搜索资源列表
information_management_strategy_for_police_service
- This document represents the first stage in a process of taking the National Strategy for Police Information Systems (NSPIS) forward. It defines the mechanisms to ensure that we (and our partners) have access to the right information, in the right fo
SQL INJECTION TUTORIAL
- This tutorial will give you a basic idea on how to hack sites with MySQL injection vulnerability. MySQL database is very common these days and follows by much vulnerability☺. Here we will discuss how to exploit those vulnerabilities manually without
OpenBSD.pdf
- Paper explaining OpenBSD 4.0 remote exploit
WebDAVScanning
- webdav vulc exploit with nmap
Basu-2008-10-02
- Implementing Tabu Search to Exploit Sparsity in ATSP Instances
Spintronics
- Electronic devices that exploit the spin of electrons as well as their charge are poised to overcome a major hurdle that could signal the beginning of an electronics revolution. Spintronics, at the interface between magnetism and electroni
load-balancing
- The interworking between heterogeneous third-generation cellular networks and wireless local area networks is one promising evolution approach to fourth-generation wireless networks, which can exploit the complementary advantages of the cellular netw
A-Taxonomy-and-Adversarial-Model-for
- In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have been put forth to sanitize this sensitive data source in order to
Freq-and-timing-recovery
- 文章介绍了平坦衰落下的频偏和同步联合恢复技术,能够有效应对时变的信道,并且不需要训练序列,给出了详细的仿真和分析,供大家学习-Two open-loop algorithms are developed for esti- mating jointly frequency offset and symbol timing of a linearly modulated waveform transmitted through a frequency-fl at fading
decision-support-system-
- 水电厂优化调度系统是一项复杂的系统工程,目前在水力发电领域,还没有一个系统的、完善的、成熟的解决方案。研究水电厂优化调度系统,必须考虑到市场机制的影响,真正体现价格因素的影响,对提高电网安全稳定水平,优化利用能源资源,全方位努力地开拓发电企业的电力市场、提高经济效益等都具有重要意义。-Optimal dispatching system of hydropower plant is a complex project.Now there is not a systemic,perfect and
A-Bayesian-Approach
- In this paper, we propose a Bayesian methodology for receiver function analysis, a key tool in determining the deep structure of the Earth’s crust.We exploit the assumption of sparsity for receiver functions to develop a Bayesian deconvolution
GLCPOFDM
- AN EFFICIENT FRAMEWORK TO EXPLOIT FREQUENCY DIVERSITY IN OFDM: PRECODING WITH ADAPTIVE SUBCARRIER SELECTION
PDCE2008
- Processor technology addresses power management through efficient design and clock adjustment services • An efficient compiler can reduce size and execution time, both helpful in reducing power consumption • An RTOS can exploit ad
psgroove.tar
- This is the PSGroove, an open-source reimplementation of the psjailbreak exploit for AT90USB and related microcontrollers.
wpes2008
- Recent approaches for protecting information in data out- sourcing scenarios exploit the combined use of access control and cryptography. In this context, the number of keys to be distributed and managed by users can be maintained limited by
0day_2nd
- 本书分为5 篇33章,系统、全面地介绍了Windows 平台缓冲区溢出漏洞的分析、检测与防护。第一篇为漏洞exploit 的基础理论和初级技术,可以引领读者迅速入门;第二篇在第一篇的基础上,结合国内外相关研究者的前沿成果,对漏洞技术从攻、防两个方面进行总结;第三篇站在安全测试者的角度,讨论了几类常用软件的漏洞挖掘方法与思路;第四篇则填补了本类书籍在Windows 内核安全及相关攻防知识这个神秘领域的技术空白;第五篇以大量的0 day案例分析,来帮助读者理解前四篇的各类思想方法。本书可作为网络安全
Optimal-Spectrum-Sensing-Framework-for
- TODAY’S wireless networks are characterized by a static spectrum assignment policy. Recently, due to the increase in spectrum demand, however, this policy is faced with the spectrum scarcity at particular spectrum bands. On the contrary, a la
PCManFtp
- # Exploit Title: joomla component com_civicrm remode code injection exploit
Cooperative-Diversity-using-Soft-Decision-and-Dis
- Cooperative communications techniques exploit the spatial diversity of wireless radio channel by forming antenna arrays in order to achieve Multiple Input Multiple Output (MIMO) performance in multi-user single-antenna environment.
12307---Inconnu(e)
- Local File Inclusion As the title says, this is a "short" and descr iptive guide about various methods to exploit using a local file inclusion (LFI).