• Ahlswede, R. Ahlswede, A. (ed.); Althöfer, I. (ed.); Deppe, C. (ed.); Tamm, Ulrich (ed.). Identification and other probabilistic models. Rudolf Ahlswede’s lectures on information theory 6. Edited by Alexander Ahlswede, Ingo Althöfer, Christian Deppe and Ulrich Tamm : [review]Henno, JaakZentralblatt MATH2021 / 1 p https://zbmath.org/?q=an%3A7349483
  • An enhanced lightweight authentication scheme for secure access to cloud dataHammami, Hamza; Obaidat, Mohammad S.; Ben Yahia, SadokProceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 20202020 / p. 110-117 https://doi.org/10.5220/0009824301100117
  • Analyzing side-channel attack vulnerabilities at RTLLai, Xinhui; Jenihhin, Maksim2023 IEEE 24th Latin American Test Symposium (LATS)2023 / 2 p. : ill https://doi.org/10.1109/LATS58125.2023.10154497
  • Assessment of aviation security risk management for airline turnaround processesMatulevičius, Raimundas; Norta, Alexander; Udokwu, Chibuzor; Nõukas, ReinTransactions on large-scale data- and knowledge-centered systems XXXVI : special issue on data and security engineering2017 / p. 109-141 : ill https://doi.org/10.1007/978-3-662-56266-6_6 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85037831734&origin=inward&txGid=21f3b4622e1c36992c20babb046b0f93 https://www.webofscience.com/wos/woscc/full-record/WOS:000450903400006
  • Between sustainability, social cohesion and security regional development in Northeastern EstoniaPrause, Gunnar Klaus; Tuisk, Tarmo; Olaniyi, Eunice OmololaEntrepreneurship and sustainability issues2019 / p. 1235-1254 https://doi.org/10.9770/jesi.2019.6.3(13) https://www.scopus.com/sourceid/21100856538 https://www.scopus.com/record/display.uri?eid=2-s2.0-85064074793&origin=inward&txGid=8af7cf107d567a537836a2161e5bef2d https://jcr.clarivate.com/jcr-jp/journal-profile?journal=ENTREP%20SUSTAIN%20ISS&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000460934100013
  • Blockchain-based medical decision support systemHovorushchenko, Tetiana; Hnatchuk, Yelyzaveta; Osyadlyi, Vitaliy; Kapustian, Mariia; Boyarchuk, ArtemJournal of cyber security and mobility2023 / p. 253-274 : ill https://doi.org/10.13052/jcsm2245-1439.123.1 https://www.scopus.com/sourceid/21100781741 https://www.scopus.com/record/display.uri?eid=2-s2.0-85171362527&origin=inward&txGid=86fdde18e3d7312bbeee48c3cb43e3ea
  • Chia, N-H.; Chung, K-M.; Yamakawa, T. A black-box approach to post-quantum zero-knowledge in constant rounds : [review]Henno, JaakzbMATH Open2022 / 1 p https://zbmath.org/1486.94089
  • Comparative analysis of pattern mining algorithms for event logsGasimov, Orkhan; Vaarandi, Risto; Pihelgas, Mauno2023 IEEE International Conference on Cyber Security and Resilience (CSR) : Venice, Italy, 20232023 / 7 p https://doi.org//10.1109/CSR57506.2023.10224996
  • A comprehensive survey on digital twin for future networks and emerging Internet of Things industryHakiri, Akram; Gokhale, Aniruddha; Ben Yahia, Sadok; Mellouli, NedraComputer Networks2024 / art. 110350 https://doi.org/10.1016/j.comnet.2024.110350 https://www.scopus.com/sourceid/26811 https://www.scopus.com/record/display.uri?eid=2-s2.0-85188806041&origin=resultslist&sort=plf-f&src=s&sid=4afc7d20dc28f724f87c74cc4df7064f&sot=b&sdt=b&s=DOI%2810.1016%2Fj.comnet.2024.110350%29&sl=36&sessionSearchId=4afc7d20dc28f724f87c74cc4df7064f&relpos=0 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=COMPUT%20NETW&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001218321900001
  • A comprehensive survey on revolutionizing connectivity through artificial intelligence-enabled digital twin network in 6GSheraz, Muhammad; Chuah, Teong Chee; Lee, Ying Loong; Alam, Muhammad Mahtab; Al-Habashna, Ala'a; Han, ZhuIEEE Access2024 / p. 49184-49215 https://doi.org/10.1109/ACCESS.2024.3384272
  • Current problems related to energy policy and law in European UnionKerikmäe, Tanel; Dutt, Pawan KumarL'Europe unie = United Europe2013 / p. 112-120 : ill
