切换至中文 Over 1 million code package, 10 million code file free download
Keywords:
  • [Unix_Linux] ippl-0.13.tar.gz network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
    Category: Linux Network Upload User:nichaochun Size:26K
  • [Unix_Linux] netguard-1.0.0.tar.gz network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
    Category: Linux Network Upload User:jzlitai Size:6K
  • [Unix_Linux] jail-1.5.tar.gz network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
    Category: Linux Network Upload User:ismay2699 Size:20K
  • [Unix_Linux] protolog-1.0.0.tar.gz network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
    Category: Linux Network Upload User:yuhua18 Size:17K
  • [Unix_Linux] ng-0.0.2.tar.gz network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
    Category: Linux Network Upload User:alin2320 Size:2K
  • [Unix_Linux] portsentry-0.90.tar.gz network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
    Category: Linux Network Upload User:zixieer Size:37K
  • [C/C++] Battle_with_monster.zip You battle with a monster in which you can attack, defend, or heal. Uses random numbers to decide the attack and healing ammounts. Have fun!
    Category: Windows Develop Upload User:blenddy Size:2K
  • [Java/JSP] Design.rar sending intrusion detection for A wireless Intrusion detection system and a new attack model
    Category: Java Develop Upload User:lxywjhly Size:3K
  • [PDF] vm.zip ... modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for ...
    Category: Project Design Upload User:ova713 Size:203K
  • [Matlab] amorph.zip ... modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for ...
    Category: Project Design Upload User:lhy_aice Size:195K