Defend Jamming Attacks: How to Make Enemies Become Friends.
Dinh Thai HoangMohammad Abu AlsheikhShimin GongDusit NiyatoZhu HanYing-Chang LiangPublished in: GLOBECOM (2019)
Keyphrases
- countermeasures
- malicious attacks
- security risks
- chosen plaintext
- security flaws
- watermarking scheme
- attack detection
- image watermarking
- stream cipher
- data sets
- computer security
- search engine
- security threats
- security protocols
- denial of service attacks
- watermarking algorithm
- multiscale
- case study
- differential power analysis