Towards inconspicuous security
This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified a...
Main Author: | Goh, Weihan |
---|---|
Other Authors: | Yeo Chai Kiat |
Format: | Thesis |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/54997 |
Similar Items
-
Inconspicuous Nasoethmoidal Encephalocele Might Be Wrongly
Diagnosed
by: Weng, Jun Tang, et al.
Published: (2016) -
Inconspicuous data augmentation based backdoor attack on deep neural networks
by: Xu, Chaohui, et al.
Published: (2023) -
School cooperative societies in Malaysia: The inconspicuous and unique retail format with promising potentials
by: Ong, L.D., et al.
Published: (2011) -
Threat mitigation in tactical-level disruption tolerant networks
by: Goh, Weihan, et al.
Published: (2013) -
Bunker procurement strategies of liner companies part II financial strategies to tackle volatile bunkers
by: Goh, Weihan.
Published: (2011)