搜索资源列表
Wormhole_Simulation_Code
- This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.
wormhole
- Worm HoleThis excellent Java Applet displays a swirling worm hole on your page.一个优秀的Java Applet,可以在页面上显示一个旋转的虫孔。-Worm HoleThis excellent Java applet displays a swirling worm hole on your page. An excellent Java Applet, in the pages can be displayed o
worm
- 片上网络,虫洞路由的研究,运行环境为opnet。-On-chip networks, wormhole routing study for the operating environment opnet.
092021230.Rar
- “虫洞”是新一代的"云"服务信息查询软件,能够很好地支持:天气、公交、百科、提问、列车、快递、报价、翻译、余票、运势、笑话、短信、故事、小说、归属、字词典、快讯、凶吉、配对、QQ状态、诗词、NBA战况、条码验证、藏头诗等功能。 -" Wormhole" is a new generation of " cloud" service information software, can support: the weather, public transpo
thesis-1
- A REPORT ON WSN:A Wireless Protocol to Prevent Wormhole Attacks
2
- simulation of wormhole attack
WormHole.tar
- Wormhole attack module.
Wormhole-Ritesh.tar
- WORMHOLE PROGRAM FOR SIMPLE SCINARIO
mha_wh_traces.tar
- NS2 simulation trace files for Multi-Hop count analysis algorithm wormhole detection using False Positive flags and packet drops events
wormhole
- this source code contains wRMHOLE ATACK HAPPENS IN THE WIRELESS SENSOR NETWORK. THIS ATTACK DELAYS THE MESSAGE TRANSMISSION THOUGHOUT THE NETWORK. IN THIS WARM HOLE ATTACK OCCUR ON THE NODE DROPS ALL THE PACKET RECIEVED BY THIS
worm
- 本程序是NS2下虫洞攻击的源码,在NS2下可以模拟虫洞攻击的过程,适合新手学习。-This program is under attack source wormhole NS2, NS2 can simulate the process in the wormhole attack, suitable for beginners to learn.
LCM-MAC.tar
- implementation of wormhole attack in aodv
worm.tar
- This is the NS2 tcl code for implementing Wormhole attack in MANET
Preventing-Method-Of-Wormhole-Attack
- we introduce many types of attack. In many types of attack wormhole attack is more dangerous attack for network because it is very hard to detect. We discussed about a wormhole attack & its models and types. This survey introduces different wormhole
1235231
- 本论文介绍了有关在无线传感器网络中虫洞攻击防御的研究方法-This paper provides information on wireless sensor networks wormhole attack defense research methods
Wormhole-Attack
- detection wormhole attack
yyxzsym
- 语音接口使用的是科大讯飞的云语音接口,具体使用可以到科大讯飞的网站了解,智能语音处理部分使用的是小I聊天机器人的网络接口,以及虫洞的开放API接口,希望能够给大家带来帮助。-Using speech interface is iFLYTEK cloud voice interface, specific use iFLYTEK s Web site to understand, the intelligent voice processing part is small I chat robot
two
- :植物种类识别方法主要是根据叶片低维特征进行自动化鉴定。然而,低维特征不能全面描述叶片信息,识别准确率低,本文提 出一种基于多特征降维的植物叶片识别方法。首先通过数字图像处理技术对植物叶片彩色样本图像进行预处理,获得去除颜色、虫洞、 叶柄和背景的叶片二值图像、灰度图像和纹理图像。然后对二值图像提取几何特征和结构特征,对灰度图像提取 Hu不变矩特征、灰 度共生矩阵特征、局部二值模式特征和 Gabor 特征,对纹理图像提取分形维数,共得到 2183 维特征参数。再采用主成分分析与线性 评判分析相
Sample-code-for-Ns2-Wormhole-attack
- sample NS2 source code(in texe file) that simulate WORMHOLE attack.
wormhole-master
- wormhole attack detection