Keyphrases
- fault tolerant
- countermeasures
- detecting malicious
- detect malicious
- network intrusion detection systems
- cooperative
- automatic detection
- security threats
- malicious activities
- maximum likelihood
- neural network
- security mechanisms
- chosen plaintext
- denial of service attacks
- traffic analysis
- watermarking technique
- gaussian mixture
- watermarking scheme