搜索资源列表
i_love_you
- 这是一个心怀鬼胎的恶意程序,里面有源码,该源码仅供读者用作学习使用.-This is a malicious program心怀鬼胎inside source, the only source for learning to use the reader.
ANewTrustModelBasedonReputationandRiskEvaluation.r
- 针对目前大规模 P2P 系统不能有效处理恶意节点攻击的问题,该文提出一种新的基于信誉与风险评价的 P2P 系统信任模型,该模型考虑到节点的动态行为影响信任度计算的不确定性,引入风险因素,并提出采用信息 熵理论来量化风险,将实体之间的信任程度和信任的不确定性统一起来。仿真试验及分析表明,该信任模型能够有 效识别恶意节点,相比已有的一些信任模型较大程度地提高了系统成功交易率,可以使节点之间更有效地建立信任 关系。 -Vi
15page.summary.of.malicious.code
- 15种网页恶意代码的总结,仅供学习和防范。-15 page summary of malicious code, only to learn and to guard against.
malicious.tar
- Malicious Cryptography. Excellent book on how to write cryptographic virii to attack systems. Malicious uses of cryptography.
mal-url-icml09
- 一篇讲解恶意URL检测的好 是信息安全的研究人员的很好的参考材料 -Explain the detection of a malicious URL is a good information security researchers a good reference material
A-malicious-attacker-
- ,恶意攻击者很可能获得SQL Server 弱口令,获得SA 的弱口令的话我们 很大程度上可以获得系统管理员的权限,前提是对方的SQL 服务器是在系统权限下安装的- A malicious attacker is likely to get SQL Server weak password, access to SA' s weak passwords, then we can get a large extent the s
decisive-battle-malicious-code
- 斯考迪斯《决战恶意代码》 PDF扫描版 仅供学习参考-Scaw diss " decisive battle malicious code" PDF scanned version of the
analyzing-malicious-document-files
- analyzing malicious document files
detect-malicious-nodes-incollabarative-spectrun-s
- this ppaper contains malicious nodes in collabarative spectrum sensing
Kaspersky-Intro-to-Malicious-Code-Detection-Techn
- Just like every other type of technology, malicious code has grown increasingly sophisticated and complex. The antivirus industry must try to stay one step ahead, especially since it is often easier to produce malicious
malicious-tcl
- malicious node tcl file download
aodv-malicious-examples.tar
- adding malicious nodes into existing aodv protocol in ns2
Prevention-Webpage-malicious-code
- 可以学到别人的网页制作技术,更可以事先预防恶意代码,一举两得!-You can learn Webpage production technology of others, but also in advance to prevent malicious code, shoot two hawks with one arrow!
Malicious-code-analysis-example
- 本书是用实例来分析相关软件恶意代码的方法和技巧-This book is the method and technique of using examples to analysis software of malicious code
Malicious
- code to create malicious node
malicious
- to introduce malicious node in the network in ns2.
malicious-codes
- analysis of malicious nodes in wireless sensor networks
Detecting-Malicious-Packet-Losses
- Detection of malicious packets losses
Detecting-Malicious-Facebook-Application
- Documentation of Detecting Malicious Facebook Application.
wireless-aodv-malicious
- MALICIOUS NODE DROPPING PACKET IN AODV PROTOCOL