Welcome![Sign In][Sign Up]
Location:
Search - Attack simulation

Search list

[Internet-Network局域网扫描空密码主机和ftp共享资源

Description: 本安全评估系统通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测,去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。-assessment of the security system of network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack.
Platform: | Size: 552960 | Author: 石林 | Hits:

[Internet-Network网络评估系统

Description: 该项目通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技 术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测, 去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同 时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安 全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。 -the project through the network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack.
Platform: | Size: 1773568 | Author: 大大 | Hits:

[Special Effectsdwt_recover

Description: we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, shearing and other common signal attacks. -we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, shearing and other common signal attacks .
Platform: | Size: 1024 | Author: xiaxianming | Hits:

[P2PANewTrustModelBasedonReputationandRiskEvaluation.r

Description: 针对目前大规模 P2P 系统不能有效处理恶意节点攻击的问题,该文提出一种新的基于信誉与风险评价的 P2P 系统信任模型,该模型考虑到节点的动态行为影响信任度计算的不确定性,引入风险因素,并提出采用信息 熵理论来量化风险,将实体之间的信任程度和信任的不确定性统一起来。仿真试验及分析表明,该信任模型能够有 效识别恶意节点,相比已有的一些信任模型较大程度地提高了系统成功交易率,可以使节点之间更有效地建立信任 关系。 -View of the current large-scale P2P systems can not effectively deal with malicious nodes to attack the problem, the paper presents a new risk assessment based on credibility and trust model of P2P system, the model taking into account the impact of the dynamic behavior of nodes trust the calculation of uncertainty, the introduction of risk factors, and to make use of information entropy theory to quantify the risks, will be the degree of trust between the entities and trust uncertainty unified. Simulation and analysis show that the trust model can effectively identify the malicious node, compared to some of the existing trust model to a greater extent to improve the system the rate of successful transactions, you can make between nodes more effectively to establish a relationship of trust.
Platform: | Size: 97280 | Author: 刘峰 | Hits:

[Other Gamesrobocode-1.7.1-src

Description: Robocode是2001年7月在美国IBM 的Web alphaWorks上发布的坦克机器人战斗仿真引擎。与通常玩的游戏不同的是:参赛者必须利用对机器人进行编程,给机器人设计智能来自动指挥它,而不是由键盘、鼠标简单地直接控制。Robocode是一种有趣的竞赛性编程,使用几行简单的代码,就能够让你创建一个活生生的机器人,一个真正的在屏幕上与其他机器人互相对抗的机器人。你可以看到它在屏幕上四处疾驰,碾碎一切挡道的东西。机器人配有雷达与火炮,选手在躲避对手进攻的同时攻击对手,以此来较量得分的多少。Robocode可以让你在娱乐的同时学习与提高Java技术。-Robocode are in July 2001 at the United States on IBM s Web alphaWorks released fighting robot simulation engine tanks. PLAYING the game and usually are different: the participants must use to program the robot to the design of intelligent robot to automatically command it, and not by the keyboard, mouse, easy to direct control. Robocode is a fun competition of programming, easy to use a few lines of code, we can let you create a living robot, a true up at the screen with other robot robot confrontation with each other. You can see it everywhere on the screen galloped all the way crushing things. Robot is equipped with radar and artillery, attack rival players at the same time to avoid attack opponents in order to contest the number of points. Robocode allows you entertainment at the same time enhance Java technology with the study.
Platform: | Size: 3834880 | Author: jushf | Hits:

[OpenGL program3D

Description: 歼击机协同作战与空空导弹攻击的三维模拟仿真-Fighter aircraft in coordination with the three-dimensional air-to-air missile attack simulation
Platform: | Size: 2075648 | Author: angliang | Hits:

[Windows Developblackholeaodv

Description: 在ns2下仿真AODV路由协议黑洞攻击时使用的脚本程序-the script of simulation AODV routing blackhole attack under the ns2
Platform: | Size: 57344 | Author: fei | Hits:

