Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • 13.rar Botnet for vb 6 ddos attack http and ftp flooding
  • 14.rar Botnet for vb 6 ddos attack http and ftp flooding
  • cube.rar cube attack,针对对称密码体制和公钥密码体制、流密码的立方攻击
  • chi-square.rar chi square attack for steganogrpahy
  • attack1.rar des attack algo for linux based system
  • MFCUK_darkside_0.3.zip Darkside attack rfid mifare classic
  • ejsr_31_2_01.rar paper on Attack on LSB Steganography in Color and Grayscale Images Using Autocorrelation Coefficients
  • testattack.rar Flex attack server very good
  • AThree-PhaseModelfor.rar We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
  • GoneHuntinModelingOptimal.rar We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.