Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • PursuitEvasionGames.rar We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
  • TheGeometryandtheGameTheory.rar We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
  • botnet.rar denial of service attack
  • AnAnomalyBasedApproachforIntrusion.zip A new system for web attack detection is presented. It follows the anomaly-based approach, therefore known and unknown ... . Any request which deviates from the normal behavior is considered an attack. The system has been applied to protect a real web ...
  • AudioWatermarking.zip A local extremum of audio watermarking algorithm, matlab software watermark embedding and extraction operation, also gives some common attack method of audio watermarking attacks.
  • Flood.rar Flood attack test C++ long time
  • test.zip ddos attack demonstrate
  • C_language_source_program_tank_attack.rar C语言坦克攻击源码程序C language source program tank attack
  • Classic_instance_of_network_attack_techniques.rar 网络攻击技术经典实例Classic instance of network attack techniques
  • Recognition_of_hackers.zip ... Hacker in Networks Using Genetic Algorithm (IDS) is to identify the intruder and block the data from the intruder to avoid the system attack by the virus. This new system is a replacement of the existing system. In existing system, at run time it will not ...