Latest version: v0.2.3
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Implementations of the two layer radiative forcing driven models by `Held et al. <https://journals.ametsoc.org/doi/full/10.1175/2009JCLI3466.1>`_ and `Geoffroy et al. <https://journals.ametsoc.org/doi/pdf/10.1175/JCLI-D-12-00195.1>`_
No known vulnerabilities found
Has known vulnerabilities