Search

Showing total 3 results
3 results

Search Results

1. Application of a secure data transmission with an effective timing algorithm based on LoRa modulation and chaos.

2. Optimal bidding strategy for generation companies under CVaR constraint.

3. A formal modeling and analysis approach for access control rules, policies, and their combinations.