Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
本代码是在NS2软件中通过tcl语言实现DoS网络攻击模拟的。-The code is in the NS2software, through the Tcl language to achieve DoS network attack simulation.
Update : 2024-05-05 Size : 10240 Publisher : 福福

Network Attack called Middle Man Attack
Update : 2024-05-05 Size : 16384 Publisher : vvishal

2010 - A Literature Review of Security Attack in Mobile Ad-hoc Networks
Update : 2024-05-05 Size : 95232 Publisher : Mohamed Abdelshafy

DL : 0
这个文档主要是介绍DDOS工具的几种典型工具,以及每种工具能够进行哪几种攻击-this document introduces several DDOS attack tools, and each tool is capable of what kinds of attacks
Update : 2024-05-05 Size : 73728 Publisher :

This Birthday attack document that tells about birthday attack with example.-This is Birthday attack document that tells about birthday attack with example.
Update : 2024-05-05 Size : 13312 Publisher : Karan D Prajapati

黑洞攻击的实现,基于AODV协议的,觉得有用可以下载-Realization of the black hole attack based on AODV protocol, find it useful can download and see
Update : 2024-05-05 Size : 25600 Publisher : 江先亮

DL : 0
使用WINPCAP编写的ARP攻击,在WIN7下能完美运行,采用VC6.0编译-The the ARP attack use WINPCAP written, under the WIN7 perfect run, VC6.0 compiler
Update : 2024-05-05 Size : 4096 Publisher : zzy

DL : 0
图像的十种攻击方法,包括一些常见的滤波以及加噪-the attack of image
Update : 2024-05-05 Size : 1024 Publisher : 胖虎

Battery-Draining-Denial-of-Service Attack on Bluetooth Devices
Update : 2024-05-05 Size : 98304 Publisher : Sushi

由于Pajek计算出网络没受到攻击网络的最短路径矩阵文件和分别收到不同次攻击后的最短路劲矩阵文件(Shortest Path Length Matrix)。先将其文件(按照攻击的次数命名为:0.txt 、1.txt 、2.txt…)拷贝到该C语言程序同个文件夹中,运行改程序,输入要计算的攻击次和每次攻击的节点数,该程序就会自动收索文件,并完成计算出数据的有效性能模型、平均最短路径和输电效益模型的值在同文件夹里的jieguo.txt中输出。-complexity network degree and betwnness attack
Update : 2024-05-05 Size : 136192 Publisher : 潘高峰

This paper focuses on acoustic (sound) side-channel attack and surveys the methods and techniques employed in the attack we will also see some of the different devices which can be under the threat of such attack and finally countermeasures against this attack, which helps in reducing the risk.-This paper focuses on acoustic (sound) side-channel attack and surveys the methods and techniques employed in the attack we will also see some of the different devices which can be under the threat of such attack and finally countermeasures against this attack, which helps in reducing the risk.
Update : 2024-05-05 Size : 122880 Publisher : dee

该MATLAB代码可以实现一般的YUV攻击测试。-The MATLAB code can achieve a general YUV attack test.
Update : 2024-05-05 Size : 6144 Publisher : 暗藏

这是我做的数字水印算法中的一部分,关于图像攻击测试的几个matlab程序,简单修改就可以直接引用了。-This is the part I do digital watermarking algorithm, image attack test several matlab program, a simple modification can be directly quoted.
Update : 2024-05-05 Size : 1024 Publisher : 韩元超

黑客攻防编程解析,有兴趣的朋友可以下载来看看。-Hacker attack and defense programming resolution, friends who are interested can download to see.
Update : 2024-05-05 Size : 9474048 Publisher : 陈东

arp洪水攻击,对ip地址所在的电脑发送大量的数据包,导致该电脑断网-arp flood attack
Update : 2024-05-05 Size : 6144 Publisher : 田景元

讲解 网页游戏的攻击与防御 用于分析网游游戏-Explain the attack and defense of web games online games for analysis
Update : 2024-05-05 Size : 1827840 Publisher : 蔡生

DL : 0
用于功耗攻击的matlab程序,针对S盒进行攻击-used for power attack
Update : 2024-05-05 Size : 7168 Publisher : hp

This another dictionary attack source. It shows how to break md5.-This is another dictionary attack source. It shows how to break md5.
Update : 2024-05-05 Size : 4096 Publisher : challenger

DL : 0
该书籍介绍了MYSQL数据库的一般知识及如何防御数据库被攻击的问题。-The book describes the general knowledge of MYSQL database and how the database is defensive attack.
Update : 2024-05-05 Size : 5908480 Publisher : 陈晓磊

Linux Firewalls Attack Detection and Response with iptables, psad, and fwsnort
Update : 2024-05-05 Size : 5273600 Publisher : sunil
« 1 2 ... 4 5 6 7 8 910 11 12 13 14 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.