Follow

LSTM-based approach to detect cyber attacks on market-based congestion management methods. (arXiv:2109.13312v1 [eess.SY]) arxiv.org/abs/2109.13312

· · feed2toot · 0 · 0 · 0
Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.