CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 搜索资源 - attacks

搜索资源列表

  1. hwb12pdf

    0下载:
  2. 硬盘以及分区结构简介。 硬盘分区表和文件分配表 硬盘只有经过物理格式化,分区,逻辑格式化后才能使用,在进行分区时,FDISK 会在硬盘的0柱面0磁头1扇区建一个64字节的分区表,在分表的前面是主引导记录 (MRB),后面是两个字节的有效标志55H,AAH,(H表示16进制)。此扇区被称为主 引导扇区,也是病毒最爱侵袭的地方,它由主引导记录+分区表+有效标志组成。 分区表对于系统自举十分重要,它规定着系统有几个分区;每个分区的起始及终止 扇区,大小以及是否为活动分区等重要信息。
  3. 所属分类:软件工程

    • 发布日期:2008-10-13
    • 文件大小:739.38kb
    • 提供者:zgb
  1. 10517-080605-0303B01-27

    0下载:
  2. 通过介绍网络上几种常见的攻击方式(电子欺骗攻击、拒绝服务攻击、同步攻击、Web欺骗攻击、密码攻击、木马程序攻击等),然后就这些攻击方式提出相应的防范措施,最后就个人防范网络攻击提出了一些相关的策略。本文从以上方面来阐述在网络给人们带来诸多好处的同时,也带来了一些不可避免的负面影响,本文主要是为了有效地防范网络攻击,维护自己的权益不受侵犯,就需要我们尽量了解网络攻击的各种原理和手段、网络中存在的各种漏洞,以便及时维护我们的系统。 关键字:网络安全,网络攻击,防范措施 -by introdu
  3. 所属分类:软件工程

    • 发布日期:2008-10-13
    • 文件大小:43.08kb
    • 提供者:陆雪
  1. watermark_2

    0下载:
  2. 提出了一种离散小波变换域实现图像水印的方法。这种算法充分利用小波变换的特点,把原始图像及水印图像塔式分解,在多分辨率分解后的相同的频段来嵌入水印信息。该方法也利用了人眼视觉特性,算法简单而有效。实验证明,该算法较好地解决了水印不可见性与鲁棒性之间的矛盾,对常见的水印攻击都有较强的鲁棒性。-presents a discrete wavelet transform domain image watermarking method. This algorithm using wavelet tran
  3. 所属分类:软件工程

    • 发布日期:2008-10-13
    • 文件大小:147.82kb
    • 提供者:yy
  1. 黑客防线2001精华本

    0下载:
  2. 想知道如何防止黑客的攻击吗?这里可以得到你要的答案-want to know how to prevent attacks by hackers yet here you have to be the answer
  3. 所属分类:技术管理

    • 发布日期:2008-10-13
    • 文件大小:5.43mb
    • 提供者:刘111
  1. Hacking-techniques-complete-set

    0下载:
  2. 黑客攻击技术一整套,很好地讲述了黑客攻击的技术,很值得细细学习。-A complete set of hacking techniques, well about the technology of hacker attacks, is worthy of careful study.
  3. 所属分类:Document

    • 发布日期:2017-11-21
    • 文件大小:5.53mb
    • 提供者:shudong
  1. Attacks.tar

    0下载:
  2. A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network applications
  3. 所属分类:software engineering

    • 发布日期:2017-04-26
    • 文件大小:55.2kb
    • 提供者:spider
  1. ieeespm00-evaluation

    0下载:
  2. Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this t
  3. 所属分类:Document

    • 发布日期:2017-04-08
    • 文件大小:25.09kb
    • 提供者:ashraf
  1. ADSL_crack

    0下载:
  2. 介绍了对各种常见品牌的adsl猫的攻击方法!简单实用!-Introduction of a variety of common brands of cat attacks adsl Ways! Simple and practical!
  3. 所属分类:Project Manage

    • 发布日期:2017-04-29
    • 文件大小:296.57kb
    • 提供者:郎咸平
  1. Wavelet_based_full_scale_adaptive_digital_watermar

