Exploiting structure of chance constrained programs via submodularity
Automatica2019Vol. 105, pp. 89–95
Citations Over TimeTop 19% of 2019 papers
Related Papers
- → AEG: Automatic Exploit Generation(2018)209 cited
- → Exploit Kits: The production line of the Cybercrime economy?(2015)33 cited
- → PExy: The Other Side of Exploit Kits(2014)24 cited
- → AEMB: An Automated Exploit Mitigation Bypassing Solution(2021)5 cited
- Evaluation of Two Host-Based Intrusion Prevention Systems(2005)