-
[
Unix_Linux]
ippl-0.13.tar.gz
network monitoring securiy tool(NIDS) in linux
intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack
can also be identified by this network monitoring tool
-
[
Unix_Linux]
netguard-1.0.0.tar.gz
network monitoring securiy tool(NIDS) in linux
intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack
can also be identified by this network monitoring tool
-
[
Unix_Linux]
jail-1.5.tar.gz
network monitoring securiy tool(NIDS) in linux
intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack
can also be identified by this network monitoring tool
-
[
Unix_Linux]
protolog-1.0.0.tar.gz
network monitoring securiy tool(NIDS) in linux
intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack
can also be identified by this network monitoring tool
-
[
Unix_Linux]
ng-0.0.2.tar.gz
network monitoring securiy tool(NIDS) in linux
intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack
can also be identified by this network monitoring tool
-
[
Unix_Linux]
portsentry-0.90.tar.gz
network monitoring securiy tool(NIDS) in linux
intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack
can also be identified by this network monitoring tool
-
[
C/C++]
Battle_with_monster.zip
You battle with a monster in which you can attack, defend, or heal. Uses random numbers to decide the attack and healing ammounts. Have fun!
-
[
Java/JSP]
Design.rar
sending intrusion detection for A wireless Intrusion detection system and a new attack model
-
[
PDF]
vm.zip
...
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for ...
-
[
Matlab]
amorph.zip
...
modification. The synchronization is not required in
the algorithm. Experimental results show that the
proposed algorithm can resist on the attack of A/D
and D/A successfully with features of large capacity
and zero bit error. It will be helpful for ...