Login / Signup
A two-step approach to Wasserstein distributionally robust chance- and security-constrained dispatch.
Amin Maghami
Evrim Ursavas
Ashish Cherukuri
Published in:
CoRR (2022)
Keyphrases
</>
robust optimization
information security
access control
computationally efficient
network security
pointwise
security requirements
real time
robust estimation
security issues
computer security
data mining
intrusion detection
post processing
information sharing
security problems