CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 行业发展研究 搜索资源 - ATTACK

搜索资源列表

  1. SIRB

    0下载:
  2. In this paper it is studied the dynamics of the robotic bird. The system performances are analyzed in terms of time response and robustness. It is study the relation between the angle of attack and the velocity of the bird, the tail influence, the gl
  3. 所属分类:Development Research

    • 发布日期:2017-03-22
    • 文件大小:463.08kb
    • 提供者:MicaelSteel
  1. BiologicalRobot

    0下载:
  2. This paper presents the development of computational simulation and a robotic prototype based on the dynamics of a robotic bird. The study analyze the wing angle of attack and the velocity of the bird, the tail influence, the gliding flight a
  3. 所属分类:Development Research

    • 发布日期:2017-03-27
    • 文件大小:361.29kb
    • 提供者:MicaelSteel
  1. AnAnomalyBasedApproachforIntrusion

    0下载:
  2. A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as normal or anomalous. The XML
  3. 所属分类:Development Research

    • 发布日期:2017-04-01
    • 文件大小:672.4kb
    • 提供者:keerthi
  1. For-WSN-localization-algorithm

    0下载:
  2. 用于无线传感器网络的抗攻击节点定位算法,为提高无线传感器在收到恶意攻击时的节点定位精度-For wireless sensor networks against attacks on node positioning algorithm, to improve the wireless sensor node receives a malicious attack accuracy
  3. 所属分类:Development Research

    • 发布日期:2017-03-31
    • 文件大小:141.62kb
    • 提供者:于洋
  1. mining-anomalies-s

    0下载:
  2. 一个基于熵的大流量攻击检测论文,对于研究网络防护有重要意义-A large flow of entropy-based attack detection papers, research network protection for significant
  3. 所属分类:Development Research

    • 发布日期:2017-04-04
    • 文件大小:280.45kb
    • 提供者:叶子凡
  1. lrdos

    0下载:
  2. Research paper on low-rate DOS attack by Aleksandar Kuzmanovic and Edward W. Knightly
  3. 所属分类:Development Research

    • 发布日期:2017-03-28
    • 文件大小:231.52kb
    • 提供者:grobam
  1. DEFENSES-AGAINST-LARGE-SCALE-ONLINE-PASSWORD-GUES

    0下载:
  2. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACK
  3. 所属分类:Development Research

    • 发布日期:2017-03-28
    • 文件大小:549.81kb
    • 提供者:JP
  1. sfe

    0下载:
  2. 这个文件讲的是黑客攻击的攻篇,有很重要的内容可工学习-This file is about the hacker attack attack articles, very important work to learning
  3. 所属分类:Development Research

    • 发布日期:2017-12-01
    • 文件大小:1.39mb
    • 提供者:张平
  1. dos

    0下载:
  2. 关于DOS攻击早年写的一些文章,给各位做无线DOS攻击一个可行的参考。-DOS attack early years to write some articles for you to do wireless DOS attacks is a viable reference.
  3. 所属分类:Development Research

    • 发布日期:2017-11-18
    • 文件大小:5.48kb
    • 提供者:黄一
  1. Java-Program-Obfuscation-Techniques

    0下载:
  2. 对现有的混淆技术理论、算法、攻击模式和评估进行了综述,展望了软件混淆技术未来的发展与研究方向。-The obfuscation of existing theories, algorithms, and evaluation of attack patterns were reviewed prospected the future development of software obfuscation techniques and research directions.
  3. 所属分类:Development Research

    • 发布日期:2017-04-09
    • 文件大小:610.63kb
    • 提供者:侯璟琨
  1. Detection-of-Syn-Flooding-Attacks-using-Linear-Pr

    0下载:
  2. This paper presents a simple but fast and effective method to detect TCP SYN flooding attacks. Linear prediction analysis is proposed as a new paradigm for DoS attack detection. The proposed SYN flooding detection mechanism makes use of the exp
  3. 所属分类:Development Research

    • 发布日期:2017-05-13
    • 文件大小:3.36mb
    • 提供者:ahmed
  1. Discrete-choice-analysis-of-spatial-attack-sites.

    0下载:
  2. This paper presents an algorithm for the complete specification of multinomial discrete choice models to predict the spatial preferences of attackers. The formulation employed is a modification of models previously applied in transportation flo
  3. 所属分类:Development Research

    • 发布日期:2017-05-02
    • 文件大小:531.45kb
    • 提供者:ahmed
  1. Internet-Threat-Detection--Prediction-and-Relevan

    0下载:
  2. With the development of Internet technology, the popularity of the malicious threat has grown beyond our imagination. The emergence of intelligent, sophisticated attack techniques makes the Internet services more vulnerable than ever, which b
  3. 所属分类:Development Research

    • 发布日期:2017-04-06
    • 文件大小:307.97kb
    • 提供者:ahmed
  1. WSN-AND-APPLICTN.odt

    0下载:
  2. A discr iption of wireless sensing network and its various application and how denial of service attack work
  3. 所属分类:Development Research

    • 发布日期:2017-04-26
    • 文件大小:86.41kb
    • 提供者:sonu
  1. keeloq

    0下载:
  2. Attack against Keeloq cipher
  3. 所属分类:Development Research

    • 发布日期:2017-03-26
    • 文件大小:726.71kb
    • 提供者:killabytenow
  1. SUBMARINE--MOTION--SIMULATION--INCLUDING--ZERO--F

    0下载:
  2. A submarine motion simulation study was performed for the maneuvering character- istics of Draper Laboratories Unmanned Underwater Vehicle (UUV). The Revised StandardSubmarine Equations of Motion (EOM), usually used by the Navy, were augmented to i
  3. 所属分类:Development Research

    • 发布日期:2017-05-14
    • 文件大小:3mb
    • 提供者:joejaidee
  1. Codimension-2-bifurcations-of-periodic-orbits-in-

    0下载:
  2. x and y are the numbers of individuals, respectively of prey and predator populations or suitable (but equivalent) measures of density or biomass. The parameters present in system (1) are the intrinsic growth rate r, the carrying capacity K, the
  3. 所属分类:Development Research

    • 发布日期:2017-04-24
    • 文件大小:487.06kb
    • 提供者:fouzirock
  1. Preventing-Method-Of-Wormhole-Attack

    0下载:
  2. we introduce many types of attack. In many types of attack wormhole attack is more dangerous attack for network because it is very hard to detect. We discussed about a wormhole attack & its models and types. This survey introduces different wormhole
  3. 所属分类:Development Research

    • 发布日期:2017-04-30
    • 文件大小:171.15kb
    • 提供者:manthan
搜珍网 www.dssz.com