Keyphrases
- countermeasures
- software systems
- source code
- software projects
- watermarking scheme
- chosen plaintext
- malicious users
- artificial intelligence
- malicious attacks
- traffic analysis
- security risks
- dos attacks
- bug localization
- data corruption
- terrorist attacks
- denial of service attacks
- cryptographic protocols
- security protocols
- watermarking algorithm
- multiscale
- case study
- web services