搜索资源列表
dos4
- Since the first denial of Service (DoS) attack appears, DoS attacks cause significant financial damage every year. The majority researchers focus on detection and respond mechanism of DoS, whereas limited progress has been made in the details of
Practical Attack on KeeLoq
- Practical Attack on KeeLoq. KeeLoq, cryptanalysis, block ciphers, slide attacks, meetin- the-middle attacks.
code
- 循环 1,窗口置前 2,模拟TAB键(需要等待sleep) 3,模拟1键普通攻击 4,攻击等待(1000毫秒) //这里是上节课的模拟按键打怪的代码 HWND hwnd hwnd=::FindWindow(NULL,"Element Client") //窗口置前 ::ShowWindow(hwnd,SW_RESTORE) ::SetForegroundWindow(hwnd) //模拟1这个按键。
LSB
- 本算法是用matalab编写的,主要阐述了抗攻击性的水印算法-Resistance to attack watermarking algorithm is proposed
ARPAttact
- ARP attack,在一个局域网内攻击的小程序-ARP attack, at a LAN attack applet
SIRB
- In this paper it is studied the dynamics of the robotic bird. The system performances are analyzed in terms of time response and robustness. It is study the relation between the angle of attack and the velocity of the bird, the tail influence, the gl
qiongqufa
- 穷举法。整钱零找的算法 例如100元可以换出几个10元 几个20元 几个5元-Brute force attack. The whole zero-finding algorithm such as money, 100 yuan to 10 yuan for a few number of 20 yuan a few 5 yuan
BerkeleyDB-0.27.tar
- CCNP\ccnp课件\ISCW\5.消除网络攻击\攻击工具\MAC地址泛洪\dsniffer\BerkeleyDB-0.27.tar.gz-CCNP \ ccnp courseware \ ISCW \ 5. To eliminate network attacks, \ attack tools \ MAC address flooding \ dsniffer \ BerkeleyDB-0.27.tar.gz
LtoLHtoH_svd
- 本算法结合小波变换和SVD奇异值变换,实现了水印的嵌入和提取,载体图像的鲁棒性和水印的不可见性,提取出的水印图像的和原水印图像基本一致,抗攻击性强。-The algorithm combines wavelet transform and SVD singular value transformation, achieved watermark embedding and extraction, vector image watermark robustness and invisibility
fn_collusion_attack
- Matlab Function of Collusion Attack
ippl-0.13.tar
- network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
jail-1.5.tar
- network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
portsentry-0.90.tar
- network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
Design
- sending intrusion detection for A wireless Intrusion detection system and a new attack model
vm2
- Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technol
attack.m.tar
- Audio Feature Extraction routine. this routine extracts the attack time of an audio source, by extracting the timing (sample) of the highest peak. The archive inclues a routine to extract the fft and display it. Requires Voicebox for matlab.
arp
- ARP攻击包检测代码,获取局域网中的ARP报文,分析是否为攻击报文-Attack code for ARP packet inspection, access to LAN ARP packets to analyze whether the attack packets
0909.0573
- this a paper on minimizing cache timing attack on aes using cache flushing algorithm-this is a paper on minimizing cache timing attack on aes using cache flushing algorithm
chi-square
- chi square attack for steganogrpahy
DCT_SVD
- 本文提出一种在原始视频DCT(离散余弦变换)与SVD(奇异值分解)域自适应嵌入水印的算法。算法首先将视频流分割成一个个场景,场景中的视频图像被变换到DCT-SVD域中,水印量化嵌入在最大奇异上,实现了水印盲检测。同时实验证明该算法在满足透明性要求下也满足一定的鲁棒性要求,能够抵抗低通滤波、中值滤波、椒盐噪声、高斯噪声、H.264压缩攻击以及统计攻击和帧剪切等攻击。-This paper presents an original video in the DCT (Discrete Cosine