    0下载:
  2. 自适应全尺度小波数字图像水印.09年5月份 在清华学报出版的。实现大容量的水印嵌入,对于各种攻击的鲁棒性。请大家共享-Full-scale wavelet adaptive digital image watermarking .09 years in May, published in the Journal of Tsinghua University. The realization of large-capacity watermark embedding, the robustne
  3. 所属分类:Project Design

    • 发布日期:2017-05-09
    • 文件大小:1.59mb
    • 提供者:单昊
  1. sensors-09-03958

    0下载:
  2. We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad re
  3. 所属分类:Development Research

    • 发布日期:2017-04-02
    • 文件大小:713.11kb
    • 提供者:sireine
  1. Synchronized-attacks-watermarking

    0下载:
  2. 抗同步攻击鲁棒性数字水印技术研究论文,很具参考价值,值得下载。-Synchronized attacks against digital watermarking technique robust research papers, it is a reference value, it is worth downloading.
  3. 所属分类:Project Design

    • 发布日期:2017-05-20
    • 文件大小:5.4mb
    • 提供者:黄大海
  1. Detection-of-Syn-Flooding-Attacks-using-Linear-Pr

    0下载:
  2. This paper presents a simple but fast and effective method to detect TCP SYN flooding attacks. Linear prediction analysis is proposed as a new paradigm for DoS attack detection. The proposed SYN flooding detection mechanism makes use of the exp
  3. 所属分类:Development Research

    • 发布日期:2017-05-13
    • 文件大小:3.36mb
    • 提供者:ahmed
  1. Prediction-of-past-unsolved-terrorist-attacks

    0下载:
  2. In this study, a novel model is proposed to predict perpetuators of some terrorist events which are remain unsolved. The CPM learns from similarities between terrorist attacks and their crime attributes then puts them in appropriate clusters.
  3. 所属分类:Development Research

    • 发布日期:2017-04-17
    • 文件大小:139.43kb
    • 提供者:ahmed
  1. PACKET-HIDING-WITH-SELECTIVE-JAMMING-ATTACKS

    0下载:
  2. PACKET HIDING WITH SELECTIVE JAMMING ATTACKS
  3. 所属分类:Project Manage

    • 发布日期:2017-04-10
    • 文件大小:1.55mb
    • 提供者:ganapathi
  1. Handling-Various-Attacks---Article-(1)

    0下载:
  2. Handling various attacks in watermarking-Handling various attacks in watermarking...
  3. 所属分类:Development Research

    • 发布日期:2017-04-29
    • 文件大小:134.76kb
    • 提供者:sonam
  1. Defense-Against-Primary-User-Emulation-Attacks-in

    0下载:
  2. This paper considers primary user emulation attacks in cognitive radio networks operating in the white spaces of the digital TV (DTV) band
  3. 所属分类:Communication

    • 发布日期:2017-05-04
    • 文件大小:1.11mb
    • 提供者:walid
  1. Detecting-Primary-User-Emulation-Attacks-in-Cogni

    0下载:
  2. Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) measurements to detect emulato
  3. 所属分类:Communication

    • 发布日期:2017-05-11
    • 文件大小:2.07mb
    • 提供者:walid
  1. MITIGATION-OF-BYZANTINE-ATTACKS-USING-COHEN-KAPPA

    0下载:
  2. MITIGATION OF BYZANTINE ATTACKS USING COHEN KAPPA ALGORITHM
  3. 所属分类:Development Research

    • 发布日期:2017-04-01
    • 文件大小:211.69kb
    • 提供者:kiruko
  1. Reduce-the-Password-Guessing-Attacks-using-Click-

    0下载:
  2. TITLE FOR PASSWORD GUESSING ATTACKS
  3. 所属分类:software engineering

    • 发布日期:2017-04-08
    • 文件大小:531.64kb
    • 提供者:elango
  1. Practical Attacks on the MIFARE Classic

    0下载:
  2. The MIFARE Classic is the most widely used contactless smart card chip in the world. Its communication is based on the open ISO-14443-A standard, but the entire authentication and encryption protocols are proprietary. Several academic researchers h
  3. 所属分类:编程文档

« 12 3 4 5 »
搜珍网 www.dssz.com