搜索资源列表
breakingwepandwpa
- attack again wireless networks
teardorp
- teardorp攻击描述.采用XLM语言对滴泪攻击经行了形象化得描述。-attack.descr iption the attack of teardorp.
baogao
- 信息安全读书报告 acm会议文章的翻译 保护浏览器以防止跨源CSS攻击-Book report information security conference Texts acm protection to prevent cross-browser CSS attack source
201106006123456
- IP欺骗的技术比较复杂,不是简单地照猫画老虎就能掌握,但作为常规攻击手段,有必要理解其原理,至少有利于自己的安全防范,易守难攻嘛。-IP spoofing technique is more complex, not simply according to the tiger cat picture can master, but as a conventional means of attack, it is necessary to understand its principles, at
Wi-Foo---The-Secrets-of-Wireless-Hacking
- The definitive guide to penetrating and defending wireless networks. Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide cover
IJEST10-02-09-22
- Attack in Ad hoc Network
jiangzuo
- 网络技术以及云计算系列讲解,包括网络攻防,防火墙技术等-Network technology and to explain cloud computing series, including network attack and defense, firewall technology, etc.
1569490789
- 最新认知无线电安全领域的文章,关于PUEA,即是主用户仿真攻击方面的文章,采用MME算法和合作用户选择算法。-the newest article about security in cognitive radio networks, that is Primary User Emulation Attack,short for PUEA. In the article, the MME detection method and the spatial-correlation based
2
- simulation of wormhole attack
Analysis-on-Calling-the-Lib
- 首先介绍缓冲区溢出机制和基于缓冲区溢出的攻击形式,从C程序员的角度讨论了三类常用的库函数在调用时可能引发的安全问题,并详细分析了缓冲区溢出的内在原因及可能被利用的攻击方法。如果在编程时能针对这些库函数的调用有意识地采取应对措施,无疑将减少缓冲区溢出漏洞,提高程序的安全性能。- Firstly the paper introduces buffer overflow and the potential attack based on it, then from the view of a C pr
problems-in-MANET
- In this paper Black hole attack problem and it s prevention solution in Mobile Ad-hoc network(Wireless network) during routing has been described.
ddddddsssssss
- 攻击ip器.攻击ip无忧.易语言源码.攻取ip.也可参考.支持本网站.谢谢合作.本人收徒.学费600.qq307775776-The attack ip. Attacks ip worry-free. Easy language source. Took it ip can refer to support this website. Thank you for your cooperation. And I Shoutu. Tuition 600.qq307775776
double-sql-attack
- 双层防御SQL注入攻击的方法 内容翔实算法清晰-Double-layer defense against SQL injection attacks informative algorithm is clear
Analysis-of-Emitter-Geolocation-in-Electronic-War
- Electronic warfare (EW) refers to any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy assaults via the spectrum. GEOLOCATION is the identification of the real-world
2013Energy-efficient-multipath-data-transfer-sche
- this protocol proposes a energy efficient multipath data transfer scheme in wireless sensor networks to address the troubles caused by false data injection attack. This can be done by early detection and filtering of injected false data.
3MANET-FETR.doc
- blackhole attack in manet
Analysis-of-Primary-User-Emulation-Attack-with-Mo
- study primary user emulation attacks (PUEA) issue in a cognitive radio network. Most literatures about the PUEA discuss methods to deal with the attacks in a system model where the positions of the primary user and secondary users are fixed
algebraic-attack
- The secret cipher that secures Mifare Classic RFID tags used in access control systems
paper2
- 针对SSH匿名流量的网站指纹攻击方法.pdf-Anonymous traffic sites for SSH fingerprint attack
A-Robust-Physical-Layer
- The scrambler attack:a robust physical layer