  • DADS : decentralized attestation for device swarmsWedaj, Samuel; Paul, Kolin; Ribeiro, Vinay J.ACM Transactions on Privacy and Security2019 / Art. 19 https://doi.org/10.1145/3325822 https://www.scopus.com/sourceid/21100832567 https://www.scopus.com/record/display.uri?eid=2-s2.0-85069542029&origin=inward&txGid=fa88de5f62f2c5949433e431a8d2cb2c https://jcr.clarivate.com/jcr-jp/journal-profile?journal=ACM%20T%20PRIV%20SECUR&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000497128700005
  • Design and verification of secure cache wrapper against access-driven side-channel attacksNiazmand, Behrad; Azad, Siavoosh Payandeh; Jervan, Gert; Sepulveda, JohannaEuromicro Conference on Digital System Design : DSD 2019 : 28 - 30 August 2019 Kallithea, Chalkidiki, Greece : proceedings2019 / p. 672-676 : ill https://doi.org/10.1109/DSD.2019.00108
  • DoS attack detection and path collision localization in NoC-based MPSoC architecturesChaves Arroyave, Cesar Giovanni; Azad, Siavoosh Payandeh; Hollstein, Thomas; Sepulveda, JohannaJournal of low power electronics and applications2019 / art. 7, 20 p. : ill https://doi.org/10.3390/jlpea9010007 https://www.scopus.com/sourceid/21100332242 https://www.scopus.com/record/display.uri?eid=2-s2.0-85062466716&origin=inward&txGid=3ac2fb668aacba212c689001c5c2cf74 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=J%20LOW%20POWER%20ELECT%20AP&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000698975600007
  • Dynamic and distributed security management for NoC Based MPSoCsAzad, Siavoosh Payandeh; Jervan, Gert; Sepulveda, JohannaComputational Science - ICCS 2019 : 19th International Conference, Faro, Portugal, June 12-14, 2019 : Proceedings, Part II2019 / p. 649–662 : ill https://doi.org/10.1007/978-3-030-22741-8_4 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85067702894&origin=inward&txGid=a2b61e312da8739de4a11bd2bea7f959 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000589290600046
  • An efficient authentication and key agreement scheme for secure smart grid communication servicesHammami, Hamza; Obaidat, Mohammad S.; Ben Yahia, SadokInternational journal of communication systems2020 / art. e4558, p. 1−13 https://doi.org/10.1002/dac.4558 https://www.scopus.com/sourceid/17964 https://www.scopus.com/record/display.uri?eid=2-s2.0-85088841456&origin=inward&txGid=12b954376ee75fd8b48ae070fa13cade https://jcr.clarivate.com/jcr-jp/journal-profile?journal=INT%20J%20COMMUN%20SYST&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000554412600001
  • Europe's refugee crisis in 2015 and security threats from the Baltic perspectiveVeebel, Viljar; Markus, RaulJournal of politics and law2015 / p. 254-262 : ill http://dx.doi.org/10.5539/jpl.v8n4p254
  • Framework for peer-to-peer data sharing over Web browsersPattanaik, Vishwajeet; Sharvadze, Ioane; Draheim, DirkFuture Data and Security Engineering : 6th International Conference, FDSE 2019Nha Trang City, Vietnam, November 27–29, 2019 : proceedings2019 / p. 207-225 : ill https://doi.org/10.1007/978-3-030-35653-8_14 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85077042426&origin=inward&txGid=12c91289ecee38369a202bae5d1b7642 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000573279300014
  • The governance of safety and security risks in connected healthcareSkierka-Canton, IsabelLiving in the Internet of Things : Cybersecurity of the IoT - 2018, London2018 / 12 p https://doi.org/10.1049/cp.2018.0002
  • IaaS platforms : how secure are they?Astrova, Irina; Koschel, Arne; Henke, Mats LennartIEEE 30th International Conference on Advanced Information Networking and Applications Workshops : WAINA 2016 : 23-25 March 2016, Crans-Montana, Switzerland : proceedings2016 / p. 843-848 : ill https://doi.org/10.1109/WAINA.2016.22
  • Ideological networks and security in the two-speed world - Venia Legendi [Electronic resource]Erne, JaanikaSSRN working paper series2013 / [26] p http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2285465