[source in ebookdos4

Description: Since the first denial of Service (DoS) attack appears, DoS attacks cause significant financial damage every year. The majority researchers focus on detection and respond mechanism of DoS, whereas limited progress has been made in the details of DoS attacks. In this paper, we introduce Custom Audit Scripting Language (CASL) applied to write simulation program for DoS attacks. Then we take a deep research in the methodology of DoS attacks and simulate two typical DoS attacks in CASL. Additionally, recent trends of DoS attacks and problems associated with defending against DoS attacks are also discussed. In short, our simulation attack programs can help examine the nature of DoS attacks and find the corresponding countermeasures
Platform: | Size: 152576 | Author: saksss | Hits:

[OpenGL programcarrier

Description: 在VC++6.0环境下用OPENGL实现了海战场的目标攻击模拟。本程序包括3DMax文件加载,显示;船尾焰绘制等一系列海战场环境的必须元素的绘制和现实源代码。希望对进行这方面研究的人提供帮组。-In VC++6.0 environment to achieve a sea battle with the OPENGL target attack simulation. This process includes 3DMax file loading, display stern flame drawing a series of sea battlefield environment must be drawn and realistic elements in the source code. Want to study in this area to provide help groups.
Platform: | Size: 18255872 | Author: zihuizhang | Hits:

[Industry researchSIRB

Description: In this paper it is studied the dynamics of the robotic bird. The system performances are analyzed in terms of time response and robustness. It is study the relation between the angle of attack and the velocity of the bird, the tail influence, the gliding flight and the flapping flight. In this model, a bird flies by the wind beat motion or using its tail down. The results are positive for the construction of flying robots. The development of computational simulation based on the dynamic of the robotic bird that should allow testing strategies and algorithms of control.
Platform: | Size: 474112 | Author: MicaelSteel | Hits:

[Industry researchBiologicalRobot

Description: This paper presents the development of computational simulation and a robotic prototype based on the dynamics of a robotic bird. The study analyze the wing angle of attack and the velocity of the bird, the tail influence, the gliding flight and the flapping flight with different strategies and algorithms of control. The results are positive for the construction of flying robots and a new generation of airplanes developed to the similarity of flying animals. Some highlights are given about the fist implemented architecture of the structure of a robotic bird. This platform consists on a body, wings and tail with actuators independently controlled though a microcontroller a radio transmission system and batteries are used in order to avoid wired connections between the computer and the robot.-This paper presents the development of computational simulation and a robotic prototype based on the dynamics of a robotic bird. The study analyze the wing angle of attack and the velocity of the bird, the tail influence, the gliding flight and the flapping flight with different strategies and algorithms of control. The results are positive for the construction of flying robots and a new generation of airplanes developed to the similarity of flying animals. Some highlights are given about the fist implemented architecture of the structure of a robotic bird. This platform consists on a body, wings and tail with actuators independently controlled though a microcontroller a radio transmission system and batteries are used in order to avoid wired connections between the computer and the robot.
Platform: | Size: 369664 | Author: MicaelSteel | Hits:

[Windows Developsimulation

Description: 利用弹簧近似和网格重构相结合的非结构动网格技术,耦合求解 Euler方程及弹道方程,模拟飞行在 46千 米高空、0°攻角、马赫数6.5、壳片分离初速分别为 6mPs ,12mPs、壳片分离角速度分别为 0°/s ,50°/s ,150°/s的子母弹 抛壳动态过程。-The use of spring approximation and mesh reconstruction of a combination of non-structural dynamic grid technology, coupled equations for solving Euler equations and ballistics, flight simulation at 46 km altitude, 0 ° angle of attack, Mach 6.5, the shell-chip separation velocity, respectively 6mPs , 12mPs, angular separation of the shell pieces were 0 °/s, 50 °/s, 150 °/s of the cluster bombs thrown shell dynamic process.
Platform: | Size: 471040 | Author: 王顺红 | Hits:

