搜索资源列表
MRF2.0
- 马尔科夫随机场,用于计算机视觉,图像分割,目标检测等。-Markov random field, used in computer vision, image segmentation, target detection.
openxfemPP
- OpenXFEM++ with patches for Cygwin or Linux-An object-oriented enriched finite element code that provides a robust tool for simulating fracture using an extended finite element(XFEM)computations. The features of the program include flexibility in the
protocol
- 本文综合了IDS与IPS的特点,将协议分析、网络流量分析与深度包检测技术相结合,提出一个新的网络防御系统一“基于协议分析的网络分布式入侵防御系统(Network Distributed Intrusion Prevention System Base on the Protocol Analysis,NDIPS),同时给出了系统的基本实现,并利用现有仿真条件及网络基 础对部分检测防御技术进行了必要的评测与验证。该系统提高了网络对入侵的实 时阻止能力,提高了网络整体的安全性。-This
File-integrity-testing-procedures
- 基于MD5的文件完整性检测程序,共包含4个文件:md5.h、md5.cpp、test.cpp、nankai.txt。其中md5.h与md5.cpp文件实现了md5类。test.cpp文件包含了整个程序的main函数,根据不同的命令完成不同的功能,如显示摘要信息,生成MD5摘要等。nankai.txt是本书提供的用于验证文件完整性测试文件。读者可以自己编写程序来生成nankai.txt的md5摘要,然后与书中的结果进行比较,验证所编程序的正确性。-MD5 File Integrity based
snort_analysis
- 不错的snort源码分析材料,作者首先介绍了snort原理和架构,然后分析snort源码,对于理解入侵检测很有帮助。-Analysis snort good source material, the author first introduced the principle and structure of snort, and then snort source analysis, intrusion detection helpful for understanding.
usbkey
- 在linux下检测设备插入,如果发现设备, 显示设备相应的信息-The detection device is plugged in linux, if the equipment is found, display the appropriate information
Upancharujiance
- U盘插入弹出检测 易语言源代码-U disk into the source code for easy language pop-up detection
Delphi-Anti-Debug
- 使用Delphi实现的19种反调试检测法源代码-Use Delphi to achieve 19 kinds of anti-debugging detection source code
WSR-88D_CODE_Getting_Started
- WSR-88D雷达编码指引,介绍如何使用code来处理WSR-88D雷达的过程,88D雷达分布范围广,探测精度高,仰角多,比SA雷达数据格式应用更广泛-WSR-88D radar coding guidelines on how to use the code to handle the process of WSR-88D radar, 88D radar and wide distribution, detection, high precision, elevation and more
tcl/ns2/queuing algorithms/tcp/udp
- Compare the three different queuing algorithms Drop tail, Stochastic fair queuing and Random early detection. determine which queuing algorithm gives the least lost packets for the three different queue lengths
TLS_CallBack
- 漫谈TLS_CallBack:原理、编程、手工感染及检测.利用TLS_CallBack(线程局部存储回调函数)玩弄调试器以及感染PE文件.-Talk TLS_CallBack: principles, programming, manual infection and detection. Use TLS_CallBack (thread local storage callback function), as well as playing with the debugger PE file
bpsk
- 循环谱分析信号的主要方法介绍,针对BPSK调制的信号进行检测识别并进行参数估计的原程序-Cyclic spectrum analysis of signals in the primary means of introduction, for BPSK modulation signal detection and parameter estimation to identify the original procedure
Wscan-Gui-Beta7
- Wscan Gui Beta7,web探测,可以批量探测c段,主程序为wwwscan-Wscan Gui Beta7, web detection, can detect c-volume segment, main program for the wwwscan
DES
- 源码包含DES的实现、弱密钥检测、3圈DES差分攻击三个功能,包含一个详细的说明文档-Source code contains the implementation of DES, weak key detection, differential attack three laps DES three features, including a detailed Detailed documentation
labrador-0.9.1.tar
- WEP破解源代码相关,可用于WLAN入侵检测的实验中作为参考数据研究-wep attack and WLAN intrusion detection
139scan
- 一个简单的探测局域网内主机IP的程序-A simple LAN host IP detection procedures
检测重定向
- 显示怎样检测stdin, stdout, stderr是否被重定向- Demonstrated how examines stdin, stdout, stderr whether by heavy direction detection
DES_LAST
- DES完全自己实现!能对输入字符串或者选定实现CBC,CFB-1,-8,-64等模式。算法自带有效率检测函数,运行结束显示系统效率。此源代码完全胜任课程设计,就算是毕业设计也只需进行一点改进。欢迎大家下载!-DES to achieve fully their own! Able to enter the selected string or the realization of CBC, CFB-1,-8,-64, such as model. Efficient detection algo
study_Intrusion_detection_system_onthe_protocol_an
- 论文,《基于协议分析的入侵检测研究与应用》-Papers, based on protocol analysis of intrusion detection research and application
U
- 检测移动盘的源代码-Detection of the source code of the mobile plate