Abstract: With the continuous penetration of large-scale distributed energy resources (DERs) into the distribution network (DN), the DN has acquired the capability to participate in load frequency ...
Abstract: Use-After-Free (UAF) vulnerability is one of the common vulnerabilities in multi-threaded programs. Its static detection methods based on value flow analysis commonly show good analysis ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results