-
-
PETools.rar
The dedicated electronic hardware unit or audio software used to apply compression is called a compressor. Compressors often have attack and release...
-
Remote-File-Inclusion-Attacks.rar
this doc talk about how to attack a network system remotly very good document in how to learn hackers mechanism and protect your networks againts hacking
-
-
chi-square.zip
This statistical attack of stego image - chi square analysis
-
DDOS.rar
ddos ATTACK TO MAKE A REQUEST OF A CERTAIN COUNT ON A WEBSITE
-
-
1xy7z.ZIP
防窃听攻击的安全网络编码Eavesdropping proof attack on secure network coding
-
id3.rar
ID3-IDS is an algorithm based on of ID3 to Web
attack detection. Even though simple, ID3 is suffcient to put apart a number of Web attacks, including a large proportion of their variants.
It also surpasses existing methods.
-
Low-Rate-TCP-Targeted-Denial-of-Service-Attacks-a
... is highly robust to diverse network conditions, its implicit
assumption of end-system cooperation results in a well-known vulnerability to attack by high-rate non-responsive fl ows. In this paper, we investigate a class of low-rate denial of service ...
-
CounterLow-rateDenial-of-ServiceAttacks.rar
... algorithm to improve the TCP throughput against LDoS attacks. The basic idea behind
the RRED is to detect and fi lter out attack packets before a normal RED algorithm is applied to incoming fl ows. We conduct
a set of simulations to evaluate ...
-