Welcome![Sign In][Sign Up]
Location:
Search - attack

Search list

[Internet-NetworkDoS-Attack-NS2

Description: 本代码是在NS2软件中通过tcl语言实现DoS网络攻击模拟的。-The code is in the NS2software, through the Tcl language to achieve DoS network attack simulation.
Platform: | Size: 10240 | Author: 福福 | Hits:

[OS programMiddle-Man-Attack

Description: Network Attack called Middle Man Attack
Platform: | Size: 16384 | Author: vvishal | Hits:

[OS program2010---A-Literature-Review-of-Security-Attack-in-

Description: 2010 - A Literature Review of Security Attack in Mobile Ad-hoc Networks
Platform: | Size: 95232 | Author: Mohamed Abdelshafy | Hits:

[OtherDOS-attack-tool

Description: 这个文档主要是介绍DDOS工具的几种典型工具,以及每种工具能够进行哪几种攻击-this document introduces several DDOS attack tools, and each tool is capable of what kinds of attacks
Platform: | Size: 73728 | Author: | Hits:

[File FormatBirthday-Attack

Description: This Birthday attack document that tells about birthday attack with example.-This is Birthday attack document that tells about birthday attack with example.
Platform: | Size: 13312 | Author: Karan D Prajapati | Hits:

[Internet-NetworkBlackhole-attack

Description: 黑洞攻击的实现,基于AODV协议的,觉得有用可以下载-Realization of the black hole attack based on AODV protocol, find it useful can download and see
Platform: | Size: 25600 | Author: 江先亮 | Hits:

[OtherARP-ATTACK

Description: 使用WINPCAP编写的ARP攻击,在WIN7下能完美运行,采用VC6.0编译-The the ARP attack use WINPCAP written, under the WIN7 perfect run, VC6.0 compiler
Platform: | Size: 4096 | Author: zzy | Hits:

[Picture Viewerattack

Description: 图像的十种攻击方法,包括一些常见的滤波以及加噪-the attack of image
Platform: | Size: 1024 | Author: 胖虎 | Hits:

[Successful incentiveBattery-Draining-Denial-of-Service-Attack-on-Blue

Description: Battery-Draining-Denial-of-Service Attack on Bluetooth Devices
Platform: | Size: 98304 | Author: Sushi | Hits:

[Windows Developnode-attack

Description: 由于Pajek计算出网络没受到攻击网络的最短路径矩阵文件和分别收到不同次攻击后的最短路劲矩阵文件(Shortest Path Length Matrix)。先将其文件(按照攻击的次数命名为:0.txt 、1.txt 、2.txt…)拷贝到该C语言程序同个文件夹中,运行改程序,输入要计算的攻击次和每次攻击的节点数,该程序就会自动收索文件,并完成计算出数据的有效性能模型、平均最短路径和输电效益模型的值在同文件夹里的jieguo.txt中输出。-complexity network degree and betwnness attack
Platform: | Size: 136192 | Author: 潘高峰 | Hits:

[Documentspaper-on-Acoustic-side-channel-attack

Description: This paper focuses on acoustic (sound) side-channel attack and surveys the methods and techniques employed in the attack we will also see some of the different devices which can be under the threat of such attack and finally countermeasures against this attack, which helps in reducing the risk.-This paper focuses on acoustic (sound) side-channel attack and surveys the methods and techniques employed in the attack we will also see some of the different devices which can be under the threat of such attack and finally countermeasures against this attack, which helps in reducing the risk.
Platform: | Size: 122880 | Author: dee | Hits:

[Video Captureyuv-attack

Description: 该MATLAB代码可以实现一般的YUV攻击测试。-The MATLAB code can achieve a general YUV attack test.
Platform: | Size: 6144 | Author: 暗藏 | Hits:

[Special EffectsDigital-watermarking-attack-testing

Description: 这是我做的数字水印算法中的一部分,关于图像攻击测试的几个matlab程序,简单修改就可以直接引用了。-This is the part I do digital watermarking algorithm, image attack test several matlab program, a simple modification can be directly quoted.
Platform: | Size: 1024 | Author: 韩元超 | Hits:

[OtherHacker-attack-and-defense

Description: 黑客攻防编程解析,有兴趣的朋友可以下载来看看。-Hacker attack and defense programming resolution, friends who are interested can download to see.
Platform: | Size: 9474048 | Author: 陈东 | Hits:

[Internet-Networkarp-flood-attack

Description: arp洪水攻击,对ip地址所在的电脑发送大量的数据包,导致该电脑断网-arp flood attack
Platform: | Size: 6144 | Author: 田景元 | Hits:

[VC/MFCWeb-games-attack-and-defense

Description: 讲解 网页游戏的攻击与防御 用于分析网游游戏-Explain the attack and defense of web games online games for analysis
Platform: | Size: 1827840 | Author: 蔡生 | Hits:

[Crack HackDPA-attack

Description: 用于功耗攻击的matlab程序,针对S盒进行攻击-used for power attack
Platform: | Size: 7168 | Author: hp | Hits:

[Crack Hackmd5-dictionary-attack

Description: This another dictionary attack source. It shows how to break md5.-This is another dictionary attack source. It shows how to break md5.
Platform: | Size: 4096 | Author: challenger | Hits:

[OtherMYSQL-attack

Description: 该书籍介绍了MYSQL数据库的一般知识及如何防御数据库被攻击的问题。-The book describes the general knowledge of MYSQL database and how the database is defensive attack.
Platform: | Size: 5908480 | Author: 陈晓磊 | Hits:

[OtherLinux-Firewalls-Attack-Detection-and-Response-wit

Description: Linux Firewalls Attack Detection and Response with iptables, psad, and fwsnort
Platform: | Size: 5273600 | Author: sunil | Hits:
« 1 2 ... 4 5 6 7 8 910 11 12 13 14 ... 50 »

CodeBus www.codebus.net