Sponsored links

puzzle based DDOS ATTACKs

2014-12-20 20:51    By:gdeepthi      View:76      Download:1

puzzle based DDOS ATTACKs.Thsi project aims to detect and prevent DDOS ATTACKs.DDOS ATTACKs means targeting victim server from more number of bots.bots are controlled by ATTACKer...

Java Development Java

AODV simulation under Distributed denial of service ATTACK with multiple performance parameters

2014-12-20 03:45    By:brarajit18      View:472      Download:0

The AODV has been implemented under the DDOS ATTACK. Under the distributed denial of service ATTACK.The AODV has been simulated with total 11 nodes. The nodes have been divided into four major parts: sender nodes, receiver nodes, end routing nodes, traversing nodes. There are total two paths bet...

Communication Matlab

Detection and localization spoofing ATTACKs in wsn

2014-12-21 23:23    By:jeyam siva      View:29      Download:3

Wireless spoofing ATTACKs are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this p...

Windows C#

Prevention of DoS and Memory Exhaustion ATTACKs: Key Distribution with Confidentiality and Authentication

2014-12-06 01:32    By:mdiwakar      View:68      Download:0

Now a day’s most of the organizations are moving from wire-connected LAN to wireless LAN. The popularity of the 802.11 network standards stems from the fact that they provide for wireless connections with simplicity and convenience. But, there are many security issues which have been identified in...

Matlab Matlab

aodv ATTACKer

2 hours ago    By:siva      View:106      Download:1

It is a malicious node ATTACK in aodv routing.AODV ATTACKer ....to prevent security threats of blackhole by notifying other nodes in the network of the incident. The simulation results in ns2 (ver- 2.33) demonstrate that our protocol not only prevents blackhole ATTACK but consequently improves t...

ns2 Tcl/Tk


2014-12-19 21:47    By:zlszl      View:18      Download:1

网络syn Flood攻击的代码,使用winpcap,对目标主机进行SYN Flood攻击。-Network syn Flood ATTACK code needed to download. This procedure by using winpcap, Manual TCP SYN frame structure on the target host for SYN Flood ATTACKs....



38 minutes ago    By:MANDEEP      View:80      Download:1

It is a malicious node ATTACK in aodv routing.aodv ATTACK to affect the topology of the network,grayhole by notifying other nodes in the network of the incident....

NS2.35 Tcl/Tk

watermarking ATTACK

2014-12-02 08:56    By:hello      View:5      Download:0

image watermarking median ATTACK to find the robustness of your watermarking technique check that your watermark ...

Matlab Matlab


2014-12-13 07:12    By:dev      View:20      Download:1

This source code help to understand the better malicious ATTACK in protocol network. This revels the packet throughput, network bandwidth and packet end of delay in the network....

Linux programming Tcl/Tk

blackhole-ATTACKs using AODV

3 hours ago    By:jegan      View:108      Download:2

Blackhole ATTACK  with Adhoc on demand distance vector protocol (AODV) protocol implemented using ns2, 50 nodes has been used in this program...

Linux programming Tcl/Tk

ns2 simulation of sybil ATTACK in vanet

59 minutes ago    By:diya      View:189      Download:2

ns2 code for simulation  of sybil ATTACK in manet.VANET supports the services associated with drivers’ safety such as the informationtransmission between vehicles, the rear-end collision between vehicles, and the warning about dangerous situations in real time. In the Figure 2 [10, 11],...

Data Tcl/Tk

DNF full screen ATTACK

2014-11-30 06:45    By:dd45692922      View:16      Download:0

DNF full screen ATTACK DNF full screen ATTACK DNF full screen ATTACK...

Other Erlang


3 hours ago    By:Preethi      View:102      Download:3

PHASE I: PROPOSED SCHEME: The secure car is considered a mobile entity that exchanges messages with other traffic participants, but also with the existing infrastructure (i.e. secure traffic lights). The purpose of the protocol is to provide a solution to secure messages between...

NS 2 Tcl/Tk

blackhole ATTACK in aodv

2014-12-19 10:35    By:respac      View:59      Download:1

 on black hole ATTACK detection  in aodv in manet. a tcl file contain all detail . and a c++ code for  ns2 is zipped in the attached file ....

Linux programming Borland C++ Builder


2014-12-19 21:50    By:LxiShuai      View:14      Download:0

Introduction to the program and clear, can be divided into 3 steps, and 1. construct the packet's IP header (many of them do not have to fill in, and allows the kernel to fill here don't have to fill in the source IP address) 2. construct the packet of the TCP header, 3. next is at...

Linux programming C
    Sponsored links

Hot Search Keywords