Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
About me
This is a page not in th emain menu
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Short description of portfolio item number 1
Short description of portfolio item number 2
Undergraduate course, Singapore University of Technology and Design, 2018
This course is an introduction to the fundamental principles and techniques of software construction that have greatest impact on practice. Topics include basic concepts of software design, software testing, automated software test generation, automated software security testing via blackbox, greybox and whitebox fuzzing approaches.
Undergraduate Course, Singapore University of Technology and Design, 2018
This course focuses on the design and operation of secure and safe Cyber Physical Systems (CPS). Students will learn (a) the general architecture of CPS in different domains including public infrastructure, (b) control mechanisms and communication protocols in CPS, (c) programming of PLCs, (d) nature and severity of cyber-attacks as well as detection and defence mechanisms.