搜索资源列表
SW_Network Attack and Defence
- 网络攻击与防护概念性内容,包括前言,网络安全和风险分析,以后更新-network attack and defense conceptual content, including the foreword, network security and risk analysis, future updates
Syn-attack.c.tar
- SYN-attack,not descr iption
Attack
- 这软件是为了攻击对方计算机的。 用这个软件可以给对方电脑系统添麻烦。-this software is to attack the enemy's computer. This software can be used to the other computer system trouble.
Sudden Attack Game Engine SourceCode
- Full c++ game engine sourcecode for sudden attack game.
Cube-attack-on-Trivium
- 对Trivium算法和其简化版本的Cube攻击-Cube attack on Trivuim algrithm
blackholeaodv
- 在ns2下仿真AODV路由协议黑洞攻击时使用的脚本程序-the scr ipt of simulation AODV routing blackhole attack under the ns2
hundun_svd_0525
- 效果非常好的数字水印的源代码,实现了基于小波变换的奇异值分解算法,选取载体图像的LH子带作为载体,并进行攻击测试算法性能-The effect of a very good source of digital watermarking, wavelet transform based on the realization of the singular value decomposition algorithm, select the carrier of the LH sub-band ima
LSB
- 本算法是用matalab编写的,主要阐述了抗攻击性的水印算法-Resistance to attack watermarking algorithm is proposed
ARPAttact
- ARP attack,在一个局域网内攻击的小程序-ARP attack, at a LAN attack applet
arp
- ARP攻击包检测代码,获取局域网中的ARP报文,分析是否为攻击报文-Attack code for ARP packet inspection, access to LAN ARP packets to analyze whether the attack packets
ejsr_31_2_01
- paper on Attack on LSB Steganography in Color and Grayscale Images Using Autocorrelation Coefficients
2007511125010716_136Z_Com
- 本代码演示了缓冲区溢出的攻击与防范,运行环境:9x/Me/NT/2000/XP/-This code demonstrates the buffer overflow attack and prevention, operating environment: 9x/Me/NT/2000/XP /
SOCKET-attack
- socket 攻击程序 c++源代码 dos攻击-c++ socket exploit source code dos attack
MM_AlfRealtime
- program simulates the flight of aircraft in the longitudinal plane and displays the graph of the angle of attack
Cube-attack
- Cube 攻击的几篇文章,Cube Attack由Itai Dinur 和Adi Shamir于2008年提出。这种攻击并不是全新的,但是它把以前多种启发式攻击的技巧综合起来,仔细分析了攻击未知的、随机的主多项式成功的复杂度和成功概率。-Some papers of Cube attack,Cube attacks work well for random polynomials of small degree. Real-world ciphers, when viewed as polyno
Cube-attack-on-toy
- 对Cube攻击的一些评价,正面和反面的都有-Hundreds of cryptographers were sitting in a dark lecture room at the University of California at Santa Barbara in the morning of Tuesday 19 August 2008 listening eagerly to Adi Shamir s hour-long talk "How to solve it: new tech
CC-Attack-Device
- CC Attack Device [Beta version] CC Attack Device [Beta version]-CC Attack Device [Beta version]CC Attack Device [Beta version]
node-attack
- 由于Pajek计算出网络没受到攻击网络的最短路径矩阵文件和分别收到不同次攻击后的最短路劲矩阵文件(Shortest Path Length Matrix)。先将其文件(按照攻击的次数命名为:0.txt 、1.txt 、2.txt…)拷贝到该C语言程序同个文件夹中,运行改程序,输入要计算的攻击次和每次攻击的节点数,该程序就会自动收索文件,并完成计算出数据的有效性能模型、平均最短路径和输电效益模型的值在同文件夹里的jieguo.txt中输出。-complexity network degree an
ARP-ATTACK
- 使用WINPCAP编写的ARP攻击,在WIN7下能完美运行,采用VC6.0编译-The the ARP attack use WINPCAP written, under the WIN7 perfect run, VC6.0 compiler
attack
- 随机蓄意攻击对比 攻击效果对比的图形 最后还有半数致死量(random attack and on purpesrandom attack and on purpesrandom attack and on purpes)