Search Results

Showing 1 - 7 results of 7 for search '"security analysis"', query time: 0.31s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
    by Mohamed, Hany Heidar Hussein
    Published 2015
    ... and it is used in many important projects and products. Security analysis for MongoDB revealed that it doesn’t...
    Get access
    Get access
    Get access
    Get access
    Thesis
  5. 5
    ... estimation are used for realtime security analysis, optimal power flow, etc. These are also used...
    Get access
    Thesis
  6. 6
  7. 7
    by Gibbs, Denis Richard
    Published 2011
    ... methodologies drawn from sector security analysis with essential elements of “externalities” and “Shatterbelts...
    Get access
    Thesis
Search Tools: Get RSS Feed