Keyphrases
- code reuse
- source code
- network intrusion detection systems
- detecting malicious
- countermeasures
- malicious activities
- software engineering
- chosen plaintext
- malicious users
- software evolution
- software development
- traffic analysis
- denial of service attacks
- terrorist attacks
- security threats
- watermarking scheme
- anomaly detection
- database systems