-
-
13.rar
Botnet for vb 6 ddos attack http and ftp flooding
-
14.rar
Botnet for vb 6 ddos attack http and ftp flooding
-
cube.rar
cube attack,针对对称密码体制和公钥密码体制、流密码的立方攻击
-
-
-
-
ejsr_31_2_01.rar
paper on Attack on LSB Steganography in Color and Grayscale Images Using Autocorrelation Coefficients
-
-
AThree-PhaseModelfor.rar
We model the hunt as a game of three explicit stages: the stalk, the attack,
and the subdual. We implemented this model in Matlab to simulate a
velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
-
GoneHuntinModelingOptimal.rar
We model the hunt as a game of three explicit stages: the stalk, the attack,
and the subdual. We implemented this model in Matlab to simulate a
velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
-