Abstract: Cybersecurity is gaining a high position in the IT sector. Connecting more devices to the internet smooths the way for hackers. It is hard for signature-based security tools to detect new ...
Abstract: This letter presents a novel approach for reachability analysis of using constrained polynomial logical zonotopes. We perform reachability analysis to compute the set of reachable states ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results