CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 行业发展研究 搜索资源 - attacks

搜索资源列表

  1. sensors-09-03958

    0下载:
  2. We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad re
  3. 所属分类:Development Research

    • 发布日期:2017-04-02
    • 文件大小:713.11kb
    • 提供者:sireine
  1. AnAnomalyBasedApproachforIntrusion

    0下载:
  2. A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown attacks can be detected. The system relies on a XML file to classify the incoming requests as normal or anomalous. The XML
  3. 所属分类:Development Research

    • 发布日期:2017-04-01
    • 文件大小:672.4kb
    • 提供者:keerthi
  1. shanote

    0下载:
  2. Collision Search Attacks on SHA1 Xiaoyun Wang∗ Yiqun Lisa Yin† Hongbo Yu‡ February 13, 2005-Collision Search Attacks on SHA1 Xiaoyun Wang∗ Yiqun Lisa Yin† Hongbo Yu‡ February 13, 2005
  3. 所属分类:Development Research

    • 发布日期:2017-03-27
    • 文件大小:36.84kb
    • 提供者:Latigido922
  1. For-WSN-localization-algorithm

    0下载:
  2. 用于无线传感器网络的抗攻击节点定位算法,为提高无线传感器在收到恶意攻击时的节点定位精度-For wireless sensor networks against attacks on node positioning algorithm, to improve the wireless sensor node receives a malicious attack accuracy
  3. 所属分类:Development Research

    • 发布日期:2017-03-31
    • 文件大小:141.62kb
    • 提供者:于洋
  1. A-Taxonomy-and-Adversarial-Model-for

    0下载:
  2. In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have been put forth to sanitize this sensitive data source in order to
  3. 所属分类:Development Research

    • 发布日期:2017-03-24
    • 文件大小:513.06kb
    • 提供者:张倩倩
  1. v46-112

    0下载:
  2. The aim of this article is to explain how features of attacks could be extracted from the packets. It also explains how vectors could be built and then applied to the input of any analysis stage
  3. 所属分类:Development Research

    • 发布日期:2017-12-02
    • 文件大小:397.94kb
    • 提供者:wafaa
  1. dos

    0下载:
  2. 关于DOS攻击早年写的一些文章,给各位做无线DOS攻击一个可行的参考。-DOS attack early years to write some articles for you to do wireless DOS attacks is a viable reference.
  3. 所属分类:Development Research

    • 发布日期:2017-11-18
    • 文件大小:5.48kb
    • 提供者:黄一
  1. watermarking-pdf

    0下载:
  2. Abstract—A novel image watermarking algorithm against geometric attacks is proposed to solve watermarking synchronization problems. In watermark embedding, firstly, watermark is embedded into host image by a Single Value Decomposition (SVD) m
  3. 所属分类:Development Research

    • 发布日期:2017-11-08
    • 文件大小:13.22mb
    • 提供者:tarun rathi
  1. WSNSecurity

    0下载:
  2. this document describes the attacks on wsn
  3. 所属分类:Development Research

  1. Detection-of-Syn-Flooding-Attacks-using-Linear-Pr

    0下载:
  2. This paper presents a simple but fast and effective method to detect TCP SYN flooding attacks. Linear prediction analysis is proposed as a new paradigm for DoS attack detection. The proposed SYN flooding detection mechanism makes use of the exp
  3. 所属分类:Development Research

    • 发布日期:2017-05-13
    • 文件大小:3.36mb
    • 提供者:ahmed
  1. Prediction-of-past-unsolved-terrorist-attacks

    0下载:
  2. In this study, a novel model is proposed to predict perpetuators of some terrorist events which are remain unsolved. The CPM learns from similarities between terrorist attacks and their crime attributes then puts them in appropriate clusters.
  3. 所属分类:Development Research

    • 发布日期:2017-04-17
    • 文件大小:139.43kb
    • 提供者:ahmed
  1. Enhancing-Cloud-Storage-Security

    0下载:
  2. 本文介绍了加强云存储安全性对Roll-back攻击的fangfa-Enhancing Cloud Storage Security against Roll-back Attacks
  3. 所属分类:Development Research

    • 发布日期:2017-04-26
    • 文件大小:63.67kb
    • 提供者:李伟
  1. Handling-Various-Attacks---Article-(1)

    0下载:
  2. Handling various attacks in watermarking-Handling various attacks in watermarking...
  3. 所属分类:Development Research

    • 发布日期:2017-04-29
    • 文件大小:134.76kb
    • 提供者:sonam
  1. MITIGATION-OF-BYZANTINE-ATTACKS-USING-COHEN-KAPPA

    0下载:
  2. MITIGATION OF BYZANTINE ATTACKS USING COHEN KAPPA ALGORITHM
  3. 所属分类:Development Research

    • 发布日期:2017-04-01
    • 文件大小:211.69kb
    • 提供者:kiruko
  1. ajassp.2014.969.977

    0下载:
  2. Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to lar
  3. 所属分类:Development Research

    • 发布日期:2017-04-25
    • 文件大小:141.63kb
    • 提供者:senthil
搜珍网 www.dssz.com