Search results
From MaRDI portal
- Publication Type Application of accessibility based methods for vulnerability analysis of strategic road networks 2007-01-24 Paper Maximum likelihood estimation...10 bytes (20 words) - 02:01, 13 December 2023
- Publication Date of Publication Type Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca 2010-11-25 Paper...10 bytes (18 words) - 11:34, 6 October 2023
- Publication Date of Publication Type Dynamic vulnerability analysis of public transport networks: mitigation effects of real-time information 2016-06-10...10 bytes (16 words) - 11:10, 6 October 2023
- Publication Date of Publication Type Vulnerability analysis of interdependent network via integer programming approaches 2021-02-17 Paper...10 bytes (16 words) - 09:03, 25 September 2023
- Date of Publication Type Network-based accessibility measures for vulnerability analysis of degradable transportation networks 2008-03-12 Paper...10 bytes (16 words) - 10:34, 7 October 2023
- Date of Publication Type Network-based accessibility measures for vulnerability analysis of degradable transportation networks 2008-03-12 Paper...10 bytes (16 words) - 10:34, 7 October 2023
- Publication Type Application of accessibility based methods for vulnerability analysis of strategic road networks 2007-01-24 Paper...10 bytes (18 words) - 09:15, 7 October 2023
- Publication Type Application of accessibility based methods for vulnerability analysis of strategic road networks 2007-01-24 Paper...10 bytes (20 words) - 09:15, 7 October 2023
- Publication Date of Publication Type Vulnerability analysis of dynamical power networks to stochastic link failure attacks 2017-05-19 Paper...10 bytes (16 words) - 10:04, 7 October 2023
- Publication Date of Publication Type Neural software vulnerability analysis using rich intermediate graph representations of programs 2022-04-14 Paper...10 bytes (18 words) - 14:30, 24 September 2023
- in imprecise data envelopment analysis under perturbations of random subsets of data 2014-06-13 Paper Vulnerability analysis of networks to detect multiphase...10 bytes (18 words) - 11:34, 6 October 2023
- Secure RFID Ultralightweight Authentication Protocol 2011-07-29 Paper Vulnerability analysis of RFID protocols for tag ownership transfer 2010-11-25 Paper Weaknesses...10 bytes (20 words) - 03:19, 12 December 2023
- Date of Publication Type Numerical modeling of tsunamis and tsunami vulnerability analysis for Heraklion, Crete 2018-04-10 Paper Can small islands protect...10 bytes (18 words) - 13:10, 11 December 2023
- Publication Date of Publication Type Vulnerability analysis of interdependent network via integer programming approaches 2021-02-17 Paper https://portal...10 bytes (16 words) - 09:03, 25 September 2023
- Publication Date of Publication Type Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid 2010-12-03 Paper SHOOTING METHODS FOR...10 bytes (16 words) - 03:20, 7 October 2023
- Publication Date of Publication Type Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid 2010-12-03 Paper https://portal.mardi4nfdi...10 bytes (16 words) - 09:02, 7 October 2023
- Network efficiency and vulnerability analysis using the flow‐weighted efficiency measure 2023-11-27 Paper Time-Based Estimation of Vulnerable Points in the Munich...10 bytes (18 words) - 20:59, 26 December 2023
- system's optimum with users' equilibrium 2022-05-20 Paper Dynamic vulnerability analysis of public transport networks: mitigation effects of real-time information...10 bytes (17 words) - 11:10, 6 October 2023
- Publication Date of Publication Type Vulnerability analysis of distributed state estimation under joint deception attacks 2023-09-15 Paper A probabilistic...10 bytes (16 words) - 23:03, 24 September 2023
- Power Flow Models 2021-08-26 Paper Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid 2010-12-03 Paper https://portal.mardi4nfdi...10 bytes (18 words) - 03:20, 7 October 2023