搜索资源列表
ibe具有认证功能算法
- 1 Boneh-Franlin的IBE算法主要由四个子算法组成:Setup,Extract,Encrypt和Decrypt,分别完成系统参数建立、密钥提取、加密和解密的功能。假定消息的明文空间为 ,密文空间 。 (1)、建立: 给定一个安全参数 k蝂+ Step 1: 执行G生成一个素数q, 两个q阶群G1, G2 , 和一个可用的双线性映射 ê: G1碐1瓽2。 此外选取G1 任一生成元 P蜧1,再选取两个HASH函数 H3:{ 0, 1}n×{0, 1}n。 -?, H4:。 :{ 0,
dianli
- 神经网络具有以下特性:具有...如何在瞄准攻击系统中用上神经网络的?注意此代码省略了很多与神经网络无关的定义-Neural Networks Management Library
1xy7z.ZIP
- 防窃听攻击的安全网络编码Eavesdropping proof attack on secure network coding-Eavesdropping proof attack on secure network coding
DMClassifier
- 用神经网络实现的数据数据挖掘程序,对软件工程中软件攻击数据分类,进行预测。-Data using neural network data mining program, software engineering software attacks on data classification, to predict.
RS2shouming
- 用于克隆攻击检测,该检测算法每个ID 对应着一个检测节点。每个消息在网络中随即转发很多次。-For cloning attack detection, the detection algorithm to detect each corresponds to a node ID. Each message in the network immediately forwarded many times.
a
- 本代码用于实现雷达网络在遭受欺骗攻击下其性能的下降情况。并附有对应的论文。-The code used to implement the radar network spoofing attack suffered at fall of its properties. Together with the corresponding papers.
MATLAB
- 在无标度的网络中,按节点度的大小从大到小的顺序进行攻击-In scale-free network, according to the size of the node degrees big to small order
code
- 复杂网络攻击策略,包括WS小世界和BA无标度网络的度大和度小攻击-Complex network attack strategies, including WS small-world and scale-free networks BA degree and a small degree of attack
gongji_ER
- 对ER网络的攻击,是研究抗毁性的基础工作-Of the ER network attack, the basic work is the study of invulnerability
xuyigongji
- 复杂网络的蓄意攻击,蓄意攻击是攻击度最大的节点-Deliberate attack complex networks, deliberate attack is an attack of the largest node
gretna_vulnerability
- 计算复杂网络在随机性和目标性攻击下的网络脆弱性- U8BA1 u590D u7401 u7279 u7279 u7279 u7R0
Kohonen
- 基于kohonen网络的DOS攻击检测算法-DOS attack detection algorithm based on Kohonen neural network
BA6
- 展示了如何生成一个随机无标度网络图,基本结构分析,包括度分布、聚类系数等。观察两种类型的攻击对网络的影响:随机攻击(所有的几点有相同的概率从网络中删除)、有目标地选择连接度最大的节点(节点度最大的节点从网络中删除)。(Shows how to generate a random scale-free network graph, basic structural analysis, including degree distribution, clustering coefficients, e
complex network
- 实现复杂网络受随机攻击和蓄意攻击的仿真结果分析。(The simulation results of complex networks subjected to random attacks and deliberate attacks are analyzed.)
新建文件夹
- 这是一个运用matlab实现复杂网络蓄意攻击和随机攻击 的源代码,欢迎下载,可直接调用。(This is a source code which uses MATLAB to realize deliberate attack and random attack on complex network. Welcome to download and call it directly.)
NetAnalyze
- 建立网络,绘制网络图,计算网络抗毁性指标; 在随机攻击和蓄意攻击下,仿真网络抗毁性指标变化情况。(Establish network, draw network diagram and calculate network invulnerability index; Under random attack and intentional attack, the change of network invulnerability index is simulated.)
网络抗毁性,MATLAB仿真
- Matlab中对建立好的网络进行节点/连边随机、蓄意攻击,用最大连通子图、网络效率来衡量网络的抗毁性,并找出最关键的节点的仿真程序。(In MATLAB, the nodes / edges of the established network are attacked randomly and intentionally. The invulnerability of the network is measured by the maximum connectivity sub graph a