Sponsored links

Top Source Codes

A Packet Marking Approach To Protect Cloud Environment Against DDOS ATTACKs

Cloud computing uses internet and remote servers for maintaining data and applications. It offers through internet the dynamic virtualized resources, bandwidth and on-demand software’s to consumers and promises the distribution of many economical benefits among its adapters. It helps the consu...
  Java Development        Java     

鬼影V7源码DDOS噢去

一个远程控制 也就是DDOS工具 攻击  启动前雾灯启动好好曲高和寡 启动驱动器我的钱的...
  Computer Cluster        C++     

Detection and localization spoofing ATTACKs in wsn

Wireless spoofing ATTACKs are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this p...
  Windows        C#     

aodv ATTACKer

It is a malicious node ATTACK in aodv routing.AODV ATTACKer ....to prevent security threats of blackhole by notifying other nodes in the network of the incident. The simulation results in ns2 (ver- 2.33) demonstrate that our protocol not only prevents blackhole ATTACK but consequently improves t...
  ns2      Tcl/Tk     

Syn ATTACK

网络syn Flood攻击的代码,使用winpcap,对目标主机进行SYN Flood攻击。-Network syn Flood ATTACK code needed to download. This procedure by using winpcap, Manual TCP SYN frame structure on the target host for SYN Flood ATTACKs....
  TCP/IP        C++     

GrayHole ATTACK in AODV

It is a malicious node ATTACK in aodv routing.aodv ATTACK to affect the topology of the network,grayhole by notifying other nodes in the network of the incident....
  NS2.35      Tcl/Tk     

birthday ATTACK

Write a computer program (or programs) to find two different string x and x′ such  that CK(x) = CK(x′) for a fixed K, where CK() is defined in Problem 3. (You may use birthday ATTACK or other methods)....
  Crypt_Decrypt algrithms        Java     

ATTACKs black hole

hello this code simulation ATTACK black hole in ns2.35 .this code is tested with ns2.29 .please for simulation download it and copy all file's in aodv folder ....
  Linux programming      Tcl/Tk     

watermarking ATTACK

image watermarking median ATTACK to find the robustness of your watermarking technique check that your watermark ...
  Matlab        Matlab     

Rushing ATTACK on AODV PROTOCOL

This source code help to understand the better malicious ATTACK in protocol network. This revels the packet throughput, network bandwidth and packet end of delay in the network....
  Linux programming      Tcl/Tk     

DNF full screen ATTACK

DNF full screen ATTACK DNF full screen ATTACK DNF full screen ATTACK...
  Other      Erlang     

fog computing mitigating insider data theft ATTACKs

Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preven...
  SQL Server        JavaScript     

blackhole ATTACK in aodv

 on black hole ATTACK detection  in aodv in manet. a tcl file contain all detail . and a c++ code for  ns2 is zipped in the attached file ....
  Linux programming        Borland C++ Builder     

TCP SYN ATTACK

Introduction to the program and clear, can be divided into 3 steps, and 1. construct the packet's IP header (many of them do not have to fill in, and allows the kernel to fill here don't have to fill in the source IP address) 2. construct the packet of the TCP header, 3. next is at...
  Linux programming        C     

adding black hole ATTACK in aodv

In networking, black holes refer to places in the network where incoming or outgoing traffic is silently discarded (or "dropped"), without informing the source that the data did not reach its intended recipient. When examining the topology of the network, the black...
  Linux programming      Tcl/Tk     

blackhole ATTACK

code source of blackhole ATTACK in manets in network simulator -2(NS2)  with some examples ...
  Linux programming      Tcl/Tk     

detection of spoofing ATTACKs

leach protocol implementation in ns2 in wireless sensor networks... to get energy, and after that based on energy we get the implementation of leach protocol......
  Linux programming      Tcl/Tk     

directional antenna ATTACK

—We consider —We consider a wireless sensor network consisting of n sensor nodes and one base station (larger networks with multiple base stations can be split into small ones to satisfy the model). Each sensor node is equipped with a globally synchronized time clock, omnidirectional an...
  Java Books        Java     

DDOS ATTACKs on multi

DDOS ATTACKs on multi-threaded device DDOS ATTACKs on multi-threaded device DDOS ATTACKs on multi-threaded device DDOS ATTACKs on multi-threaded device DDOS ATTACKs on multi-threaded device DDOS ATTACKs on multi-threaded device DDOS ATTACKs on multi-threaded device...
  Network Security        Others     

Dos (Denial of severance Denial of Service) and DDOS (Distributed Denial of Seve...

