CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 编程文档 搜索资源 - attacks

搜索资源列表

  1. CloneDetection-ICDCS2008

    0下载:
  2. In this paper, we propose a novel scheme for detecting clone attacks in sensor networks, which computes for each sensor a social fingerprint by extracting the neighborhood characteristics, and verifies the legitimacy of the originator for eac
  3. 所属分类:Communication

    • 发布日期:2017-04-08
    • 文件大小:182.35kb
    • 提供者:sireine
  1. WirelessNetSec

    0下载:
  2. This presentation aims to raise awareness about attacks that are not easily detectible or preventible on most wireless networks today.
  3. 所属分类:Communication

    • 发布日期:2017-06-03
    • 文件大小:14.56mb
    • 提供者:T Ets
  1. Statistical_mechanics_of_complex_networks.pdf

    0下载:
  2. Complex networks describe a wide range of systems in nature and society. Frequently cited examples include the cell, a network of chemicals linked by chemical reactions, and the Internet, a network of routers and computers connected by physical links
  3. 所属分类:Communication

    • 发布日期:2017-03-27
    • 文件大小:750.46kb
    • 提供者:larissa
  1. thesis-1

    0下载:
  2. A REPORT ON WSN:A Wireless Protocol to Prevent Wormhole Attacks
  3. 所属分类:Communication

    • 发布日期:2017-04-17
    • 文件大小:410.22kb
    • 提供者:yogesh
  1. McCoy_Hacking_Net_Applications_WP

    0下载:
  2. 2011blackhat会议上一片关于网络攻击的文章,希望对大家有所帮助!-An article about cyber attacks 2011blackhat meeting, we want to help!
  3. 所属分类:Communication

    • 发布日期:2017-12-02
    • 文件大小:128.35kb
    • 提供者:赵强
  1. Attack_tools

    0下载:
  2. survey on network attacks
  3. 所属分类:Communication

    • 发布日期:2017-12-09
    • 文件大小:15.07kb
    • 提供者:medo
  1. ddddddsssssss

    0下载:
  2. 攻击ip器.攻击ip无忧.易语言源码.攻取ip.也可参考.支持本网站.谢谢合作.本人收徒.学费600.qq307775776-The attack ip. Attacks ip worry-free. Easy language source. Took it ip can refer to support this website. Thank you for your cooperation. And I Shoutu. Tuition 600.qq307775776
  3. 所属分类:Communication

    • 发布日期:2017-11-04
    • 文件大小:1.66mb
    • 提供者:李磊
  1. double-sql-attack

    0下载:
  2. 双层防御SQL注入攻击的方法 内容翔实算法清晰-Double-layer defense against SQL injection attacks informative algorithm is clear
  3. 所属分类:Communication

    • 发布日期:2017-11-24
    • 文件大小:332.99kb
    • 提供者:sanding
  1. Analysis-of-Coordinated-Denial-of-Service-Attacks

    0下载:
  2. analysis of cordinated daniyal spectrum sensing
  3. 所属分类:Communication

    • 发布日期:2017-03-25
    • 文件大小:804.35kb
    • 提供者:hadi rafii
  1. Analysis-of-Primary-User-Emulation-Attack-with-Mo

    0下载:
  2. study primary user emulation attacks (PUEA) issue in a cognitive radio network. Most literatures about the PUEA discuss methods to deal with the attacks in a system model where the positions of the primary user and secondary users are fixed
  3. 所属分类:Communication

    • 发布日期:2017-04-04
    • 文件大小:328.43kb
    • 提供者:walid
  1. Defense-Against-Primary-User-Emulation-Attacks-in

    0下载:
  2. This paper considers primary user emulation attacks in cognitive radio networks operating in the white spaces of the digital TV (DTV) band
  3. 所属分类:Communication

    • 发布日期:2017-05-04
    • 文件大小:1.11mb
    • 提供者:walid
  1. Detecting-Primary-User-Emulation-Attacks-in-Cogni

    0下载:
  2. Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) measurements to detect emulato
  3. 所属分类:Communication

    • 发布日期:2017-05-11
    • 文件大小:2.07mb
    • 提供者:walid
  1. (MAC)-LAYER-DESIGN

    0下载:
  2. In this dissertation, there are four main aspects included: energy reservation on MAC layer, secure improvement for DoS attacks on MAC layer, query processing with uncertainty for sensor systems, and throughput maximization on MAC layer for ult
  3. 所属分类:Communication

    • 发布日期:2017-05-02
    • 文件大小:675.87kb
    • 提供者:amir
  1. Practical Attacks on the MIFARE Classic

    0下载:
  2. The MIFARE Classic is the most widely used contactless smart card chip in the world. Its communication is based on the open ISO-14443-A standard, but the entire authentication and encryption protocols are proprietary. Several academic researchers h
  3. 所属分类:编程文档

搜珍网 www.dssz.com