搜索资源列表
SIRB
- In this paper it is studied the dynamics of the robotic bird. The system performances are analyzed in terms of time response and robustness. It is study the relation between the angle of attack and the velocity of the bird, the tail influence, the gl
BiologicalRobot
- This paper presents the development of computational simulation and a robotic prototype based on the dynamics of a robotic bird. The study analyze the wing angle of attack and the velocity of the bird, the tail influence, the gliding flight a
AnAnomalyBasedApproachforIntrusion
- A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as normal or anomalous. The XML
For-WSN-localization-algorithm
- 用于无线传感器网络的抗攻击节点定位算法,为提高无线传感器在收到恶意攻击时的节点定位精度-For wireless sensor networks against attacks on node positioning algorithm, to improve the wireless sensor node receives a malicious attack accuracy
mining-anomalies-s
- 一个基于熵的大流量攻击检测论文,对于研究网络防护有重要意义-A large flow of entropy-based attack detection papers, research network protection for significant
lrdos
- Research paper on low-rate DOS attack by Aleksandar Kuzmanovic and Edward W. Knightly
DEFENSES-AGAINST-LARGE-SCALE-ONLINE-PASSWORD-GUES
- DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACK
sfe
- 这个文件讲的是黑客攻击的攻篇,有很重要的内容可工学习-This file is about the hacker attack attack articles, very important work to learning
dos
- 关于DOS攻击早年写的一些文章,给各位做无线DOS攻击一个可行的参考。-DOS attack early years to write some articles for you to do wireless DOS attacks is a viable reference.
Java-Program-Obfuscation-Techniques
- 对现有的混淆技术理论、算法、攻击模式和评估进行了综述,展望了软件混淆技术未来的发展与研究方向。-The obfuscation of existing theories, algorithms, and evaluation of attack patterns were reviewed prospected the future development of software obfuscation techniques and research directions.
Detection-of-Syn-Flooding-Attacks-using-Linear-Pr
- This paper presents a simple but fast and effective method to detect TCP SYN flooding attacks. Linear prediction analysis is proposed as a new paradigm for DoS attack detection. The proposed SYN flooding detection mechanism makes use of the exp
Discrete-choice-analysis-of-spatial-attack-sites.
- This paper presents an algorithm for the complete specification of multinomial discrete choice models to predict the spatial preferences of attackers. The formulation employed is a modification of models previously applied in transportation flo
Internet-Threat-Detection--Prediction-and-Relevan
- With the development of Internet technology, the popularity of the malicious threat has grown beyond our imagination. The emergence of intelligent, sophisticated attack techniques makes the Internet services more vulnerable than ever, which b
WSN-AND-APPLICTN.odt
- A discr iption of wireless sensing network and its various application and how denial of service attack work
keeloq
- Attack against Keeloq cipher
SUBMARINE--MOTION--SIMULATION--INCLUDING--ZERO--F
- A submarine motion simulation study was performed for the maneuvering character- istics of Draper Laboratories Unmanned Underwater Vehicle (UUV). The Revised StandardSubmarine Equations of Motion (EOM), usually used by the Navy, were augmented to i
Codimension-2-bifurcations-of-periodic-orbits-in-
- x and y are the numbers of individuals, respectively of prey and predator populations or suitable (but equivalent) measures of density or biomass. The parameters present in system (1) are the intrinsic growth rate r, the carrying capacity K, the
Preventing-Method-Of-Wormhole-Attack
- we introduce many types of attack. In many types of attack wormhole attack is more dangerous attack for network because it is very hard to detect. We discussed about a wormhole attack & its models and types. This survey introduces different wormhole