Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • PETools.rar The dedicated electronic hardware unit or audio software used to apply compression is called a compressor. Compressors often have attack and release...
  • Remote-File-Inclusion-Attacks.rar this doc talk about how to attack a network system remotly very good document in how to learn hackers mechanism and protect your networks againts hacking
  • (Linux.Firewalls.Attack.rar LINUX下的防火墙iptables相关知识和资料。内涵介绍,基本功能,以及高级的配置知识。
  • chi-square.zip This statistical attack of stego image - chi square analysis
  • DDOS.rar ddos ATTACK TO MAKE A REQUEST OF A CERTAIN COUNT ON A WEBSITE
  • QBufferAttack.zip Q版缓冲区溢出攻击 Q Buffer Over Flow attack
  • 1xy7z.ZIP 防窃听攻击的安全网络编码Eavesdropping proof attack on secure network coding
  • id3.rar ID3-IDS is an algorithm based on of ID3 to Web attack detection. Even though simple, ID3 is suffcient to put apart a number of Web attacks, including a large proportion of their variants. It also surpasses existing methods.
  • Low-Rate-TCP-Targeted-Denial-of-Service-Attacks-a ... is highly robust to diverse network conditions, its implicit assumption of end-system cooperation results in a well-known vulnerability to attack by high-rate non-responsive fl ows. In this paper, we investigate a class of low-rate denial of service ...
  • CounterLow-rateDenial-of-ServiceAttacks.rar ... algorithm to improve the TCP throughput against LDoS attacks. The basic idea behind the RRED is to detect and fi lter out attack packets before a normal RED algorithm is applied to incoming fl ows. We conduct a set of simulations to evaluate ...