Your selections:
Application of rank correlation, clustering and classification in information security
- Beliakov, Gleb, Yearwood, John, Kelarev, Andrei
Heraclitus: A LFSR-based stream cipher with key dependent structure
- Colbert, Bernard, Dekker, Anthony, Batten, Lynn
Tracking equilibrium point under real-time price-based residential demand response
- Ding, Tao, Qu, Ming, Amjady, Nima, Wang, Fengyu, Bo, Rui, Shahidehpour, Mohammad
A survey on representation learning efforts in cybersecurity domain
- Usman, Muhammad, Jan, Mian, He, Xiangjian, Chen, Jinjun
Are you sure you would like to clear your session, including search history and login status?