CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 搜索资源 - exploits

搜索资源列表

  1. really_hacking_sql

    0下载:
  2. Really Hacking SQL A Power Point Presentation on hacking SQL and Exploits
  3. 所属分类:Document

    • 发布日期:2017-04-23
    • 文件大小:85.4kb
    • 提供者:jcanales
  1. Content-based-Identification-of-Audio-Material-Us

    0下载:
  2. Along with investigating similarity metrics between audio material, the topic of robust matching of pairs of audio content has gained wide interest recently. In particular, if this matching process is carried out using a compact representation
  3. 所属分类:File Formats

    • 发布日期:2017-03-24
    • 文件大小:114.07kb
    • 提供者:ahmed
  1. satellite-links-by-ADS

    0下载:
  2. 基于ADS软件的卫星通信系统仿真平台的搭建-establishes the advanced DSSS signal producing and modulating model, transmitter model, receiver model and other models by provided basic ADS models exploits the new ADS interference producing model and cross relation model
  3. 所属分类:Project Manage

    • 发布日期:2017-03-30
    • 文件大小:230.75kb
    • 提供者:chenwenshi
  1. aircraft

    0下载:
  2. Wireless transmission is ideal in cases where instantaneous or continuous energy transfer is needed, but interconnecting wires are inconvenient, hazardous, or impossible. The tangle of cables and plugs needed to recharge today s electronic gadgets co
  3. 所属分类:Development Research

    • 发布日期:2017-03-30
    • 文件大小:24.59kb
    • 提供者:sree
  1. search-jsp-search-result-60---www.pudn.com

    0下载:
  2. A TV network cynically exploits a deranged ex-TV anchor s ravings and revelations about the media for their own profit.
  3. 所属分类:Communication

    • 发布日期:2017-03-24
    • 文件大小:6.23kb
    • 提供者:pomd
  1. wsn-papers

    0下载:
  2. In this paper, we propose an effective end-to-end virtual path construction system, which exploits path diversity over heterogeneous wireless networks. The goal of the proposed system is to provide a high quality live video streaming service
  3. 所属分类:Communication

    • 发布日期:2017-05-13
    • 文件大小:3.03mb
    • 提供者:Starlin T S
  1. AIX6.1-overflow-exploits-principle

    0下载:
  2. AIX5.3及6.1堆溢出漏洞利用原理分析-AIX5.3 and 6.1 heap overflow exploits the principle of analysis
  3. 所属分类:Project Manage

    • 发布日期:2017-11-21
    • 文件大小:397.08kb
    • 提供者:windy
  1. Java

    0下载:
  2. Java组件高危漏洞 金山毒霸提供应急解决方案,解决用户使用主流浏览器访问攻击者设计含Java漏洞攻击的网页,可能导致计算机被完全控制的问题。 -High-risk vulnerabilities in Java components the Duba provide emergency solutions to solve the user visited an attacker major browsers designed pages with Java exploits may caus
  3. 所属分类:Project Manage

    • 发布日期:2017-11-28
    • 文件大小:125.93kb
    • 提供者:赵莫莫
  1. few2many-pami01

    0下载:
  2. a generative appearance-based method for recognizing human faces under variation in lighting and viewpoint. The method exploits the fact that the set of images of an object in fixed pose, but under all possible illumination conditions, is a convex
  3. 所属分类:software engineering

    • 发布日期:2017-12-04
    • 文件大小:5.41mb
    • 提供者:bobobobo
  1. observers

    0下载:
  2. The first one is used for the full-order observer design and produces an observer that has the same dimension as the original system. The second technique exploits the knowledge of some state space variables available through the output algebraic e
  3. 所属分类:Communication

    • 发布日期:2017-11-19
    • 文件大小:162.47kb
    • 提供者:abdelhedi
  1. Introduction-to-Quantum-Cryptography

    0下载:
  2. Quantum cryptography is a scientific discipline that exploits the laws of quantum mechanics to perform cryptographic tasks, e.g., secure message transmission. It turns out that quantum phenomena are in fact very useful for that purpose: The level
  3. 所属分类:Communication

    • 发布日期:2017-04-08
    • 文件大小:78.63kb
    • 提供者:alim
  1. Cloudauth-RACS-CR

    0下载:
  2. A private cloud provides organizations a secure environment to run business process. It provides a flexible way to extend the working environment. While user mobility has become an important feature for many systems, technologies that provide users
  3. 所属分类:Development Research

    • 发布日期:2017-03-31
    • 文件大小:301.05kb
    • 提供者:ufon
  1. modDRF.pdf

    0下载:
  2. In this paper we present Discriminative Random Fields (DRF), a discrim- inative framework for the classification of natural image regions by incor- porating neighborhood spatial dependencies in the labels as well as the observed data. The proposed mo
  3. 所属分类:software engineering

    • 发布日期:2017-03-30
    • 文件大小:148.02kb
    • 提供者:asdf12341234
  1. 2

    0下载:
  2. In this paper, a new scaling-based image-adaptive watermarking system has been presented, which exploits human visual model for adapting the watermark data to local properties of the host image. Its improved robustness is due to embedding in
  3. 所属分类:Document

    • 发布日期:2017-05-14
    • 文件大小:2.93mb
    • 提供者:atefe
  1. 20111121200818511

    0下载:
  2. 宋太祖赵匡胤(927年-976年11月14日),中国北宋王朝的建立者,庙号太祖,汉族,涿州(今河北)人。出身军人家庭,高祖赵朓,祖父赵敬,赵弘殷次子。948年,投后汉枢密使郭威幕下,屡立战功。-Zhao Kuangyin (927 976 on November 14), the founder of the Northern Song Dynasty China, Temple name Dynasty, Han, Zhuozhou (now Hebei) people. Born in a
  3. 所属分类:IT Hero

    • 发布日期:2017-04-17
    • 文件大小:473.69kb
    • 提供者:xiaosi
  1. [5]-Sensitive-White-Space-Detection-with-Spectral

    0下载:
  2. This paper proposes a novel, highly effective spectrum sensing algorithm for cognitive radio and white space applications. The proposed spectral covariance sensing (SCS) algorithm exploits the different statistical correlations of the received
  3. 所属分类:Communication

    • 发布日期:2017-04-23
    • 文件大小:376.57kb
    • 提供者:elizeu
  1. goddless-mobile-malware-uses-multiple-exploits-to

    0下载:
  2. goddless mobile device security
  3. 所属分类:software engineering

    • 发布日期:2017-05-04
    • 文件大小:301.65kb
    • 提供者:john
  1. Best-of-Bakers-Best-(precision-data-converters).z

    0下载:
  2. Data converters bridge the space between the analog and digital domains in your circuits. This feat is done with analog-to-digital and digital-to-analog converters. With this book chapter, the definition of delta-sigma analog-to-digital converter
  3. 所属分类:Project Design

    • 发布日期:2017-05-07
    • 文件大小:1.2mb
    • 提供者:zzz
  1. 10.1.1.721.1901

    0下载:
  2. The emergence of personal mobile device with low cost sensors, such as accelerometer and digital compass, has made dead-reckoning (DR) an attractive choice for indoor pedestrian tracking. In this paper, we propose a robust DR pedestrian tracking
  3. 所属分类:文章/文档

    • 发布日期:2018-04-22
    • 文件大小:460kb
    • 提供者:SAINATH1
搜珍网 www.dssz.com