  • The impact of perceived security on intention to use E-learning among studentsFarooq, Ali; Ahmad, Farhan; Khadam, Nyla; Lorenz, Birgy; Isoaho, JouniProceedings IEEE 20th International Conference on Advanced Learning Technologies, ICALT 2020 : 6–9 July 2020, Online2020 / p. 360-364 https://doi.org/10.1109/ICALT49669.2020.00115
  • Improving Security and Privacy with Raspberry Pi DevicesDžankic, Radoje; Bulatovic, Zvonko; Bauk, SanjaMaritime Cybersecurity2025 / p. 217-233 https://doi.org/10.1007/978-3-031-87290-7_12
  • Improving the technical functionality of children's tracking watchesJennings, Luke; Singh, Inderbir; Sorell, Matthew; Hovhannisyan, KristineProceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 20182018 / p. 57-59 https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
  • Information and information securityHenno, JaakInformation modelling and knowledge bases XXVII2016 / p. 103-120 https://doi.org/10.3233/978-1-61499-611-8-103 https://www.scopus.com/sourceid/19500157321 https://www.scopus.com/record/display.uri?eid=2-s2.0-84956703591&origin=inward&txGid=d7d50d0094ed9d2dcad4d335aca9490f https://www.webofscience.com/wos/woscc/full-record/WOS:000385790100009
  • Latch-Based logic lockingSweeney, J.; Mohammed Zackriya, V.; Pagliarini, Samuel Nascimento; Pileggi, LarryProceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, HOST 20202020 / p. 132−141 : ill https://doi.org/10.1109/HOST45689.2020.9300256
  • Latest trends in hardware security and privacyDi Natale, Giorgio; Regazzoni, Francesco; Albanese, Vincent; Lhermet, Frank; Loisel, Yann; Sensaoui, Abderrahmane; Pagliarini, Samuel Nascimento33rd IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) : ESA-ESRIN, Italy (On-line Virtual Event),October 19–21, 20202020 / 4 p. : ill https://doi.org/10.1109/DFT50435.2020.9250816
  • A lightweight anonymous authentication scheme for secure cloud computing servicesHammami, Hamza; Ben Yahia, Sadok; Obaidat, Mohammad S.The Journal of Supercomputing2021 / p. 1693-1713 https://doi.org/10.1007/s11227-020-03313-y https://www.scopus.com/sourceid/25623 https://www.scopus.com/record/display.uri?eid=2-s2.0-85085303331&origin=inward&txGid=4acb99680b7f15efa3541074729a2659 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=J%20SUPERCOMPUT&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000535637900001
  • Limited statehood and its security implications on the fragmentation political order in the Middle East and North AfricaPolese, Abel; Hanau Santini, RuthSmall wars & insurgencies2018 / p. 379-390 https://www.tandfonline.com/doi/full/10.1080/09592318.2018.1456815#
  • Machine learning meets communication networks : current trends and future challengesAhmad, Ijaz; Shahabuddin, Shariar; Malik, Hassan; Leppänen, Teemu; Loven, Lauri; Anttonen, Antti; Sodhro, Ali Hassan; Alam, Muhammad Mahtab; Juntti, Markku; Yla-Jääski, AnttiIEEE Access2020 / art. 9274307, p. 223418-223460 https://doi.org/10.1109/ACCESS.2020.3041765 https://www.scopus.com/sourceid/21100374601 https://www.scopus.com/record/display.uri?eid=2-s2.0-85097366961&origin=inward&txGid=9eb6a5e07ee92e8b84c5e33c702640b6 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=IEEE%20ACCESS&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000604019600001
  • Maksukuulekus ja selle tähendus sisejulgeoleku teoreetilises käsitlusesRandlane, KerlySisekaitseakadeemia toimetised2011 / lk. 284-301
  • Mapping requirements specifications into a formalized blockchain-enabled authentication protocol for secured personal identity assuranceLeiding, Benjamin; Norta, AlexanderFuture Data and Security Engineering : 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017 : proceedings2017 / p. 181-196 : ill https://doi.org/10.1007/978-3-319-70004-5_13 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85036461982&origin=inward&txGid=606bbd41a3252c20d93fe400e9106a39 https://www.webofscience.com/wos/woscc/full-record/WOS:000440851600013
