Description: 本安全评估系统通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测,去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。-assessment of the security system of network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack. Platform: |
Size: 552960 |
Author:石林 |
Hits:
Description: 该项目通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技
术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测,
去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同
时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安
全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。 -the project through the network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack. Platform: |
Size: 1773568 |
Author:大大 |
Hits:
Description: we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, shearing and other common signal attacks. -we embed watermarks in the original circles. In this way, the synchronization issue for watermark embedding and detecting can be best solved. Simulation results show that this method can resist variety of Geometry Attack, such as rotation, scaling, shearing and other common signal attacks . Platform: |
Size: 1024 |
Author:xiaxianming |
Hits:
Description: 针对目前大规模 P2P 系统不能有效处理恶意节点攻击的问题,该文提出一种新的基于信誉与风险评价的
P2P 系统信任模型,该模型考虑到节点的动态行为影响信任度计算的不确定性,引入风险因素,并提出采用信息
熵理论来量化风险,将实体之间的信任程度和信任的不确定性统一起来。仿真试验及分析表明,该信任模型能够有
效识别恶意节点,相比已有的一些信任模型较大程度地提高了系统成功交易率,可以使节点之间更有效地建立信任
关系。
-View of the current large-scale P2P systems can not effectively deal with malicious nodes to attack the problem, the paper presents a new risk assessment based on credibility and trust model of P2P system, the model taking into account the impact of the dynamic behavior of nodes trust the calculation of uncertainty, the introduction of risk factors, and to make use of information entropy theory to quantify the risks, will be the degree of trust between the entities and trust uncertainty unified. Simulation and analysis show that the trust model can effectively identify the malicious node, compared to some of the existing trust model to a greater extent to improve the system the rate of successful transactions, you can make between nodes more effectively to establish a relationship of trust. Platform: |
Size: 97280 |
Author:刘峰 |
Hits:
Description: Robocode是2001年7月在美国IBM 的Web alphaWorks上发布的坦克机器人战斗仿真引擎。与通常玩的游戏不同的是:参赛者必须利用对机器人进行编程,给机器人设计智能来自动指挥它,而不是由键盘、鼠标简单地直接控制。Robocode是一种有趣的竞赛性编程,使用几行简单的代码,就能够让你创建一个活生生的机器人,一个真正的在屏幕上与其他机器人互相对抗的机器人。你可以看到它在屏幕上四处疾驰,碾碎一切挡道的东西。机器人配有雷达与火炮,选手在躲避对手进攻的同时攻击对手,以此来较量得分的多少。Robocode可以让你在娱乐的同时学习与提高Java技术。-Robocode are in July 2001 at the United States on IBM s Web alphaWorks released fighting robot simulation engine tanks. PLAYING the game and usually are different: the participants must use to program the robot to the design of intelligent robot to automatically command it, and not by the keyboard, mouse, easy to direct control. Robocode is a fun competition of programming, easy to use a few lines of code, we can let you create a living robot, a true up at the screen with other robot robot confrontation with each other. You can see it everywhere on the screen galloped all the way crushing things. Robot is equipped with radar and artillery, attack rival players at the same time to avoid attack opponents in order to contest the number of points. Robocode allows you entertainment at the same time enhance Java technology with the study. Platform: |
Size: 3834880 |
Author:jushf |
Hits:
Description: Since the first denial of Service (DoS) attack appears, DoS attacks cause significant financial damage
every year. The majority researchers focus on detection and respond mechanism of DoS, whereas limited progress has
been made in the details of DoS attacks. In this paper, we introduce Custom Audit Scripting Language (CASL) applied
to write simulation program for DoS attacks. Then we take a deep research in the methodology of DoS attacks and
simulate two typical DoS attacks in CASL. Additionally, recent trends of DoS attacks and problems associated with
defending against DoS attacks are also discussed. In short, our simulation attack programs can help examine the nature
of DoS attacks and find the corresponding countermeasures Platform: |
Size: 152576 |
Author:saksss |
Hits:
Description: 在VC++6.0环境下用OPENGL实现了海战场的目标攻击模拟。本程序包括3DMax文件加载,显示;船尾焰绘制等一系列海战场环境的必须元素的绘制和现实源代码。希望对进行这方面研究的人提供帮组。-In VC++6.0 environment to achieve a sea battle with the OPENGL target attack simulation. This process includes 3DMax file loading, display stern flame drawing a series of sea battlefield environment must be drawn and realistic elements in the source code. Want to study in this area to provide help groups. Platform: |
Size: 18255872 |
Author:zihuizhang |
Hits:
Description: In this paper it is studied the dynamics of the robotic bird. The system performances are analyzed in terms of time response and robustness. It is study the relation between the angle of attack and the velocity of the bird, the tail influence, the gliding flight and the flapping flight. In this model, a bird flies by the wind beat motion or using its tail down. The results are positive for the construction of flying robots. The development of computational simulation based on the dynamic of the robotic bird that should allow testing strategies and algorithms of control. Platform: |
Size: 474112 |
Author:MicaelSteel |
Hits:
Description: This paper presents the development of computational
simulation and a robotic prototype based on the
dynamics of a robotic bird. The study analyze the wing angle
of attack and the velocity of the bird, the tail influence,
the gliding flight and the flapping flight with different
strategies and algorithms of control. The results are positive
for the construction of flying robots and a new generation of
airplanes developed to the similarity of flying animals.
