Sponsored links

Top Source Codes

A Packet Marking Approach To Protect Cloud Environment Against DDOS ATTACKs

Cloud computing uses internet and remote servers for maintaining data and applications. It offers through internet the dynamic virtualized resources, bandwidth and on-demand software’s to consumers and promises the distribution of many economical benefits among its adapters. It helps the consu...
  Java Development        Java     

AODV simulation under Distributed denial of service ATTACK with multiple performance parameters

The AODV has been implemented under the DDOS ATTACK. Under the distributed denial of service ATTACK.The AODV has been simulated with total 11 nodes. The nodes have been divided into four major parts: sender nodes, receiver nodes, end routing nodes, traversing nodes. There are total two paths bet...
  Communication        Matlab     

鬼影V7源码DDOS噢去

一个远程控制 也就是DDOS工具 攻击  启动前雾灯启动好好曲高和寡 启动驱动器我的钱的...
  Computer Cluster        C++     

Detection and localization spoofing ATTACKs in wsn

Wireless spoofing ATTACKs are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this p...
  Windows        C#     

aodv ATTACKer

It is a malicious node ATTACK in aodv routing.AODV ATTACKer ....to prevent security threats of blackhole by notifying other nodes in the network of the incident. The simulation results in ns2 (ver- 2.33) demonstrate that our protocol not only prevents blackhole ATTACK but consequently improves t...
  ns2      Tcl/Tk     

Syn ATTACK

网络syn Flood攻击的代码,使用winpcap,对目标主机进行SYN Flood攻击。-Network syn Flood ATTACK code needed to download. This procedure by using winpcap, Manual TCP SYN frame structure on the target host for SYN Flood ATTACKs....
  TCP/IP        C++     

GrayHole ATTACK in AODV

It is a malicious node ATTACK in aodv routing.aodv ATTACK to affect the topology of the network,grayhole by notifying other nodes in the network of the incident....
  NS2.35      Tcl/Tk     

birthday ATTACK

Write a computer program (or programs) to find two different string x and x′ such  that CK(x) = CK(x′) for a fixed K, where CK() is defined in Problem 3. (You may use birthday ATTACK or other methods)....
  Crypt_Decrypt algrithms        Java     

ATTACKs black hole

hello this code simulation ATTACK black hole in ns2.35 .this code is tested with ns2.29 .please for simulation download it and copy all file's in aodv folder ....
  Linux programming      Tcl/Tk     

watermarking ATTACK

image watermarking median ATTACK to find the robustness of your watermarking technique check that your watermark ...
  Matlab        Matlab     

Rushing ATTACK on AODV PROTOCOL

This source code help to understand the better malicious ATTACK in protocol network. This revels the packet throughput, network bandwidth and packet end of delay in the network....
  Linux programming      Tcl/Tk     

blackhole-ATTACKs using AODV

Blackhole ATTACK  with Adhoc on demand distance vector protocol (AODV) protocol implemented using ns2, 50 nodes has been used in this program...
  Linux programming      Tcl/Tk     

Prevention of DoS and Memory Exhaustion ATTACKs: Key Distribution with Confidentiality and Authentication

Now a day’s most of the organizations are moving from wire-connected LAN to wireless LAN. The popularity of the 802.11 network standards stems from the fact that they provide for wireless connections with simplicity and convenience. But, there are many security issues which have been identified in...
  Matlab        Matlab     

ns2 simulation of sybil ATTACK in vanet

ns2 code for simulation  of sybil ATTACK in manet.VANET supports the services associated with drivers’ safety such as the informationtransmission between vehicles, the rear-end collision between vehicles, and the warning about dangerous situations in real time. In the Figure 2 [10, 11],...
  Data      Tcl/Tk     

DNF full screen ATTACK

DNF full screen ATTACK DNF full screen ATTACK DNF full screen ATTACK...
  Other      Erlang     

fog computing mitigating insider data theft ATTACKs

Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preven...
  SQL Server        JavaScript     

AN ENCRYPTION ALGORITHM TO SECURELY TRANSMIT MESSAGES AND LOCALIZATION OF SYBIL ATTACKS IN VANETS

PHASE I: PROPOSED SCHEME: The secure car is considered a mobile entity that exchanges messages with other traffic participants, but also with the existing infrastructure (i.e. secure traffic lights). The purpose of the protocol is to provide a solution to secure messages between...
  NS 2      Tcl/Tk     

blackhole ATTACK in aodv

 on black hole ATTACK detection  in aodv in manet. a tcl file contain all detail . and a c++ code for  ns2 is zipped in the attached file ....
  Linux programming        Borland C++ Builder     

TCP SYN ATTACK

Introduction to the program and clear, can be divided into 3 steps, and 1. construct the packet's IP header (many of them do not have to fill in, and allows the kernel to fill here don't have to fill in the source IP address) 2. construct the packet of the TCP header, 3. next is at...
  Linux programming        C     

adding black hole ATTACK in aodv

In networking, black holes refer to places in the network where incoming or outgoing traffic is silently discarded (or "dropped"), without informing the source that the data did not reach its intended recipient. When examining the topology of the network, the black...
  Linux programming      Tcl/Tk     

