Keyphrases
- countermeasures
- source code
- malicious attacks
- software systems
- security mechanisms
- terrorist attacks
- data corruption
- neural network
- malicious users
- data publishing
- traffic analysis
- cyber attacks
- computer security
- watermarking scheme
- denial of service attacks
- security protocols
- attack detection
- digital image watermarking
- anomaly detection