YS
Y. Song
info
Please Note
<p>This page displays the records of the person named above and is not linked to a unique person identifier. This record may need to be merged to a profile.</p>
2 records found
1
In the digital age, the proliferation of personal data within databases has made them prime targets for cyberattacks. As the volume of data increases, so does the frequency and sophistication of these attacks. This thesis investigates database security threats by deploying open s
...
In research there is often a need to choose between multiple competing models. Two popular criteria for model selection are the AIC and BIC. The AIC excels in estimating the best model for the unknown data generating process. The BIC on the other hand is consistent in finding the
...