-
-
amorph.zip
...
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for ...
-
vm2.zip
...
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for ...
-
-
-
wivet_v3.rar
... These VAs, given a URL(s), try to extract as many input vectors as possibly they can to increase the coverage of the attack surface.
WIVET provides a good sum of input vectors to any extractor and presents the results. In order an input extractor to ...
-
-
-
0909.0573.rar
this is a paper on minimizing cache timing attack on aes using cache flushing algorithm
-
11.rar
Botnet for vb 6 ddos attack http and ftp flooding
-
12.rar
Botnet for vb 6 ddos attack http and ftp flooding
-