  • Maritime cyber-insurance : The Norwegian case : [abstract]Franke, Ulrik; Langfeldt Friberg, Even; Bahsi, HayretdinInternational Journal of Critical Infrastructures2022 / p. 267–286 https://doi.org/10.1504/IJCIS.2022.10046729
  • Maritime cyber-insurance: the Norwegian caseFranke, Ulrik; Friberg, Even Langfeldt; Bahşi, HayretdinInternational Journal of Critical Infrastructures2022 / p. 267-286 https://doi.org/10.1504/ijcis.2022.125816 https://www.scopus.com/sourceid/26673 https://www.scopus.com/record/display.uri?eid=2-s2.0-85140977068&origin=inward&txGid=584d07a059923f808fcb0e0c5f8d2e95 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=INT%20J%20CRIT%20INFRASTRU&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000861914700005
  • A modern empire and its public diplomacy : on Russia’s communication with EstoniaVernygora, Vlad Alex; Belonosova, ElizavetaThe New Zealand Slavonic Journal2019 / p. 59-94 https://resolver.scholarsportal.info/resolve/00288683/v53-54inone/59_ameaipd.xml
  • Multi-modal biometric system security and privacyEssen, Akim; Sorell, Matthew; Maennel, Olaf ManuelProceedings of the 5th Interdisciplinary Cyber Research Conference 2019 : 29th of June 2019, Tallinn University of Technology2019 / p. 30-32 https://www.ester.ee/record=b5238490*est
  • Nord Stream project : ecopolitical, economical and security field considerationsVärk, Juhan; Nutt, Mart; Martin, JüriSocial and natural sciences journal2011 / p. 18-27 https://ojs.journals.cz/index.php/SNSJ/article/view/270
  • A novel anonymous authentication and key agreement scheme for smart gridHammami, Hamza; Obaidat, Mohammad S.; Ben Yahia, SadokProceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 20202020 / p. 357-362 https://doi.org/10.5220/0009824203570362
  • A novel efficient and lightweight authentication scheme for secure smart grid communication systemsHammami, Hamza; Ben Yahia, Sadok; Obaidat, Mohammad S.The Journal of Supercomputing2023 / p. 7360 - 7376 https://doi.org/10.1007/s11227-022-04944-z https://www.scopus.com/sourceid/25623 https://www.scopus.com/record/display.uri?eid=2-s2.0-85142677027&origin=inward&txGid=db5e39530b59fd3c8a5d1115ede9f315 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=J%20SUPERCOMPUT&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:000889038600003
  • Origin and definition of the category of economic security of enterprise [Online resource]Ianioglo, Alina; Põlajeva, Tatjana9th International Scientific Conference "Business and Management 2016" : May 12-13, 2016, Vilnius, Lithuania2016 / p. 1-8 : ill http://dx.doi.org/10.3846/bm.2016.46
  • A peer-to-peer data sharing framework for Web browsers : analysis and evaluationPattanaik, Vishwajeet; Sharvadze, Ioane; Draheim, DirkSN Computer Science2020 / art. 214, 10 p https://doi.org/10.1007/s42979-020-00236-6
  • Producing cultural change in political communities : the impact of populism and extremism on the international security environment2023 https://doi.org/10.1007/978-3-031-43440-2
  • REACT: Autonomous intrusion response system for intelligent vehiclesHamad, Mohammad; Finkenzeller, Andreas; Kühr, Michael; Roberts, Andrew James; Maennel, Olaf Manuel; Steinhorst, Sebastian; Prevelakis, VassilisComputers and security2024 / art. 104008, 17 p. : ill https://doi.org/10.1016/j.cose.2024.104008 https://www.scopus.com/sourceid/28898 https://www.scopus.com/record/display.uri?eid=2-s2.0-85199489024&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=ALL%28%22REACT%3A+Autonomous+intrusion+response+system+for+intelligent+vehicles%22%29&sessionSearchId=a1950993a8713b95c4defac4e2fbf8c1&relpos=0 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=COMPUT%20SECUR&year=2023 https://www.webofscience.com/wos/woscc/full-record/WOS:001283366300001
  • RESCUE EDA Toolset for interdependent aspects of reliability, security and quality in nanoelectronic systems designGürsoy, Cemil Cem; Cardoso Medeiros, Guilherme; Chen, Juanho; Balakrishnan, Aneesh; Lai, Xinhui; Bagbaba, Ahmet Cagri; Raik, Jaan; Jenihhin, MaksimDATE 20192019 / 1 p. : ill https://doi.org/10.5281/zenodo.3362529 https://past.date-conference.com/
