustness of the GNSS-provided navigation solution, but effective navigation based on inertial techniques in denied contexts requires high-end sensors. However, commercially available mobile devices usually embed a much lower-grade inertial system. To counteract an attacker transmitting all the adversarial signals from a single antenna, we exploit carrier phase-based observations coupled with a low-end inertial sensor to identify spoofing and meaconing. By short-time integration with an inertial platform, which tracks the displacement of the GNSS antenna, the high-frequency movement at the receiver is correlated with the variation in the carrier phase. In this way, we identify legitimate transmitters, based on their geometrical diversity with respect to the antenna system movement. We introduce a platform designed to effectively compare different tiers of commercial INS platforms with a GNSS receiver. By characterizing different inertial sensors, we show that simple MEMS INS perform as well as high-end industrial-grade sensors. Sensors traditionally considered unsuited for navigation purposes offer great performance at the short integration times used to evaluate the carrier phase information consistency against the high-frequency movement. Results from laboratory evaluation and through field tests at Jammertest 2024 show that the detector is up to 90% accurate in correctly identifying spoofing (or the lack of it), without any modification to the receiver structure, and with mass-production grade INS typical for mobile phones.

Place, publisher, year, edition, pages
Long Beach, CA, USA: Institute of Navigation, 2025
National Category
Signal Processing
Identifiers
urn:nbn:se:kth:diva-359742 (URN)
Conference
ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA
Funder
Swedish Civil Contingencies Agency, RIT17-0005
Note

QC 20250213

Available from: 2025-02-11 Created: 2025-02-11 Last updated: 2025-03-17Bibliographically approved
Sjösvärd, P., Jin, H. & Papadimitratos, P. (2025). DNS in the Time of Curiosity: A Tale of Collaborative User Privacy Protection. In: : . Paper presented at Twenty-ninth International Workshop on Security Protocols, Cambridge, UK, 26-27 March 2025.
Open this publication in new window or tab >>DNS in the Time of Curiosity: A Tale of Collaborative User Privacy Protection
2025 (English)Conference paper, Published paper (Refereed)
Abstract [en]

The Domain Name System (DNS) is central to all Internet user activity, resolving accessed domain names into Internet Protocol (IP) addresses. As a result, curious DNS resolvers can learn everything about Internet users' interests. Public DNS resolvers are rising in popularity, offering low-latency resolution, high reliability, privacy-preserving policies, and support for encrypted DNS queries. However, client-resolver traffic encryption, increasingly deployed to protect users from eavesdroppers, does not protect users against curious resolvers. Similarly, privacy-preserving policies are based solely on written commitments and do not provide technical safeguards. Although DNS query relay schemes can separate duties to limit data accessible by each entity, they cannot prevent colluding entities from sharing user traffic logs. Thus, a key challenge remains: organizations operating public DNS resolvers, accounting for the majority of DNS resolutions, can potentially collect and analyze massive volumes of Internet user activity data. With DNS infrastructure that cannot be fully trusted, can we safeguard user privacy? We answer positively and advocate for a user-driven approach to reduce exposure to DNS services. We will discuss key ideas of the proposal, which aims to achieve a high level of privacy without sacrificing performance: maintaining low latency, network bandwidth, memory/storage overhead, and computational overhead.

National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-370598 (URN)
Conference
Twenty-ninth International Workshop on Security Protocols, Cambridge, UK, 26-27 March 2025
Funder
Swedish Foundation for Strategic Research
Note

QC 20250929

Available from: 2025-09-29 Created: 2025-09-29 Last updated: 2025-09-29Bibliographically approved
Spanghero, M., Geib, F., Panier, R. & Papadimitratos, P. (2025). GNSS jammer localization and identification with airborne commercial GNSS receivers. IEEE Transactions on Information Forensics and Security, 20, 3550-3565
Open this publication in new window or tab >>GNSS jammer localization and identification with airborne commercial GNSS receivers
2025 (English)In: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 20, p. 3550-3565Article in journal (Refereed) Published
Abstract [en]

