CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 搜索资源 - attacks

搜索资源列表

  1. tfn2k.rar

    2下载:
  2. DOS攻击源码,有smurf攻击、SYN FLOOd攻击等,仅供学习研究之用,不可用于违背他人利益,DOS attack source, there are smurf attacks, SYN FLOOd attacks, for study purposes, not for others, contrary to the interests of
  3. 所属分类:Exploit

    • 发布日期:2017-03-23
    • 文件大小:32019
    • 提供者:WLL
  1. watermark

    0下载:
  2. 基于MATLAB环境的图像水印攻击试验源程序-MATLAB-based image watermarking attacks environment test source
  3. 所属分类:Special Effects

    • 发布日期:2017-03-28
    • 文件大小:1409
    • 提供者:shiyun
  1. audiowatermark

    2下载:
  2. 音频水印算法实现,其中包括水印的嵌入,音频水印常用攻击,以及检测算法的实现。-Audio watermarking algorithms, including the watermark embedding, audio watermarking common attacks, and the detection algorithm.
  3. 所属分类:Other systems

    • 发布日期:2017-03-30
    • 文件大小:2026
    • 提供者:王景
  1. DCT

    0下载:
  2. 基于DCT域的鲁棒水印,能抗击一定程度的压缩,剪切等攻击-Based on the DCT domain robust watermarking, can fight against a certain degree of compression, shear, such as attacks
  3. 所属分类:Special Effects

    • 发布日期:2017-03-30
    • 文件大小:43282
    • 提供者:Robin
  1. Attacks.tar

    0下载:
  2. A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network applications
  3. 所属分类:software engineering

    • 发布日期:2017-04-26
    • 文件大小:56526
    • 提供者:spider
  1. DCT-water-print

    0下载:
  2. 实现了添加水印及攻击水印的一些方法。攻击水印方法包括抖动攻击、滤波攻击、旋转攻击等-Add watermark and implementation of a number of methods to attack the watermark. Watermarking attack methods include jitter attacks, filtering attacks, spin attack
  3. 所属分类:Special Effects

    • 发布日期:2017-05-06
    • 文件大小:1371663
    • 提供者:任双印
  1. Checkmark

    0下载:
  2. Checkmark 是数字水印中应用的攻击测试软件,是每个在做数字水印的人的必须使用的工具,这个文章告诉你怎么使用checkmark-Checkmark is the application of digital watermarking attacks testing software, are each at digital watermarking to do the people have to use a tool, this article tell you how to use c
  3. 所属分类:Special Effects

    • 发布日期:2017-04-25
    • 文件大小:242508
    • 提供者:lee
  1. xiaobobian

    0下载:
  2. 本代码是一些关于水印处理的一些算法用小波变换来实现,在嵌入水印之后用各种攻击检验算法的鲁棒性-The code is some deal about a number of watermarking algorithm using wavelet transform to achieve, in the embedded watermark after the attacks with a variety of test algorithm robustness
  3. 所属分类:Wavelet

    • 发布日期:2017-04-25
    • 文件大小:13828
    • 提供者:刘林冲
  1. LANShield2.0

    0下载:
  2. LANShield是一款本人自己写的网络防火墙程序,LAN Shield 2.0.rar为主程序源码,开发环境为VS2005;MyFireWallLSP.rar为过滤模块;   Server为服务器源码,Java编写,非阻塞模式。      软件功能:   1.有效拦截局域网内的ARP攻击,并具有保护网关功能   2.可配合服务器端,更有效管理局域网网络   3.自带应用层过滤模块,有效控制本机进程的网络访问   4.自带攻击模块,用于反击,包含所有AR
  3. 所属分类:Firewall-Security

    • 发布日期:2017-05-09
    • 文件大小:1946985
    • 提供者:agang
  1. stirmark

    0下载:
  2. 实现对数字水印各种攻击的软件。刚才已经上载过了,但由于一直没得到回应。麻烦站长审核通过,急需一些代码做毕设。。。非常感谢。-To achieve a variety of attacks on digital watermarking software. Have already been uploaded, but no response has been. Trouble station approved, completion of an urgent need to do some se
  3. 所属分类:Graph program

