搜索资源列表
CloneDetection-ICDCS2008
- In this paper, we propose a novel scheme for detecting clone attacks in sensor networks, which computes for each sensor a social fingerprint by extracting the neighborhood characteristics, and verifies the legitimacy of the originator for eac
WirelessNetSec
- This presentation aims to raise awareness about attacks that are not easily detectible or preventible on most wireless networks today.
Statistical_mechanics_of_complex_networks.pdf
- Complex networks describe a wide range of systems in nature and society. Frequently cited examples include the cell, a network of chemicals linked by chemical reactions, and the Internet, a network of routers and computers connected by physical links
thesis-1
- A REPORT ON WSN:A Wireless Protocol to Prevent Wormhole Attacks
McCoy_Hacking_Net_Applications_WP
- 2011blackhat会议上一片关于网络攻击的文章,希望对大家有所帮助!-An article about cyber attacks 2011blackhat meeting, we want to help!
Attack_tools
- survey on network attacks
ddddddsssssss
- 攻击ip器.攻击ip无忧.易语言源码.攻取ip.也可参考.支持本网站.谢谢合作.本人收徒.学费600.qq307775776-The attack ip. Attacks ip worry-free. Easy language source. Took it ip can refer to support this website. Thank you for your cooperation. And I Shoutu. Tuition 600.qq307775776
double-sql-attack
- 双层防御SQL注入攻击的方法 内容翔实算法清晰-Double-layer defense against SQL injection attacks informative algorithm is clear
Analysis-of-Coordinated-Denial-of-Service-Attacks
- analysis of cordinated daniyal spectrum sensing
Analysis-of-Primary-User-Emulation-Attack-with-Mo
- study primary user emulation attacks (PUEA) issue in a cognitive radio network. Most literatures about the PUEA discuss methods to deal with the attacks in a system model where the positions of the primary user and secondary users are fixed
Defense-Against-Primary-User-Emulation-Attacks-in
- This paper considers primary user emulation attacks in cognitive radio networks operating in the white spaces of the digital TV (DTV) band
Detecting-Primary-User-Emulation-Attacks-in-Cogni
- Primary user emulation (PUE) attacks on cognitive radio networks pose a serious threat to the deployment of this technique. Previous approaches usually depend on individual or combined received signal strength (RSS) measurements to detect emulato
(MAC)-LAYER-DESIGN
- In this dissertation, there are four main aspects included: energy reservation on MAC layer, secure improvement for DoS attacks on MAC layer, query processing with uncertainty for sensor systems, and throughput maximization on MAC layer for ult
Practical Attacks on the MIFARE Classic
- The MIFARE Classic is the most widely used contactless smart card chip in the world. Its communication is based on the open ISO-14443-A standard, but the entire authentication and encryption protocols are proprietary. Several academic researchers h