Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
DL : 0
经典缓冲区溢出攻击代码,含有文档。《深入理解计算机系统》一书中提供的例子,我进行了分析和试验,并将试验的结果和心得记录在文档中。欢迎下载-Classic buffer overflow attack code, containing the document.
Update : 2024-05-05 Size : 35840 Publisher : masheng

DL : 0
这写程序是对加水印之后图像的攻击,包括加噪声,各种滤波,剪切,压缩攻击和旋转等。-This writing process is a plus watermark image after the attacks, including the increase in noise, various filtering, shear, compression and rotation attacks.
Update : 2024-05-05 Size : 129024 Publisher : 晁文婷

DL : 0
在DCT域,利用8*8分块DM方法,嵌入隐藏信息。可设置量化步长、选择各种经典的攻击方式和控制攻击强弱。返回误码率和峰值信噪比。利用Matlab编写。-In the DCT domain, the use of 8* 8 block DM methods, embedding hidden information. Quantization step size can be set to choose a variety of classic attacks and control the strength of the attack. Return to the bit error rate and peak signal to noise ratio. Prepared using Matlab.
Update : 2024-05-05 Size : 148480 Publisher : 张湛

DL : 0
利用patchwork方法,嵌入0-1水印。可设置像素修改值、选择各种经典的攻击方式和控制攻击强弱。返回提取的水印信息和峰值信噪比。利用Matlab编写。-The use of patchwork approach, embedding the watermark 0-1. Modify pixel values can be set to choose a variety of classic attacks and control the strength of the attack. Back to extract the watermark information and peak signal to noise ratio. Prepared using Matlab.
Update : 2024-05-05 Size : 108544 Publisher : 张湛

matlabSTDM
DL : 0
利用STDM方法嵌入水印信息,可设置量化步长,选择各种经典的攻击方式,控制攻击强弱,返回误码率和峰值信噪比-Stdm method using embedded watermark information, to set the quantization step size, choose a variety of classic attacks, controlling the strength of the attack and returned to the bit error rate and peak signal to noise ratio
Update : 2024-05-05 Size : 56320 Publisher : 张湛

由高斯正态分布序列产生 ,经(7,4)汉明编码,得到水印信号。能抵抗压缩 滤波等攻击-Sequence generated by the Gaussian normal distribution, with (7,4) Hamming code, the watermark signal. Resistant to compression filtering attack
Update : 2024-05-05 Size : 9216 Publisher : zhangyiyi

DL : 0
(黑客丛书)溢出的艺术。 软件破解及攻击类-(Hackers Books) The Art of overflow. Software crack and attack type
Update : 2024-05-05 Size : 1058816 Publisher : suibianhuang

关于分布式拒绝服务攻击的代码,用与实现对服务器的洪水式攻击,致使其瘫痪。-Distributed denial of service attack on the code, use and implementation of server flood attacks, resulting in their paralysis.
Update : 2024-05-05 Size : 2048 Publisher : wwywts

arp攻击工具,使用了sdk开发包,局域网用的-arp attack tools, the use of the sdk development kit, LAN used
Update : 2024-05-05 Size : 9216 Publisher : zeal

DL : 0
dos c语言代码,dos攻击代码,源ip伪装,多线程。经典dos攻击编程!-dos c language code, dos attack code, the source ip camouflage, multi-threaded. Classic programming dos attack!
Update : 2024-05-05 Size : 11264 Publisher : 康竟淞

SYN-attack,not description-SYN-attack, not description
Update : 2024-05-05 Size : 2048 Publisher : singyea

DL : 0
使用winpcap实现syn攻击,伪造大量随机源地址,十分有效!-WinPcap realize the use of syn attack, a large number of randomly forged source address, very effective!
Update : 2024-05-05 Size : 14336 Publisher : 王然之

DL : 0
CC攻击器,C++写的简单程序CC 攻击器,C++写的简单程序-CC browser attacks, C++ Write a simple browser program CC attack, C++ Write a simple browser program CC attack, C++ Write a simple program
Update : 2024-05-05 Size : 50176 Publisher :

DL : 0
本文设计了一种简单的实用数字水印系统。详细论述了二值数字水印的嵌入与提取算法以及具体实现,并对其抗攻击能力作了一定程度的分析。最后利用MATLAB工具实现了一个简单的基于空域变换与BP神经网络的实用数字水印系统。-In this paper, design a simple and practical digital watermarking system. Discussed in detail binary digital watermark embedding and extraction algorithms as well as the concrete realization, and its anti-attack capability of the analysis to a certain extent. Finally the use of MATLAB tools for the realization of a simple space-based transform and BP neural networks of practical digital watermarking system.
Update : 2024-05-05 Size : 1164288 Publisher : 亓先军

we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, shearing and other common signal attacks. -we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, shearing and other common signal attacks .
Update : 2024-05-05 Size : 1024 Publisher : xiaxianming

DL : 0
一个简单的DDOS攻击程序,仅供各位搞安全的兄弟参考
Update : 2024-05-05 Size : 12429312 Publisher : 123

DL : 0
优化以后的基本内容DDOS攻击程序.附带有使用说明-After optimization of the basic content of DDOS attack procedures. Incidental use has
Update : 2024-05-05 Size : 57344 Publisher : 张晗

进行ARP编程,对于了解网络ARP攻击具有借鉴意义!-Programming for ARP, ARP attack for the understanding of network be learned!
Update : 2024-05-05 Size : 2048 Publisher : 刘建南

DL : 0
局域网扫描+(反)嗅探+欺骗+攻击程序vc源代码-LAN scanning+ (Anti-) sniffer+ Deception+ Attack procedures vc source code
Update : 2024-05-05 Size : 23552 Publisher : 张鹏

DL : 0
SYN-FLOOD攻击源代码。。用C编译-SYN-FLOOD attack the source code. . With C compiler
Update : 2024-05-05 Size : 2048 Publisher : 林新
« 1 2 34 5 6 7 8 9 10 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.