    • 发布日期:2017-05-13
    • 文件大小:3317437
    • 提供者:mhh
  1. sensors-09-03958

    0下载:
  2. We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad re
  3. 所属分类:Development Research

    • 发布日期:2017-04-02
    • 文件大小:730224
    • 提供者:sireine
  1. CollectionsofWaterMarkingAttack

    0下载:
  2. 关于各种数字水印攻击的MATLAB代码,可以用于仿真实验,调用方便简单-Digital watermarking attacks on a variety of MATLAB code that can be used for simulation experiments, to facilitate a simple call to
  3. 所属分类:matlab

    • 发布日期:2017-04-02
    • 文件大小:799
    • 提供者:liguoliang
  1. AnIntroductiontoWatermarkRecoveryfromImages

    0下载:
  2. 简要地讨论了在数字图像恢复水印方法,并且提出相关的当前和今后的安全信息系统(CSIS)工作中心。-briefly discuss a method of recovering watermarks in digital images after such attacks and introduce related current and future work in the Center for Secure Information Systems (CSIS).
  3. 所属分类:Graph program

    • 发布日期:2017-04-03
    • 文件大小:845777
    • 提供者:丫丫
  1. ABufferOverflowStudyAttacksandDefenses

    0下载:
  2. A Buffer Overflow Study - Attacks and Defenses 一本介绍缓冲区溢出非常好的书,讲解详细,通俗易懂,是值得收藏的好资料-A Buffer Overflow Study- Attacks and Defenses 1 describes a buffer overflow very good book, explained in detail, easy to understand, is worthy of a good collection of i
  3. 所属分类:matlab

    • 发布日期:2017-04-04
    • 文件大小:350562
    • 提供者:ss
  1. DCT_watermarking_System

    0下载:
  2. A gr8 Adaptive DCT based watermarking system is implemented with a nice GUI for embedding, extraction and attacks
  3. 所属分类:matlab

    • 发布日期:2017-04-08
    • 文件大小:533373
    • 提供者:adeel
  1. Hacker-and-attacks-techniques

    0下载:
  2. 这是一些黑客与攻击技术,网络安全方面的技术。-This is the number of hackers and attacks technology, network security technology.
  3. 所属分类:Internet-Socket-Network

    • 发布日期:2017-04-09
    • 文件大小:2570028
    • 提供者:wanghuahua
  1. HackingExposed10

    0下载:
  2. HACKING IIS 5 IISsecurity exploits have enjoyed a long,rich tradition. Microsoft’s flag ship Webserver platform has been plagued by such vulnerabilities as source code revelati on attacks like-HACKING IIS 5 IISsecurity exploits have enjoyed a l
  3. 所属分类:Windows Develop

    • 发布日期:2017-05-06
    • 文件大小:1068282
    • 提供者:samshop
  1. attack

    0下载:
  2. this file explains attacks on AODV
  3. 所属分类:Linux Network

    • 发布日期:2017-04-13
    • 文件大小:2367
    • 提供者:VIP
  1. Synchronized-attacks-watermarking

    0下载:
  2. 抗同步攻击鲁棒性数字水印技术研究论文,很具参考价值,值得下载。-Synchronized attacks against digital watermarking technique robust research papers, it is a reference value, it is worth downloading.
  3. 所属分类:Project Design

    • 发布日期:2017-05-20
    • 文件大小:5657672
    • 提供者:黄大海
  1. Attacks

    0下载:
  2. Check mark Attacks for watermarking
  3. 所属分类:其他

    • 发布日期:2017-12-24
    • 文件大小:171008
    • 提供者:peyman ayubi
« 12 3 4 5 6 7 8 9 10 ... 40 »
搜珍网 www.dssz.com