Abstract: As cyber-attack techniques become increasingly sophisticated, cyber threat intelligence has emerged as a crucial resource for cybersecurity defense. However, the vast and fragmented nature ...
Abstract: It is time-consuming to obtain performance metrics for feasible topologies during the design of power electronic converters. This article proposes a graph-theory-based algorithm that ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results