News
Cyber attack techniques in cyberspace are evolving every second, and detecting unknown malicious communication is a challenging task. Pattern-matching-based techniques and using malicious website ...
This paper presents an implementation of the finite-difference time-domain (FD-TD) method in Java using CPML boundary conditions. The FD-TD code was validated with a canonical problem. The performance ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results