CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 编程文档 搜索资源 - Attack

搜索资源列表

  1. breakingwepandwpa

    0下载:
  2. attack again wireless networks
  3. 所属分类:Communication

    • 发布日期:2017-04-25
    • 文件大小:150045
    • 提供者:salbas
  1. teardorp

    0下载:
  2. teardorp攻击描述.采用XLM语言对滴泪攻击经行了形象化得描述。-attack.descr iption the attack of teardorp.
  3. 所属分类:Communication

    • 发布日期:2017-04-05
    • 文件大小:664
    • 提供者:孙南
  1. baogao

    0下载:
  2. 信息安全读书报告 acm会议文章的翻译 保护浏览器以防止跨源CSS攻击-Book report information security conference Texts acm protection to prevent cross-browser CSS attack source
  3. 所属分类:Communication

    • 发布日期:2017-04-16
    • 文件大小:76119
    • 提供者:kobe
  1. 201106006123456

    0下载:
  2. IP欺骗的技术比较复杂,不是简单地照猫画老虎就能掌握,但作为常规攻击手段,有必要理解其原理,至少有利于自己的安全防范,易守难攻嘛。-IP spoofing technique is more complex, not simply according to the tiger cat picture can master, but as a conventional means of attack, it is necessary to understand its principles, at
  3. 所属分类:Communication

    • 发布日期:2017-04-15
    • 文件大小:8021
    • 提供者:finter
  1. Wi-Foo---The-Secrets-of-Wireless-Hacking

    0下载:
  2. The definitive guide to penetrating and defending wireless networks. Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide cover
  3. 所属分类:Communication

    • 发布日期:2017-05-22
    • 文件大小:7049152
    • 提供者:mutu
  1. IJEST10-02-09-22

    0下载:
  2. Attack in Ad hoc Network
  3. 所属分类:Communication

    • 发布日期:2017-03-30
    • 文件大小:393246
    • 提供者:matu76556
  1. jiangzuo

    0下载:
  2. 网络技术以及云计算系列讲解,包括网络攻防,防火墙技术等-Network technology and to explain cloud computing series, including network attack and defense, firewall technology, etc.
  3. 所属分类:Communication

    • 发布日期:2017-06-15
    • 文件大小:23678148
    • 提供者:陈震
  1. 1569490789

    0下载:
  2. 最新认知无线电安全领域的文章,关于PUEA,即是主用户仿真攻击方面的文章,采用MME算法和合作用户选择算法。-the newest article about security in cognitive radio networks, that is Primary User Emulation Attack,short for PUEA. In the article, the MME detection method and the spatial-correlation based
  3. 所属分类:Communication

    • 发布日期:2017-04-16
    • 文件大小:264189
    • 提供者:liufayu
  1. 2

    0下载:
  2. simulation of wormhole attack
  3. 所属分类:Communication

    • 发布日期:2017-04-13
    • 文件大小:3567
    • 提供者:ankit
  1. Analysis-on-Calling-the-Lib

    0下载:
  2. 首先介绍缓冲区溢出机制和基于缓冲区溢出的攻击形式,从C程序员的角度讨论了三类常用的库函数在调用时可能引发的安全问题,并详细分析了缓冲区溢出的内在原因及可能被利用的攻击方法。如果在编程时能针对这些库函数的调用有意识地采取应对措施,无疑将减少缓冲区溢出漏洞,提高程序的安全性能。- Firstly the paper introduces buffer overflow and the potential attack based on it, then from the view of a C pr
  3. 所属分类:Communication

    • 发布日期:2017-03-28
    • 文件大小:168159
    • 提供者:李飞
  1. problems-in-MANET

    0下载:
  2. In this paper Black hole attack problem and it s prevention solution in Mobile Ad-hoc network(Wireless network) during routing has been described.
  3. 所属分类:Communication

    • 发布日期:2017-03-29
    • 文件大小:304419
    • 提供者:dippy
  1. ddddddsssssss

    0下载:
  2. 攻击ip器.攻击ip无忧.易语言源码.攻取ip.也可参考.支持本网站.谢谢合作.本人收徒.学费600.qq307775776-The attack ip. Attacks ip worry-free. Easy language source. Took it ip can refer to support this website. Thank you for your cooperation. And I Shoutu. Tuition 600.qq307775776
  3. 所属分类:Communication

    • 发布日期:2017-11-04
    • 文件大小:1742232
    • 提供者:李磊
  1. double-sql-attack

    0下载:
  2. 双层防御SQL注入攻击的方法 内容翔实算法清晰-Double-layer defense against SQL injection attacks informative algorithm is clear
  3. 所属分类:Communication

    • 发布日期:2017-11-24
    • 文件大小:340980
    • 提供者:sanding
  1. Analysis-of-Emitter-Geolocation-in-Electronic-War

    0下载:
  2. Electronic warfare (EW) refers to any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy assaults via the spectrum. GEOLOCATION is the identification of the real-world
  3. 所属分类:Communication

    • 发布日期:2017-11-03
    • 文件大小:115224
    • 提供者:VINI
  1. 2013Energy-efficient-multipath-data-transfer-sche

    0下载:
  2. this protocol proposes a energy efficient multipath data transfer scheme in wireless sensor networks to address the troubles caused by false data injection attack. This can be done by early detection and filtering of injected false data.
  3. 所属分类:Communication

    • 发布日期:2017-04-03
    • 文件大小:635226
    • 提供者:nassouma
  1. 3MANET-FETR.doc

    0下载:
  2. blackhole attack in manet
  3. 所属分类:Communication

    • 发布日期:2017-05-03
    • 文件大小:757877
    • 提供者:Abhijit
  1. Analysis-of-Primary-User-Emulation-Attack-with-Mo

    0下载:
  2. study primary user emulation attacks (PUEA) issue in a cognitive radio network. Most literatures about the PUEA discuss methods to deal with the attacks in a system model where the positions of the primary user and secondary users are fixed
  3. 所属分类:Communication

    • 发布日期:2017-04-04
    • 文件大小:336311
    • 提供者:walid
  1. algebraic-attack

    0下载:
  2. The secret cipher that secures Mifare Classic RFID tags used in access control systems
  3. 所属分类:Communication

    • 发布日期:2017-04-06
    • 文件大小:77177
    • 提供者:ddimm
  1. paper2

    0下载:
  2. 针对SSH匿名流量的网站指纹攻击方法.pdf-Anonymous traffic sites for SSH fingerprint attack
  3. 所属分类:Communication

    • 发布日期:2017-05-06
    • 文件大小:1056724
    • 提供者:xiaozhang
  1. A-Robust-Physical-Layer

    0下载:
  2. The scrambler attack:a robust physical layer
  3. 所属分类:Communication

    • 发布日期:2017-04-30
    • 文件大小:227937
    • 提供者:秦志杰
« 12 »
搜珍网 www.dssz.com