Global Navigation Satellite Systems (GNSS) are fundamental in ubiquitously providing position and time to a wide gamut of systems. Jamming remains a realistic threat in many deployment settings, civilian and tactical. Specifically, in Unmanned Aerial Vehicles (UAVs) sustained denial raises safety critical concerns. This work presents a strategy that allows detection, localization, and classification both in the frequency and time domain of interference signals harmful to navigation. A high-performance Vertical Take Off and Landing (VTOL) UAV with a single antenna and a commercial GNSS receiver is used to geolocate and characterize RF emitters at long range, to infer the navigation impairment. Raw IQ baseband snapshots from the GNSS receiver make the application of spectral correlation methods possible without extra software-defined radio payload, paving the way to spectrum identification and monitoring in airborne platforms, aiming at RF situational awareness. Live testing at Jammertest, in Norway, with portable, commercially available GNSS multi-band jammers demonstrates the ability to detect, localize, and characterize harmful interference. Our system pinpointed the position with an error of a few meters of the transmitter and the extent of the affected area at long range, without entering the denied zone. Additionally, further spectral content extraction is used to accurately identify the jammer frequency, bandwidth, and modulation scheme based on spectral correlation techniques.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
National Category
Signal Processing Control Engineering
Identifiers
urn:nbn:se:kth:diva-361264 (URN)10.1109/tifs.2025.3550050 (DOI)001457502700002 ()2-s2.0-105002263966 (Scopus ID)
Funder
Swedish Research Council, 2020-04621
Note

QC 20250520

Available from: 2025-03-14 Created: 2025-03-14 Last updated: 2025-05-20Bibliographically approved
Liu, W. & Papadimitratos, P. (2025). GNSS Spoofing Detection Based on Opportunistic Position Information. IEEE Internet of Things Journal
Open this publication in new window or tab >>GNSS Spoofing Detection Based on Opportunistic Position Information
2025 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662Article in journal (Refereed) Epub ahead of print
Abstract [en]

The limited or no protection for civilian Global Navigation Satellite System (GNSS) signals makes spoofing attacks relatively easy. With modern mobile devices often featuring network interfaces, state-of-the-art signals of opportunity (SOP) schemes can provide accurate network positions in replacement of GNSS. The use of onboard inertial sensors can also assist in the absence of GNSS, possibly in the presence of jammers. The combination of SOP and inertial sensors has received limited attention, yet it shows strong results on fully custom-built platforms. We do not seek to improve such special-purpose schemes. Rather, we focus on countering GNSS attacks, notably detecting them, with emphasis on deployment with consumer-grade platforms, notably smartphones, that provide off-the-shelf opportunistic information (i.e., network position and inertial sensor data). Our Position-based Attack Detection Scheme (PADS) is a probabilistic framework that uses regression and uncertainty analysis for positions. The regression optimization problem is a weighted mean square error of polynomial fitting, with constraints that the fitted positions satisfy the device velocity and acceleration. Then, uncertainty is modeled by a Gaussian process, which provides more flexibility to analyze how sure or unsure we are about position estimations. In the detection process, we combine all uncertainty information with the position estimations into a fused test statistic, which is the input utilized by an anomaly detector based on outlier ensembles. The evaluation shows that the PADS outperforms a set of baseline methods that rely on SOP or inertial sensor-based or statistical tests, achieving up to 3 times the true positive rate at a low false positive rate.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
GNSS attack detection, opportunistic information, secure localization
National Category
Communication Systems Signal Processing Control Engineering
Identifiers
urn:nbn:se:kth:diva-368747 (URN)10.1109/JIOT.2025.3581443 (DOI)2-s2.0-105008826704 (Scopus ID)
Note

QC 20250821

Available from: 2025-08-21 Created: 2025-08-21 Last updated: 2025-08-21Bibliographically approved
Liu, W. & Papadimitratos, P. (2025). Guardian Positioning System (GPS) for Location Based Services. In: WiSec 2025 - Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks: . Paper presented at 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2025, Arlington, United States of America, Jun 30 2025 - Jul 3 2025 (pp. 88-99). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Guardian Positioning System (GPS) for Location Based Services
2025 (English)In: WiSec 2025 - Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery (ACM) , 2025, p. 88-99Conference paper, Published paper (Refereed)
Abstract [en]