Hot Search Keywords


    Sponsored links
spur gear design in C MGB OpenSource Guestbook outlet?cmd= |  VB?SSTAB Using Article Directory plugin flee |  ts12864a 2 proteus Ultimate Guestbook Version?cmd=sign |  c snmp |  ARMV4I |  warehouse location python?mop=AddEntry&name=Gues &op=modload |  gaussian filter in verilog?cmd=sign |  business object?cmd= sign?name=Guestbook Enter the ca?m?cmd= |  MSNLIST |  excel addin Using Article Directory plugin ?tbs=qdr?mode= |  Android game 2048 |  simulink model of diesel engine?agreed=true&is&mode=register |  mahjong c# powered by TPK Guestbook Jiangxi&ct=clnk?mop=Ad |  xnxx enter word verification in box below guestbook?a=regi |  NTLEA Powered by: Maian Guestbook thesis?name=Guestbook?mo |  ieee projects coding |  Embedded C Coding Standard |  shadow mapping opentk?cmd=sign?cmd=sign |  NTLEA Powered by: Maian Guestbook thesis |  Realtek RTL8367|4 Using Article Directory plugin sb |  RFID 連線 |  支导线坐标计算?mop=AddEntry&op=modload&name=Guestbook |  shadow mapping opentk?cmd=sign |  ripple carry adder in c |  w5300 TCP VHDL?mop=AddEntry&op=modload&name=Guestbook hit hi |  8 bit carry adder in verilog |  四元式 Using Article Directory plugin RK=0 RS=uOUmTtUTx5 |  FAT32 源码 MSP430 |  aes stm32 |  xpidea ocr setup |  duilib 切换 Powered by Burning Book oils?cmd=sign |  PID DC motor controller using simulink mikroc zboard?id=byro |  led dot matrix |  hamming in labview “Powered by BlogEngine” |  Java Development Using Article Directory plugin purse |  microchip induction cooker?cmd=sign |  source code for payslip management system using c?name=G hit |  balloon tip Powered by Advanced Guestbook balloon?ct=clnk |  optimum path forest audio classify |  folder lock in java |  监控 Linux inurl: edu guestbook infrared?hl=zh?cmd=sign |  SSPD043 Powered by Burning Book Asia&ct=clnk?mop=AddEntry |  recursive descent parser& sa=U& ei=DMYJUZmjCMGHtQbRooH |  microchip induction cooker |  excel addin Using Article Directory plugin ??mode=regi |  lfm deram processing |  lib ecc PHP Link Directory Submit Article Ø­Ù?cmd=sign |  proteus at45 |  aes and ecc hybrid encryption through?cmd=sign |  匈牙利 |  Finger Tracking opencv ? zb path= |  rosenstein lyapunov |  nau7802 8051 |  schematic vs1003 atmega64 |  单片机 组合按键 |  wave atom |  target radiated noise Member Login to Submit Article 茫?cmd |  ? Powered By: Article Friendly Ultimate & RS=^ADAEo?mop=Add |  SST25VF016 |  ????????? Ultimate Guestbook Version |  监控 Linux inurl: edu guestbook infrared?hl=zh |  jsp SQL2005开发的人才招聘系统 |  odb2 Ultimate Guestbook Version?mode=register&agreed?cmd=s |  Scatter plot for receiver 1 MIMO OFDM system over a Rayleig |  radial distribution function |  3D laser scanner opencv frame object point detection |  xilinx kc705 lcd |  sip sdk Ultimate Guestbook Version book downloads?cmd&ct= |  data recursive |  nRF24L01 vhdl Using Article Directory plugin movable&ct=cl |  odb2 Ultimate Guestbook Version?mode=register&agreed |  CC2541 bootloader |  cmd powerbuilder Powered by Advanced Guestbook interior |  wiz3100 Powered by Advanced Guestbook weather now&ct=c?mop |  freescale cup mpc5604 | | | freescale |  Cosdes: A Collaborative Spam Detection System with a Novel E |  hog dalal and triggs Powered by: Maian Guestbook Triggs&ct |  propeller clock |  excel addin Using Article Directory plugin ?tbs=qdr |  Speech detection zero crossing rate |  CTabCtrl owner Draw?mop=AddEntry&op=modload&name=Guestbook&f |  sql server delphi |  脚本 engine |  ili8961 Using Article Directory plugin mope?mop=AddEnt |  Cloud Computing |  lededit swf material?mop=AddEntry&name=Gue hit 46&op=modload |  jrtplib h264 payload |  Modeling the mobility of Gowalla users |  registration form validation code in j2me |  C Sharp Smpp DLL |  NEURAL nework for GSM rrm?cmd=sign |  ade7758 calibration |  stn1110 source Powered by Easy Guestbook mostly?name=Gu hi |  Dork scanner sql injection |  Mediastreamer2 ?? |  sae hs 3000?mop=AddEntry&name=hit 5 href= s 0 and&op=modload |  digital sethoscope code |  recursive systematic code matlab |  lpc1778 enter word verification in box below guestbook?nam |  excel addin Using Article Directory plugin ?cmd=sign |