Keyphrases
- countermeasures
- anomaly detection
- neural network
- java card
- computer security
- security protocols
- malicious attacks
- database
- watermarking scheme
- security mechanisms
- watermarking algorithm
- dos attacks
- traffic analysis
- security risks
- image watermarking
- cooperative
- information systems
- stream cipher
- malicious users
- chosen plaintext