虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

attack

  • Internetwork Routing Protocol attack 程序

    Internetwork Routing Protocol attack 程序

    标签: Internetwork Protocol Routing attack

    上传时间: 2014-01-24

    上传用户:fanboynet

  • ip land attack by msdos

    ip land attack by msdos

    标签: attack msdos land ip

    上传时间: 2015-12-25

    上传用户:日光微澜

  • C++ implementaion for RSA together with the Wiener attack. It uses NTL library for big numbers

    C++ implementaion for RSA together with the Wiener attack. It uses NTL library for big numbers

    标签: implementaion for together library

    上传时间: 2017-07-05

    上传用户:小鹏

  • This program finds the locations of placing n queens in a n*n chessboard so that none attack any oth

    This program finds the locations of placing n queens in a n*n chessboard so that none attack any other

    标签: chessboard locations program placing

    上传时间: 2014-11-17

    上传用户:ma1301115706

  • german side channel attack description

    german side channel attack description

    标签: description channel german attack

    上传时间: 2014-01-24

    上传用户:caixiaoxu26

  • 智能电网安全保护

    Abstract: Stuxnet, a sophisticated virus that damaged Iran's nuclear capability, should be an eye openerfor the world. We can choose to learn something very narrow (how to combat the Stuxnet virus) or wecan choose to focus on the larger goal of thwarting the next type of creative cyber attack. Unfortunately,critical industrial infrastructure is not currently designed with security as a key goal, leaving open multipleavenues for an educated and funded attacker to create massive problems. This tutorial outlines somebasic concepts that engineers and product definers should consider to make sure their new projects stayahead of future threats.

    标签: 智能电网 安全保护

    上传时间: 2013-11-17

    上传用户:llwap

  • 智能电表和智能电网手册

    Abstract: Investment in smart meters and smart grid end equipment continues to grow worldwide as countriestry to make their electric delivery systems more efficient. However, as critical as the electric deliveryinfrastructure is, it is normally not secured and thus subject to attack. This article describes the concept oflife-cycle security—the idea that embedded equipment in the smart grid must have security designed into theentire life of the product, even back to the contract manufacturer. We also talk about how life-cycle securityapplies to embedded equipment in the smart grid. Potential threats are discussed, as are potential solutionsto mitigate the risks posed by those threats.

    标签: 智能电表 智能电网

    上传时间: 2014-12-24

    上传用户:熊少锋

  • About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based o

    About WepDecrypt: Wepdecrypt is a Wireless LAN Tool written in c which guesses WEP Keys based on a active dictionary attack, key generator, distributed network attack and some other methods, it s based on wepattack and GPL licensed. WepDecrypt highlights: - Implemented packet filters. - Only one crypted packet is enough to start cracking - Has its own key generator. - Can crack a dumpfile over a network. - Can act as a server and client. - Also works in windows. - Has an fltk gui.

    标签: WepDecrypt Wepdecrypt Wireless guesses

    上传时间: 2013-12-25

    上传用户:6546544

  • 五子棋小游戏#include<stdlib.h> #include<time.h> #include<stdio.h> #include<conio.h

    五子棋小游戏#include<stdlib.h> #include<time.h> #include<stdio.h> #include<conio.h> int chess[169]={0} /*棋盘*/ struct chess_t/*作为辅助,即是作为建意*/ { char attack /*攻防用的,0表示守,1表示攻*/ int j /*作为优先级用*/ }chess_a[169]

    标签: include lt gt stdlib

    上传时间: 2016-05-18

    上传用户:anng

  • 本目录下存放了演示web应用安全技术的例程序

    本目录下存放了演示web应用安全技术的例程序,具体用法如下: 1.attack目录是演示JSP安全性漏洞及对策的web应用程序,可以直接部署到应用服务器并运行。 2.security目录下存放演示保护web资源的例程序,tomcat子目录下存放可以在tomcat下运行的web应用程序(security目录)及在 tomcat下配置安全域的配置文件样例(配置文件目录), weblogic子目录存放可以在weblogic下运行的web应用程序。

    标签: web 目录 安全技术 程序

    上传时间: 2014-01-17

    上传用户:lyy1234