Search Results

Showing 1 - 3 results of 3 for search '"security analysis"', query time: 0.07s Refine Results
  1. 1
  2. 2
    ... estimation are used for realtime security analysis, optimal power flow, etc. These are also used...
    Get access
    Thesis
  3. 3
    by Yan, Junjie, 1982-
    Published 2007
    ..., further architectural optimizations are certainly possible. --Security analysis is an important concern...
    Get access
    Text
Search Tools: Get RSS Feed