Keyphrases
- end to end
- countermeasures
- traffic analysis
- watermarking scheme
- malicious attacks
- chosen plaintext
- terrorist attacks
- ip networks
- congestion control
- round trip
- signal processing
- security threats
- security protocols
- java card
- cryptographic protocols
- ddos attacks
- security mechanisms
- high speed
- digital watermarking
- dos attacks
- real time
- network management
- watermarking algorithm
- video streaming
- denial of service attacks
- packet loss
- malicious users
- web services
- neural network