A threat actor known as Zestix has been offering to corporate data stolen from dozens of companies likely after breaching ...
Abstract: The data-driven techniques have been developed to deal with the output regulation problem of unknown linear systems by various approaches. In this article, we first extend an existing result ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results