Towards inconspicuous security
This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified a...
Saved in:
Main Author: | Goh, Weihan |
---|---|
Other Authors: | Yeo Chai Kiat |
Format: | Theses and Dissertations |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/54997 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Inconspicuous data augmentation based backdoor attack on deep neural networks
by: Xu, Chaohui, et al.
Published: (2023) -
Towards security and privacy for emerging wireless networks
by: Pham, Thi Ngoc Diep
Published: (2016) -
An Inconspicuous Six-Coordinate Neutral Dy-III Single-Ion Magnet with Remarkable Magnetic Anisotropy and Stability
by: Li, Min, et al.
Published: (2022) -
Threat mitigation in tactical-level disruption tolerant networks
by: Goh, Weihan, et al.
Published: (2013) -
Towards trusted and secure communications in a vehicular environment
by: Tan, Heng Chuan
Published: (2017)