All Stories

  1. Identifying Unique Power System Signatures for Determining Vulnerability of Critical Power System Assets
  2. On upper and lower bounds of identifying code set for soccer ball graph with application to satellite deployment