Location-based service (LBS) applications proliferate and support transportation, entertainment, and more. Modern mobile platforms, with smartphones being a prominent example, rely on terrestrial and satellite infrastructures (e.g., global navigation satellite system (GNSS) and crowdsourced Wi-Fi, Bluetooth, cellular, and IP databases) for correct positioning. However, they are vulnerable to attacks that manipulate positions to control and undermine LBS functionality-Thus enabling the scamming of users or services. Our work reveals that GNSS spoofing attacks succeed even though smartphones have multiple sources of positioning information. Moreover, that Wi-Fi spoofing attacks with GNSS jamming are surprisingly effective. More concerning is the evidence that sophisticated, coordinated spoofing attacks are highly effective. Attacks can target GNSS in combination with other positioning methods, thus defenses that assume that only GNSS is under attack cannot be effective. More so, resilient GNSS receivers and special-purpose antennas are not feasible on smartphones. To address this gap, we propose an extended receiver autonomous integrity monitoring (RAIM) framework that leverages the readily available, redundant, often so-called opportunistic positioning information on off-The-shelf platforms. We jointly use onboard sensors, terrestrial infrastructures, and GNSS. We show that our extended RAIM framework improves resilience against location spoofing, e.g., achieving a detection accuracy improvement of up to 24-58% compared to the state-of-The-Art algorithms and location providers; detecting attacks within 5 seconds, with a low false positive rate.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025
Keywords
geolocation apis, localization attacks, secure localization
National Category
Communication Systems Signal Processing Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-369405 (URN)10.1145/3734477.3734707 (DOI)2-s2.0-105012088988 (Scopus ID)
Conference
18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2025, Arlington, United States of America, Jun 30 2025 - Jul 3 2025
Note

Part of ISBN 9798400715303

QC 20250904

Available from: 2025-09-04 Created: 2025-09-04 Last updated: 2025-09-08Bibliographically approved
Johan, W., Hussain, A. & Papadimitratos, P. (2025). Jailbreaking Large Language Models Through Content Concretization. In: GameSec 2025: 16th Conference on Game Theory and AI for Security. Paper presented at GameSec 2025 - 16th Conference on Game Theory and AI for Security, October 13-15, 2025, Athens, Greece.
Open this publication in new window or tab >>Jailbreaking Large Language Models Through Content Concretization
2025 (English)In: GameSec 2025: 16th Conference on Game Theory and AI for Security, 2025Conference paper, Published paper (Refereed)
Abstract [en]

Large Language Models (LLMs) are increasingly deployed for task automation and content generation, yet their safety mechanisms remain vulnerable to circumvention through different jailbreaking techniques. In this paper, we introduce Content Concretization (CC), a novel jailbreaking technique that iteratively transforms abstract malicious requests into concrete, executable implementations. CC is a two-stage process: first, generating initial LLM responses using lower-tier, less constrained safety filters models, then refining them through higher-tier models that process both the preliminary output and original prompt. We evaluate our technique using 350 cybersecurity-specific prompts, demonstrating substantial improvements in jailbreak Success Rates (SRs), increasing from 7% (no refinements) to 62% after three refinement iterations, while maintaining a cost of 7.5¢ per prompt. Comparative A/B testing across nine different LLM evaluators confirms that outputs from additional refinement steps are consistently rated as more malicious and technically superior. Moreover, manual code analysis reveals that generated outputs execute with minimal modification, although optimal deployment typically requires target-specific fine-tuning. With eventual improved harmful code generation, these results highlight critical vulnerabilities in current LLM safety frameworks.

Keywords
Malicious Code Generation, AI, Large Language Models, Jailbreaking, Cybersecurity
National Category
Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-371663 (URN)
Conference
GameSec 2025 - 16th Conference on Game Theory and AI for Security, October 13-15, 2025, Athens, Greece
Note

QC 20251016

Available from: 2025-10-15 Created: 2025-10-15 Last updated: 2025-10-16Bibliographically approved
Alhazbi, S., Hussain, A., Oligeri, G. & Papadimitratos, P. (2025). LLMs Have Rhythm: Fingerprinting Large Language Models Using Inter-Token Times and Network Traffic Analysis. IEEE Open Journal of the Communications Society, 6, 5050-5071
Open this publication in new window or tab >>LLMs Have Rhythm: Fingerprinting Large Language Models Using Inter-Token Times and Network Traffic Analysis
2025 (English)In: IEEE Open Journal of the Communications Society, E-ISSN 2644-125X, Vol. 6, p. 5050-5071Article in journal (Refereed) Published
Abstract [en]

