搜索资源列表
tfn2k.rar
- DOS攻击源码,有smurf攻击、SYN FLOOd攻击等,仅供学习研究之用,不可用于违背他人利益,DOS attack source, there are smurf attacks, SYN FLOOd attacks, for study purposes, not for others, contrary to the interests of
watermark
- 基于MATLAB环境的图像水印攻击试验源程序-MATLAB-based image watermarking attacks environment test source
audiowatermark
- 音频水印算法实现,其中包括水印的嵌入,音频水印常用攻击,以及检测算法的实现。-Audio watermarking algorithms, including the watermark embedding, audio watermarking common attacks, and the detection algorithm.
DCT
- 基于DCT域的鲁棒水印,能抗击一定程度的压缩,剪切等攻击-Based on the DCT domain robust watermarking, can fight against a certain degree of compression, shear, such as attacks
Attacks.tar
- A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network applications
DCT-water-print
- 实现了添加水印及攻击水印的一些方法。攻击水印方法包括抖动攻击、滤波攻击、旋转攻击等-Add watermark and implementation of a number of methods to attack the watermark. Watermarking attack methods include jitter attacks, filtering attacks, spin attack
Checkmark
- Checkmark 是数字水印中应用的攻击测试软件,是每个在做数字水印的人的必须使用的工具,这个文章告诉你怎么使用checkmark-Checkmark is the application of digital watermarking attacks testing software, are each at digital watermarking to do the people have to use a tool, this article tell you how to use c
xiaobobian
- 本代码是一些关于水印处理的一些算法用小波变换来实现,在嵌入水印之后用各种攻击检验算法的鲁棒性-The code is some deal about a number of watermarking algorithm using wavelet transform to achieve, in the embedded watermark after the attacks with a variety of test algorithm robustness
LANShield2.0
- LANShield是一款本人自己写的网络防火墙程序,LAN Shield 2.0.rar为主程序源码,开发环境为VS2005;MyFireWallLSP.rar为过滤模块; Server为服务器源码,Java编写,非阻塞模式。 软件功能: 1.有效拦截局域网内的ARP攻击,并具有保护网关功能 2.可配合服务器端,更有效管理局域网网络 3.自带应用层过滤模块,有效控制本机进程的网络访问 4.自带攻击模块,用于反击,包含所有AR
stirmark
- 实现对数字水印各种攻击的软件。刚才已经上载过了,但由于一直没得到回应。麻烦站长审核通过,急需一些代码做毕设。。。非常感谢。-To achieve a variety of attacks on digital watermarking software. Have already been uploaded, but no response has been. Trouble station approved, completion of an urgent need to do some se
sensors-09-03958
- We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad re
CollectionsofWaterMarkingAttack
- 关于各种数字水印攻击的MATLAB代码,可以用于仿真实验,调用方便简单-Digital watermarking attacks on a variety of MATLAB code that can be used for simulation experiments, to facilitate a simple call to
AnIntroductiontoWatermarkRecoveryfromImages
- 简要地讨论了在数字图像恢复水印方法,并且提出相关的当前和今后的安全信息系统(CSIS)工作中心。-briefly discuss a method of recovering watermarks in digital images after such attacks and introduce related current and future work in the Center for Secure Information Systems (CSIS).
ABufferOverflowStudyAttacksandDefenses
- A Buffer Overflow Study - Attacks and Defenses 一本介绍缓冲区溢出非常好的书,讲解详细,通俗易懂,是值得收藏的好资料-A Buffer Overflow Study- Attacks and Defenses 1 describes a buffer overflow very good book, explained in detail, easy to understand, is worthy of a good collection of i
DCT_watermarking_System
- A gr8 Adaptive DCT based watermarking system is implemented with a nice GUI for embedding, extraction and attacks
Hacker-and-attacks-techniques
- 这是一些黑客与攻击技术,网络安全方面的技术。-This is the number of hackers and attacks technology, network security technology.
HackingExposed10
- HACKING IIS 5 IISsecurity exploits have enjoyed a long,rich tradition. Microsoft’s flag ship Webserver platform has been plagued by such vulnerabilities as source code revelati on attacks like-HACKING IIS 5 IISsecurity exploits have enjoyed a l
attack
- this file explains attacks on AODV
Synchronized-attacks-watermarking
- 抗同步攻击鲁棒性数字水印技术研究论文,很具参考价值,值得下载。-Synchronized attacks against digital watermarking technique robust research papers, it is a reference value, it is worth downloading.
Attacks
- Check mark Attacks for watermarking