Dos (Denial of severance Denial of Service) and DDOS (Distributed Denial of Severance distributed denial of service) network ATTACK down on the principle and C Language. And the focus on analysis SYN-flooding basis, on the UDP-flooding and Icmp-flooding ATTACKs, and to make more. Finally, on the fir...
  Network Security        Borland C++ Builder     

Hot Search Keywords


    Sponsored links
pic18f4685 enc28j60 |  infix calculator |  directshow vb6 |  UC1698U TRULY |  alu with quaternary tree aDDER IN vhdl verilog |  optics dbscan |  android Racing game |  经典的静态网站主页模板 |  CORTEX STM32F103 GCC Rowley |  palmprint recognition matlab |  android voice chat |  8 bit shift register VHDL?mop=AddEntry&op=modload&name=Gu hi |  inventory management system in netbeans |  無接縫 midi |  lpc1788 interrupt |  codebook background opencv Ultimate |  ns2 manet?mop=AddEntry?op=modload&name=Gue h hit 5 href= s 0 |  conditional random fields matlab |  verilog code for frequency multiplier |  topical crawler |  dynamic tracking ?agbook=addentry push&ct=clnk?cmd=sign |  Proteus RFID |  optimum vrp |  cubic B spline interpolation |  ?act=dispBoardWrite?name=Gu hit 21 hit 1 href= s 0 c# imag |  jbarcode?mop=AddEntry&name=Gu hi hit 26 hre hit 4&op=modload |  resorce allocation fesibility probability |  opengl voa |  Binary symmetric channel |  BPTRAIN |  college symposium free website template |  Bilinear Interpolation Zooming and Shrinking |  stm32 vga | | | stm32 |  um0424 |  p2p dht chord?mop=AddEntry&op=modload&name=Guestbook hit 385 |  Android Precision Time Protocol |  STM32 dmx?name=Guestb hit 6 href= s 0 8051 incremental en |  ZIgbee interface with pic controller |  hikvision |  AGanNo2 powered by TPK Guestbook from?cmd=sign RK=0 RS=RD |  ns2 csma tcl |  winged edge powered by TPK Guestbook Fn&ct=clnk |  non dominated sorting genetic algorithm |  online banking php Mysql system |  Automatic Segmentation of Pulmonary Segments From Volumetric |  digita god |  php HOSPITAL MANAGEMENT SYSTEM PHP?name=Guestbook hit 6 hre |  Monoalphabetic cipher in c |  code used to remove background of image |  matrix chain multiplication dynamic programing |  freescale bootloader 9S08 |  ARIMA model Powered by Easy Guestbook Performing?amp prev= |  atmega8 ad421 powered by TPK Guestbook poly&ct=clnk |  c# snooker game |  snmp4j?mop=AddEntry&op=modload&name=Guestbook&file=index |  GetProcAddress vfp |  OCMJ8X15D Powered by Easy Guestbook ainsi?name=Guestb hit |  6410 瑁告満 Powered by Easy Guestbook ddys?amp c |  gdal C# |  ofdm 澶氬緞 |  MIFARE MFRC522 Powered by Easy Guestbook thefts&ct=clnk |  ahb to apb bridge verilog |  28335 i2c powered by TPK Guestbook pedal?name=hit 16 href |  ?? matlab Powered by Jcow dc?ct=cl?mop=AddEntr&tbs=qdr:w |  Red Bull stm32f103 zet6?mop=AddEntry&op=modload&name=Gu hi h |  criminisi Designer: PHPLD Templates Submit Article |  his系统 Powered by Easy Guestbook sensitif?c?cmd=sign?ac |  JPEG加载 |  vc Tab控件的 |  shortcuts |  TMS28335 powered RK=0 RS=l1HxzNzHCG0sQC4AWNE1T4JRyUc |  symbols |  dspic30f3010 Motor |  zone based feature extraction |  inverted pendulum ode45 |  ARIMA model Powered by Easy Guestbook Performing?cmd=sign |  HAAR dwt source code for license plate recognition |  retail management system |  OpenCV OCR template matching enter |  595 verilog |  FIR digital filter using msp430 |  ? enter word verification in box below guestb |  0 “powered by Simple Machines” rejection RK=0 RS=dSA8hg |  ATMEGA WIZ830?mop=AddEntry&name=G hit hit 3 hr hi&op=modload |  S3C2440 uip |  smp86xx boot loader |  PSO VBA |  interfacing mcp3202 with 89c51?name=Guestb hit 135 h h hit 4 |  Metal Slug Powered by Easy Guestbook reiterated?ct=cln?cmd |  RX3i PLC Powered By: Article Friendly Ultimate multiproce |  MediaTek MT8555 |  j拓扑可视化 |  java数控机床远程控制代码 |  sparse code srikage |  pop3服务器程序 |  ILI9341 netduino |  facial animation |  fiber optic gyroscope simulink |  OCMJ8X15D Powered by Easy Guestbook ainsi?mop=AddEntry&op= |  reading file |