As Large Language Models (LLMs) become increasingly integrated into many technological ecosystems across various domains and industries, identifying which model is deployed or being interacted with is critical for the security and trustworthiness of the systems. Current verification methods typically rely on analyzing the generated output to determine the source model. However, these techniques are susceptible to adversarial attacks, operate in a post-hoc manner, and may require access to the model weights to inject a verifiable fingerprint. In this paper, we propose a novel passive fingerprinting framework that operates in real-time and remains effective even under encrypted network traffic conditions. Our method leverages the intrinsic autoregressive generation nature of language models, which generate text one token at a time based on all previously generated tokens, creating a unique temporal pattern–like a rhythm or heartbeat–that persists even when the output is streamed over a network. We find that measuring the Inter-Token Times (ITTs)–time intervals between consecutive tokens–can identify different language models with high accuracy. We develop a Deep Learning (DL) pipeline to capture these timing patterns using network traffic analysis and evaluate it on 16 Small Language Models (SLMs) and 10 proprietary LLMs across different deployment scenarios, including local host machine (GPU/CPU), Local Area Network (LAN), Remote Network, and when using Virtual Private Network (VPN). Our experimental results demonstrate high classification performance with weighted F1-scores of 85% when tested on a different day, 74% across different networks, and 71% when traffic is tunneled through a VPN connection. This work opens a new avenue for model identification in real-world scenarios and contributes to more secure and trustworthy language model deployment.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Deep Learning, Fingerprinting, Large Language Models, Network Security, Network Traffic Analysis, Small Language Models
National Category
Communication Systems Computer Sciences Natural Language Processing
Identifiers
urn:nbn:se:kth:diva-366014 (URN)10.1109/OJCOMS.2025.3577016 (DOI)001515531400009 ()2-s2.0-105007645474 (Scopus ID)
Note

QC 20250704

Available from: 2025-07-04 Created: 2025-07-04 Last updated: 2025-09-26Bibliographically approved
Sjösvärd, P., Jin, H. & Papadimitratos, P. (2025). LLUAD: Low-Latency User-Anonymized DNS. In: : . Paper presented at 24th Workshop on Privacy in the Electronic Society held in conjunction with ACM CCS 2025, 13 October 2025, Taipei, Taiwan.
Open this publication in new window or tab >>LLUAD: Low-Latency User-Anonymized DNS
2025 (English)Conference paper, Published paper (Refereed)
Abstract [en]

The Domain Name System (DNS) is involved in practically all web activity, translating easy-to-remember domain names into Internet Protocol (IP) addresses. Due to its central role on the Internet, DNS exposes user web activity in detail. The privacy challenge is honest-but-curious DNS servers/resolvers providing the translation/lookup service. In particular, with the majority of DNS queries handled by public DNS resolvers, the organizations running them can track, collect, and analyze massive user activity data. Existing solutions that encrypt DNS traffic between clients and resolvers are insufficient, as the resolver itself is the privacy threat. While DNS query relays separate duties among multiple entities, to limit the data accessible by each entity, they cannot prevent colluding entities from sharing user traffic logs. To achieve near-zero-trust DNS privacy compatible with the existing DNS infrastructure, we propose LLUAD: it locally stores a Popularity List, the most popular DNS records, on user devices, formed in a privacy-preserving manner based on user interests. In this way, LLUAD can both improve privacy and reduce access times to web content. The Popularity List is proactively retrieved from a (curious) public server that continually updates and refreshes the records based on user popularity votes, while efficiently broadcasting record updates/changes to adhere to aggressive load-balancing schemes (i.e., name servers actively load-balancing user connections by changing record IP addresses). User votes are anonymized using a novel, efficient, and highly scalable client-driven Voting Mix Network – with packet lengths independent of the number of hops, centrally enforced limit on number of votes cast per user, and robustness against poor client participation – to ensure a geographically relevant and correctly/securely instantiated Popularity List. We find that with a 25 000 entries long Popularity List, LLUAD provides both privacy-preserving and high performance DNS: this is due to the instant local (and anonymous) resolution of around 94% of queries based on the Popularity List, with the few remaining queries using other privacy-preserving, but latency-costly, alternatives, such as querying a public resolver over a public anonymous network, e.g., Tor. Beyond strong DNS privacy and low average lookup latency, LLUAD maintains network traffic overhead on par with widely deployed secure DNS protocols, with a memory/storage overhead of less than 2 MB.

National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-370599 (URN)
Conference
24th Workshop on Privacy in the Electronic Society held in conjunction with ACM CCS 2025, 13 October 2025, Taipei, Taiwan
Funder
Swedish Research Council, 2020-04621
Available from: 2025-09-29 Created: 2025-09-29 Last updated: 2025-09-29
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-3267-5374

Search in DiVA

Show all publications