  • RESCUE: interdependent challenges of reliability, security and quality in nanoelectronic systemsJenihhin, Maksim; Raik, Jaan2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) : proceedings2020 / art. 19690741 , 6 p https://doi.org/10.23919/DATE48585.2020.9116558
  • Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patternsNorta, Alexander; Matulevičius, Raimundas; Leiding, BenjaminComputers & Security2019 / p. 253−269 https://doi.org/10.1016/j.cose.2019.05.017 https://www.scopus.com/sourceid/28898 https://www.scopus.com/record/display.uri?eid=2-s2.0-85068181119&origin=inward&txGid=c4272b532e8bdb269f1498304362354d https://jcr.clarivate.com/jcr-jp/journal-profile?journal=COMPUT%20SECUR&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000483406200015
  • A Scope Review of Secure Broadcasting Protocols for the Automatic Identification SystemTsiopoulos, Leonidas; Vaarandi, RistoMaritime Cybersecurity2025 / p. 103-121 https://doi.org/10.1007/978-3-031-87290-7_6
  • Securing self-aware cyber-physical systems using digital twinsMeeran, Mohammad Tariq2024 19th Biennial Baltic Electronics Conference (BEC)2024 / 5 p. : ill https://doi.org/10.1109/BEC61458.2024.10737954 https://www.scopus.com/sourceid/21100228125 https://www.scopus.com/record/display.uri?eid=2-s2.0-85210592252&origin=resultslist&sort=plf-f&src=s&sot=b&sdt=b&s=TITLE-ABS-KEY%28%22Securing+Self-aware+Cyber-physical+Systems+Using+Digital+Twins%22%29&sessionSearchId=720044c030ecd4be2c873494c1a60274&relpos=0 https://www.webofscience.com/wos/woscc/full-record/WOS:001411745600015
  • Security risk management in the aviation turnaround sectorMatulevičius, Raimundas; Norta, Alexander; Udokwu, Chibuzor; Nõukas, ReinFuture Data and Security Engineering : Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016 : proceedings2016 / p. 119-140 : ill https://doi.org/10.1007/978-3-319-48057-2_8 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-84995543015&origin=inward&txGid=f3f2bf5968c6599904f8f7a98d1ecc15 https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000583654100008
  • Split-chip design to prevent IP reverse engineeringPagliarini, Samuel Nascimento; Sweeney, Joseph; Mai, Ken; Blanton, Shawn; Mitra, Subhasish; Pileggi, LarryIEEE Design and Test2020 / p. 109-118 https://doi.org/10.1109/MDAT.2020.3033255 https://www.scopus.com/sourceid/21100286806 https://www.scopus.com/record/display.uri?eid=2-s2.0-85095985466&origin=inward&txGid=5cd9b065fa2590c9dd1c7c529d74978c https://jcr.clarivate.com/jcr-jp/journal-profile?journal=IEEE%20DES%20TEST&year=2022 https://www.webofscience.com/wos/woscc/full-record/WOS:000678331400021
  • The invisible front : a cyber resilience perspectiveBahsi, HayretdinThe geopolitics of power grids : political and security aspects of Baltic electricity synchronization : March 20182018 / p. 53–68 : ill https://www.ester.ee/record=b5053315*est
  • TOOP trust architectureBoldrin, Luca; Sellitto, Giovanni Paolo; Tepandi, JaakThe once-only principle : The TOOP project2021 / p. 126–140 https://doi.org/10.1007/978-3-030-79851-2_7 https://www.scopus.com/sourceid/25674 https://www.scopus.com/record/display.uri?eid=2-s2.0-85109896344&origin=inward&txGid=867c458ec87332c7317bf335bf26250c https://jcr.clarivate.com/jcr-jp/journal-profile?journal=LECT%20NOTES%20ARTIF%20INT&year=2005 https://www.webofscience.com/wos/woscc/full-record/WOS:000894547800009
  • Using Incremental Inductive Logic Programming for Learning Spoofing Attacks on Maritime Automatic Identification System DataBenterki, Aboubaker Seddiq; Visky, Gabor; Vain, Jüri; Tsiopoulos, LeonidasMaritime Cybersecurity2025 / p. 123-141 https://doi.org/10.1007/978-3-031-87290-7_7
  • Wearable wireless sensor networks for emergency response in public safety networksAlam, Muhammad Mahtab; Ben Arbia, Dhafer; Ben Hamida, ElyesWireless public safety networks 2 : a systematic approach2016 / p. 63-94 : ill https://doi.org/10.1016/B978-1-78548-052-2.50003-7