搜索资源列表
TroyHorseSource
- 反向木马源程序,供大家研究,编译出的exe会被防火墙认为木马,编译时需要注意-reverse Trojan source for all research, compile the exe firewall that will be Trojans compile-time attention
pander_kernel_Src
- 熊猫感染的核心代码,一份不错的开源病毒代码,仅供研究只用。有兴趣者可以自己完善它。使用本代码说产生的一切后果与本人和www.pudn.com 无关。 特别提示:请读懂代码后再运行,最好在虚拟机中运行调试。-panda infection core code, a good revenue virus code, only used for research purposes only. Interested persons can improve its own. Use of thi
dminid
- 入侵检测中的数据挖掘方法研究.pdf-A Research into Data Mining Technology in Intrusion Detection. file type pdf
DM642
- 这是一个网络安全的研究方案,内含有源码,以及过程-This is a network security research program, contains source code, and process
paixu
- TD-SCDMA的长期演进TD-LTE。为减轻TD-LTE综测仪开发中调试的复杂性,通过研究分析TD-LTE系统原语,提出了一种基于DSP TMS320C6455和FPGA 5vsx95tff1136(Xilinx)芯片的原语追踪平台。-Long-term evolution of TD-SCDMA, TD-LTE. TD-LTE system primitives through research and analysis in order to reduce the complexity o
CE-to-NP-save
- 过TP工具,最新2013的,无视TX,是研究TX游戏必需品。-A small tool that can ignore the game Tencent protection system is a good tool for research Tencent game
SeasLog-1.1.4
- 用于探索特异木马的构成以及传播的方式,为以后防止有一定的能力-research the construction
snmp-fuzzer-0.1.1.tar
- 国外牛人写的SNMP弱点检查代码,希望对大家有帮助 -Foreign cattle people to write SNMP vulnerability checking code, I hope we learn research
ntp-fingerprint.tar
- ntp弱点检测的代码,研究NTP的朋友可以好好看看 -ntp vulnerability detection code, research NTP friends can have a good look
Steganography-PIT-AMRITSAR
- PIT AMRITSAR IS A NEW RESEARCH GROUP IN MATLAB AND NS2 FOR BETTER CODES
my-research-paper.pdf.tar
- cost of cybercrimes and information insecurity in india
2
- Recent advances in the relevant technologies of contemporary wireless sensor nodes has motivated a growth in the deployment of wireless sensor networks (WSN) for commercial, non-commercial and research applications. In the aforementioned appl