[Crack Hackmatlab

Description: 基于回声隐藏的信息隐藏算法,是一种音频信号的水印技术,包括隐藏信息的嵌入和提取,以及对于噪声,MP3压缩,滤波,重采样和延迟攻击的模拟。-Based on echo hiding information hiding algorithm, is an audio signal watermarking techniques, including embedding and extracting hidden information, as well as for noise, MP3 compression, filtering, resampling and delay attack simulation.
Platform: | Size: 529408 | Author: 张小小 | Hits:

[SCM11

Description: 本文采用了一种层次化、组件自治的仿真平台_J.Sim,对该平台 下的无线传感器网络相关组件进行了扩展。针对MAC协议的能量有效性 和底层可能遭受的攻击行为,进行了一系列的仿真实验,输出了相关的 能耗图。通过与其它MAC能耗仿真结果对比和底层攻击仿真结果分析, 我们得出该协议有着较好的能量有效性和攻击应对能力。-As the hardware platform iS lacked.we choose the J.Sim simulator which is built upon the notion of the autonomous component programming Ⅱ model to test the performance of MAC.As tlle energy efficiency is considered as the most important attribute of one MAC protoc01.we have made some experiments on the attribute.In addition,we simulate some attacks on the bottom—layer,and then test the effect of the early.warning algorithm.In view of the comparison withⅣ认C energy consumption and the attack simulation results,MAC achieves a good energy efficient and bottom.1ayer attack responsibility.
Platform: | Size: 4249600 | Author: 陈过 | Hits:

[Software EngineeringWEB-DOS

Description: 用WEB 压力测试工具模拟请求服务的DOS 攻击.-WEB stress test tools with a request service DOS attack simulation
Platform: | Size: 3021824 | Author: pudn2011 | Hits:

[SCMfira5v5-simulation-source-code

Description: fira5v5仿真源程序,此代码速度非常快,攻击力非常猛。编程者在此基础上肯定能修改出非常好的比赛程序。祝比赛成功!-fira5v5 simulation source code, this code is very fast, very fierce attack. On this basis, the programmer must be able to modify a very good game program. Good game success!
Platform: | Size: 2280448 | Author: | Hits:

[OS programSimulation-of-hacked-servers

Description: 一种模拟攻击网络服务器,攻击网络防火墙的软件测试方案。-A simulated attack Web servers, attacks, network firewall software testing scenarios.
Platform: | Size: 41984 | Author: niedan | Hits:

[matlabTrajectory-simulation-program

Description: 以下是有关弹道方面的一些仿真程序,有关次专业的同僚可一起探讨,为中华之强胜而奋斗 附件包括: 1、战术导弹导弹弹道仿真程序 2、攻击垂直机动目标比例导引三维弹道仿真 3、空地导弹弹道仿真程序 4、倾斜平面三点法攻击机动目标弹道仿真程序-The following is the ballistic aspects of the simulation program, and related sub-professional colleagues can explore China a strong win the struggle Accessories include: A tactical missile missile trajectory simulation program 2, attack vertical maneuvering target ratio of guided three-dimensional trajectory simulation Ground missile trajectory simulation program Inclined plane three-point method to attack maneuvering target trajectory simulation program
Platform: | Size: 20480 | Author: 战斗机 | Hits:

[Internet-NetworkDoS-Attack-NS2

Description: 本代码是在NS2软件中通过tcl语言实现DoS网络攻击模拟的。-The code is in the NS2software, through the Tcl language to achieve DoS network attack simulation.
Platform: | Size: 10240 | Author: 福福 | Hits:

[Special Effectsanti_JPEG_watermark

Description: 本程序为抗JPEG压缩的半脆弱性彩色图像数字水印,主要原理为DCT转换和DCT系数比较法,内含5中攻击仿真测试以及GUI界面,测试环境为MATLAB2009a,系本人2013年本科毕业设计-The procedures for the anti-JPEG compression semi-fragile color image watermarking, the main principle is the DCT transform and DCT coefficients comparative law, including five in the attack simulation testing and GUI interface, the test environment is MATLAB2009a, Department I graduated design 2013
Platform: | Size: 4152320 | Author: hanzitong | Hits:
« 12 3 4 5 »

CodeBus www.codebus.net