搜索资源列表
NBATTACKChina
- NETBOT ATTACK网络僵尸源代码,价值10WRMB,现在免费发布啦-NETBOT ATTACK botnet source code, the value of 10WRMB, now released for free啦
code
- 循环 1,窗口置前 2,模拟TAB键(需要等待sleep) 3,模拟1键普通攻击 4,攻击等待(1000毫秒) //这里是上节课的模拟按键打怪的代码 HWND hwnd hwnd=::FindWindow(NULL,"Element Client") //窗口置前 ::ShowWindow(hwnd,SW_RESTORE) ::SetForegroundWind
LSB
- 本算法是用matalab编写的,主要阐述了抗攻击性的水印算法-Resistance to attack watermarking algorithm is proposed
ARPAttact
- ARP attack,在一个局域网内攻击的小程序-ARP attack, at a LAN attack applet
SIRB
- In this paper it is studied the dynamics of the robotic bird. The system performances are analyzed in terms of time response and robustness. It is study the relation between the angle of attack and the velocity of the bi
qiongqufa
- 穷举法。整钱零找的算法 例如100元可以换出几个10元 几个20元 几个5元-Brute force attack. The whole zero-finding algorithm such as money, 100 yuan to 10 yuan for a few number of 20 yuan a few 5 yuan
BerkeleyDB-0.27.tar
- CCNP\ccnp课件\ISCW\5.消除网络攻击\攻击工具\MAC地址泛洪\dsniffer\BerkeleyDB-0.27.tar.gz-CCNP \ ccnp courseware \ ISCW \ 5. To eliminate network attacks, \ attack tools \ MAC address flooding \ dsniffer \ BerkeleyDB-0.27.tar.gz
LtoLHtoH_svd
- 本算法结合小波变换和SVD奇异值变换,实现了水印的嵌入和提取,载体图像的鲁棒性和水印的不可见性,提取出的水印图像的和原水印图像基本一致,抗攻击性强。-The algorithm combines wavelet transform and SVD singular value transformation, achieved watermark embedding and extraction, vector image waterma
fn_collusion_attack
- Matlab Function of Collusion Attack
ippl-0.13.tar
- network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
jail-1.5.tar
- network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
portsentry-0.90.tar
- network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
Design
- sending intrusion detection for A wireless Intrusion detection system and a new attack model
vm2
- Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet deco
attack.m.tar
- Audio Feature Extraction routine. this routine extracts the attack time of an audio source, by extracting the timing (sample) of the highest peak. The archive inclues a routine to extract the fft and display it. Requir
arp
- ARP攻击包检测代码,获取局域网中的ARP报文,分析是否为攻击报文-Attack code for ARP packet inspection, access to LAN ARP packets to analyze whether the attack packets
0909.0573
- this a paper on minimizing cache timing attack on aes using cache flushing algorithm-this is a paper on minimizing cache timing attack on aes using cache flushing algorithm
chi-square
- chi square attack for steganogrpahy
MFCUK_darkside_0.3
- Darkside attack rfid mifare classic
DCT_SVD
- 本文提出一种在原始视频DCT(离散余弦变换)与SVD(奇异值分解)域自适应嵌入水印的算法。算法首先将视频流分割成一个个场景,场景中的视频图像被变换到DCT-SVD域中,水印量化嵌入在最大奇异上,实现了水印盲检测。同时实验证明该算法在满足透明性要求下也满足一定的鲁棒性要求,能够抵抗低通滤波、中值滤波、椒盐噪声、高斯噪声、H.264压缩攻击以及统计攻击和帧剪切等攻击。-This paper presents an original vide