| AbstractSecurityAnalysisExecutionInput() |  | 0% | | n/a | 1 | 1 | 8 | 8 | 1 | 1 |
| setOperatorStrategies(List) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
| setActions(List) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
| setMonitors(List) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
| setLimitReductions(List) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
| addResultExtension(String) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| addResultExtensions(Collection) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| addViolationType(LimitViolationType) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| addViolationTypes(Collection) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| addOperatorStrategies(List) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| addActions(List) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| setNetworkVariant(Network, String) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| setContingenciesSource(ByteSource) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| setWithLogs(boolean) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| getContingenciesSource() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| getResultExtensions() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| getViolationTypes() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| getOperatorStrategies() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| getActions() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| getMonitors() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| getLimitReductions() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| getNetworkVariant() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| isWithLogs() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |