Keyphrases
- detect malicious
- malicious code
- detecting malicious
- attack scenarios
- static analysis
- reverse engineering
- countermeasures
- traffic analysis
- malware detection
- microsoft windows
- watermarking algorithm
- intrusion detection system
- anomaly detection
- chosen plaintext
- attack detection
- image watermarking
- database
- terrorist attacks
- cryptographic protocols
- anti virus
- security threats
- java card
- security protocols
- computer security
- security mechanisms
- operating system
- neural network
- data sets