搜索资源列表
Fault-attack-on-the-DVB-Common-Scrambling-Algorit
- Fault attack on the DVB Common Scrambling Algorithm from Kai Wirth
TCP-port-scan-module-of-the-C-attack
- TCP端口扫描模块之C攻击,对于常见的c攻击进行了分析。-TCP port scan module of the C attack
BruteForce
- 基于密码加密的暴力破解法。猜测密码长度,3-6位,并逐一尝试破解,找出正确密码。-Brute-force Search Attack on the Password-based Encryption The program is divided into three parts: encryption, decryption and brute-force attack, which are the three methods
Watermarking-Against-Attack
- 小波和余弦变换的抗几何攻击数字水印算法,Wavelet and Cosine Transform Digital Watermarking Against Geometric Attack-Wavelet and Cosine Transform Digital Watermarking Against Geometric Attack
attack
- ARP攻击基于Winpcap,实验课题。实现中间人攻击和泛洪攻击,注释清晰,程序完整,可以直接运行实现。-ARP attack on Winpcap, experimental subjects. Achieve middle attacks and flooding attacks, comments clear, complete procedures, can be run directly achieved.
gongji
- 数字水印图像的攻击测试 包括滤波、剪切、添加噪声、jepg压缩攻击-Attack test digital watermarking images, including filtering, cropping, adding noise, jepg compression attack, etc.
hacker-attack-and-defense-skills
- 黑客攻防必杀技!2004版,不算太过时。包含密码攻防,病毒攻防,*攻防,浏览安全攻防,系统漏洞攻防,黑客软件攻防等等。好像没有这个资料上传,因而吐血贡献。-Hackers attack and defense! 2004 version, not too old. It contains the password attack and defense, viruses attack and defense, Trojans attac
Label-Based-DV-Hop-Localization-AgainstWormhole-A
- label based dv hop localization against warm hole attack in wireless sensor network
kris-kaspersky-network-attack
- 俄罗斯著名黑客克里斯,卡巴斯基网络攻击技术基础,原版书籍-Chris the famous Russian hacker, Kaspersky network attack techniques based on the original books
IJEST10-02-09-22
- Attack in Ad hoc Network
CC-Attack-Device
- CC Attack Device [Beta version] CC Attack Device [Beta version]-CC Attack Device [Beta version]CC Attack Device [Beta version]
attack
- 虚拟机器人足球比赛的源程序代码,能攻善守-Virtual robot soccer game source code, can be good defensive attack
Network-penetration-Attack
- 黑客的基本攻击方法及原理,以及一些简单软件应用。 网络渗透攻击事件的发生极为普遍,众多的网络管理员和网络安全工作者却对网络安全环境所面临的严峻考验缺乏足够的认识,因而也未曾采取全面的防范补救措施应对各种攻击行为。《孙子兵法》曰“知已知彼,百战不殆;不知彼而知已,一胜一负;不知彼不知已,每战必败”。建立有效的防御体系的惟一障碍是知识的不足。不论你是一位信息安全技术的爱好者、一位IT专家或一名有经验的信息安全实践者,只要你想建立起
Defense-From-syn-a-ping-Flood-attack
- Defense From syn & ping Flood attack
RSA-Attack
- RSA加密算法的基于概率算法的攻击,由N求出PQ。-RSA encryption algorithm based on probabilistic algorithms attack, obtained by N the PQ.
DoS-Attack-NS2
- 本代码是在NS2软件中通过tcl语言实现DoS网络攻击模拟的。-The code is in the NS2software, through the Tcl language to achieve DoS network attack simulation.
Middle-Man-Attack
- Network Attack called Middle Man Attack
2010---A-Literature-Review-of-Security-Attack-in-
- 2010 - A Literature Review of Security Attack in Mobile Ad-hoc Networks
Birthday-Attack
- This Birthday attack document that tells about birthday attack with example.-This is Birthday attack document that tells about birthday attack with example.
Blackhole-attack
- 黑洞攻击的实现,基于AODV协议的,觉得有用可以下载-Realization of the black hole attack based on AODV protocol, find it useful can download and see