搜索资源列表
snort-sort
- 入侵检测(Intrusion Detection),它通过对计算机网络或计算机系统中得若干关键点收集信息并对其进行分析,从中发现网络或系统中是否有违反安全策略的行为和被攻击的迹象-IDS (Intrusion Detection), it is through the computer network or computer systems have a number of key in the information collected at and analyze, discover whe
arp
- ARP欺骗攻击程序。Hacker发送伪装的ARP Reply告诉A,计算机B的MAC地址是Hacker计算机的MAC地址。 Hacker发送伪装的ARP Reply告诉B,计算机A的MAC地址是Hacker计算机的MAC地址。 这样A与B之间的通讯都将先经过Hacker,然后由Hacker进行转发。于是Hacker可以捕获到所有A与B之间的数据传输(如用户名和密码)。 -ARP spoofing attack program. Hacker sends fake ARP Reply
Yluomouse
- 天气潮湿导致鼠标左右键触点氧化,单击变多击.此软件用于将短时间内多击判定为单击所用.-Humidity lead to oxidation of the mouse left key contacts, click the change more than hit. This software is used to attack a short time more determined to click used.
8huanghou
- 八皇后问题是一个古老而著名的问题,是回溯算法的典型例题。该问题是十九世纪著名的数学家高斯1850年提出:在8X8格的国际象棋上摆放八个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上,问有多少种摆法。-Eight queens problem is an old and well-known problem is a typical example backtracking algorithm. The problem is that the nineteenth ce
calc2
- 网页游戏修真的攻击计算器。完整源码。 具体内容见使用说明。-Web games XiuZhen for the attack calculator.
AThree-PhaseModelfor
- We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.-We model the hunt as a ga
GoneHuntinModelingOptimal
- We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
PursuitEvasionGames
- We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
TheGeometryandtheGameTheory
- We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
Arp
- delphi ARP攻击源码,包括所有源码和可执行程序-delphi ARP attack source, including all source code and executable programs
ARPATTACK
- 在windows平台下,实现IP冲突与ARP欺骗的功能。-IP Conflict and ARP Attack
Soccerrobotbasedontheshortestpathplanningattacks.r
- 基于时间最短的足球机器人进攻路径规划,:足球机器人 进攻 路径 Bezier 曲线 比赛环境-Soccer robot based on the shortest path planning attacks,: soccer robot attack path Bezier curve game environment
DCTwatermarking
- 基于数字水印算法,包含多种攻击方法,同时兼有脆弱和鲁棒水印。-Based on digital watermarking system, which involves a variety of attack methods, while both fragile and robust watermark.
rsa-cpp
- RSA公钥加密算法是1977年由Ron Rivest、Adi Shamirh和LenAdleman在(美国麻省理工学院)开发的。RSA取名来自开发他们三者的名字。RSA是目前最有影响力的公钥加密算法,它能够抵抗到目前为止已知的所有密码攻击,已被ISO推荐为公钥数据加密标准。RSA算法基于一个十分简单的数论事实:将两个大素数相乘十分容易,但那时想要对其乘积进行因式分解却极其困难,因此可以将乘积公开作为加密密钥。 -Public key encryption algorithm RSA in 1
shouwei
- 一种基于纠错编码的空域自适应水印。嵌入,攻击,提取-an adaptive watermarking based onError correction coding in spatial domain . Embedding, attack, extraction
8_Queens_Game
- 八皇后游戏的说明:问题的提出:八皇后是个古老而有趣的游戏,是由高斯于1850年首先提出的。 要求在国际象棋的棋盘上放置八个皇后,使其不能相互攻击,即任意两个皇后不能处于 棋盘的同一行、同一列和同一条对角线上。试问有多少种放法? 基本思想是:先把皇后放在(0,0)位置,然后把1号皇后放在(1,j)位置,使其满足要求。接着放2号皇后,依此类推。遇到某个皇后如把她无论放在该行的任意 位置均不满足要求,则前一个皇后放置不当,须重新放置前一皇后,如8个皇后均按要 求放置好,这就是一次成
Shark
- 一个鲨鱼攻击猎物的游戏,采用Applet等技术。-A shark attack prey game, with Applet technologies.
bahuanghou
- 八皇后问题是一个古老而著名的问题,是回溯算法的典型例题。该问题是十九世纪著名的数学家高斯1850年提出:在8X8格的国际象棋上摆放八个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上,问有多少种摆法。-Eight queens problem is an old and well-known problem is a typical example backtracking algorithm. The problem is that the nineteenth c
sendpack
- 不断发送SYN握手请求数据包,攻击139端口最有效 DOS攻击-Continue to send SYN handshake request packet, an attacker the most effective DOS attack port 139
AnAnomalyBasedApproachforIntrusion
- A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as normal or anomalous. The XML