Keyphrases
- ddos attacks
- countermeasures
- denial of service attacks
- multi agent
- digital image watermarking
- malicious attacks
- tuning parameters
- security threats
- parameter tuning
- watermarking algorithm
- image watermarking
- malicious users
- watermarking technique
- computer security
- fine tuning
- physical design
- rule selection
- parameter settings
- information systems
- security vulnerabilities
- case study
- wireless sensor networks
- traffic analysis
- watermarking scheme
- dos attacks