搜索资源列表
VoIP
- 讲述了voip中的网络安全,比如像通信隐蔽系统,检测隐蔽系统-Described the voip in the network security, such as covert communications systems to detect concealed System
Tunnel-based-on-http
- 本文详细研究了HTTP协议报文的内容,对于HTTP协议 有了全面深入的了解;在此基础上,本文给出了构建HTTP隐蔽通道 的三种通用模型(简单HTTP模型、代理模型、CGI模型)和四种常用 的方法(GET方法、HEAD方法、POST方法、PUT方法)- The thesis structure is as follows: Firstly, this dissertation not only investigates the message structure of
Application-of-HOOK
- 隐蔽通信是继加密技术之后一门新兴的信息传输安全技术.随着互联网的飞速发展,基于网络协议和流媒体的隐蔽通信技术蓬勃发展.论文提出了一种采用HOOK技术.基于目前流行的互联网即时通信软件实现隐蔽通信的基本框架.重点研究了通过HOOK技术复用流媒体的基本方法,以及具体的实现算法,在网络即时通信础上,采用HOOK技术实现了一套端到端的隐蔽通信系统.-Covert communication is the second, after a new encryption technology transfer
NFA-to-DFA
- NFA转化成DFA的课程实验,包括完整的实验理论知识,实验结果以及实验分析-The course experiment of NFA covert to DFA , including the complete experimental theoretical knowledge, experimental analysis and experimental results
04721349
- Speech Based Watermarking for Digital Images This paper presents a novel scheme of watermarking of digital images for copyright protection and authentication. In this paper we proposed a method of embedding owner’s speech signal. Speech being
Capturelive
- For searching covert channel in live packet
Captureliveipv4
- looking for IPV4 covert channel
Capturelivetcp
- looking for TCP covert channel
RechercheCC
- looking for IPV4 covert channel in a given packet
sp_cc
- looking for IPV4 covert channel in a live capture packets