搜索资源列表
ejsr_31_2_01
- paper on Attack on LSB Steganography in Color and Grayscale Images Using Autocorrelation Coefficients
2007511125010716_136Z_Com
- 本代码演示了缓冲区溢出的攻击与防范,运行环境:9x/Me/NT/2000/XP/-This code demonstrates the buffer overflow attack and prevention, operating environment: 9x/Me/NT/2000/XP /
attack-plane
- attack plan simple game bulit under MFC VC6.0
crtav
- 本源代码对嵌有水印的图像进行各种类型的攻击,验证其鲁棒性能。-Source code on the watermarked image various types of attack, verify its robustness.
SOCKET-attack
- socket 攻击程序 c++源代码 dos攻击-c++ socket exploit source code dos attack
charset-attack-in-webapp
- Web应用程序中的字符集攻击 目录 为什么要讨论字符集攻击 字节流和数据的本质 web架构层次 web数据处理流程 字符集处理过程中可能出现的安全问题 web各个层中的字符集攻击 其他可能出现的攻击 在应用程序中避免出现字符集问题 -Web application character set attack Directory Why attack the character set to be discussed Byte str
attack-0.5
- File for Misuse AODV 3
attack-1.0
- File for Misuse AODV 4
attack-1.5
- File for Misuse AODV 5
DES
- This particular algorithm is a brute force attack on the popular DES Encryption standard. The DES algorithm consists of 4 main classes which will be briefly discussed -The first class takes into consideration the assumption that the in the inputs a
memoire_sw_sql_injection
- PROTECTION AGAINST INPUT MANIPULATION VULNERABILITIES IN SERVICE ORIENTED ARCHITECTURE Thesis Submitted in partial fulfillment of the requirements for the degree of MASTER OF TECHNOLOGY in COMPUTER SCIENCE & ENGINEERING – INFORMATION SECURITY by
MM_AlfRealtime
- program simulates the flight of aircraft in the longitudinal plane and displays the graph of the angle of attack
LAN-ARP-attack
- ARP 以后,对整个网络会有点影响,监听也只能监听一部分,不象同一HUB下的监听。对被监听者会有影响,因为他掉了一部分数据。 当然还有其他一些应用,需要其他技术的配合。以下是send_arp.c的源程序 -ARP after a bit of the whole network, monitor only a part of listening, not listening, as under the same HUB. Have an impact on those who are lis
For-WSN-localization-algorithm
- 用于无线传感器网络的抗攻击节点定位算法,为提高无线传感器在收到恶意攻击时的节点定位精度-For wireless sensor networks against attacks on node positioning algorithm, to improve the wireless sensor node receives a malicious attack accuracy
Research-on-Side-Channl-Attack
- 旁道攻击是一种针对密码设备的新型攻击技术。本文介绍旁道攻击技术,描述了旁道攻击技术的发展概况,给出和分析了一种可防旁道攻击的模指算法。-Side channel attack is an attack against the password for the new equipment technology. This article describes the technical side channel attack, describes the technology development
Cube-attack-on-toy
- 对Cube攻击的一些评价,正面和反面的都有-Hundreds of cryptographers were sitting in a dark lecture room at the University of California at Santa Barbara in the morning of Tuesday 19 August 2008 listening eagerly to Adi Shamir s hour-long talk "How to solve it: new tech
mSimpSniffer
- 网络嗅探器无论是在网络安全还是在黑客攻击方面均扮演了很重要的角色。通过使用网络嗅探器可以把网卡设置于混杂模式,并可实现对网络上传输的数据包的捕获与分析。此分析结果可供网络安全分析之用,但如为黑客所利用也可以为其发动进一步的攻击提供有价值的信息。可见,嗅探器实际是一把双刃剑。虽然网络嗅探器技术被黑客利用后会对网络安全构成一定的威胁,但嗅探器本身的危害并不是很大,主要是用来为其他黑客软件提供网络情报,真正的攻击主要是由其他黑软来完成的。而在网络安全方面,网络嗅探手段可以有效地探测在网络上传输的数据包
Fault-attack-on-the-DVB-Common-Scrambling-Algorit
- Fault attack on the DVB Common Scrambling Algorithm from Kai Wirth
TCP-port-scan-module-of-the-C-attack
- TCP端口扫描模块之C攻击,对于常见的c攻击进行了分析。-TCP port scan module of the C attack
Watermarking-Against-Attack
- 小波和余弦变换的抗几何攻击数字水印算法,Wavelet and Cosine Transform Digital Watermarking Against Geometric Attack-Wavelet and Cosine Transform Digital Watermarking Against Geometric Attack