Keyphrases
- steady state
- countermeasures
- security threats
- digital image watermarking
- execution model
- genetic algorithm
- watermarking scheme
- digital images
- plan execution
- plan generation
- wireless sensor networks
- block cipher
- traffic analysis
- security risks
- denial of service attacks
- terrorist attacks
- concurrent execution
- malicious users
- data sets