Some highlights are given about the fist implemented
architecture of the structure of a robotic bird. This platform
consists on a body, wings and tail with actuators
independently controlled though a microcontroller a radio
transmission system and batteries are used in order to avoid
wired connections between the computer and the robot.-This paper presents the development of computational
simulation and a robotic prototype based on the
dynamics of a robotic bird. The study analyze the wing angle
of attack and the velocity of the bird, the tail influence,
the gliding flight and the flapping flight with different
strategies and algorithms of control. The results are positive
for the construction of flying robots and a new generation of
airplanes developed to the similarity of flying animals.
Some highlights are given about the fist implemented
architecture of the structure of a robotic bird. This platform
consists on a body, wings and tail with actuators
independently controlled though a microcontroller a radio
transmission system and batteries are used in order to avoid
wired connections between the computer and the robot. Platform: |
Size: 369664 |
Author:MicaelSteel |
Hits:
Description: 利用弹簧近似和网格重构相结合的非结构动网格技术,耦合求解 Euler方程及弹道方程,模拟飞行在 46千
米高空、0°攻角、马赫数6.5、壳片分离初速分别为 6mPs ,12mPs、壳片分离角速度分别为 0°/s ,50°/s ,150°/s的子母弹
抛壳动态过程。-The use of spring approximation and mesh reconstruction of a combination of non-structural dynamic grid technology, coupled equations for solving Euler equations and ballistics, flight simulation at 46 km altitude, 0 ° angle of attack, Mach 6.5, the shell-chip separation velocity, respectively 6mPs , 12mPs, angular separation of the shell pieces were 0 °/s, 50 °/s, 150 °/s of the cluster bombs thrown shell dynamic process. Platform: |
Size: 471040 |
Author:王顺红 |
Hits:
Description: 基于回声隐藏的信息隐藏算法,是一种音频信号的水印技术,包括隐藏信息的嵌入和提取,以及对于噪声,MP3压缩,滤波,重采样和延迟攻击的模拟。-Based on echo hiding information hiding algorithm, is an audio signal watermarking techniques, including embedding and extracting hidden information, as well as for noise, MP3 compression, filtering, resampling and delay attack simulation. Platform: |
Size: 529408 |
Author:张小小 |
Hits:
Description: 本文采用了一种层次化、组件自治的仿真平台_J.Sim,对该平台
下的无线传感器网络相关组件进行了扩展。针对MAC协议的能量有效性
和底层可能遭受的攻击行为,进行了一系列的仿真实验,输出了相关的
能耗图。通过与其它MAC能耗仿真结果对比和底层攻击仿真结果分析,
我们得出该协议有着较好的能量有效性和攻击应对能力。-As the hardware platform iS lacked.we choose the J.Sim simulator
which is built upon the notion of the autonomous component programming
Ⅱ
model to test the performance of MAC.As tlle energy efficiency is considered
as the most important attribute of one MAC protoc01.we have made some
experiments on the attribute.In addition,we simulate some attacks on the
bottom—layer,and then test the effect of the early.warning algorithm.In view
of the comparison withⅣ认C energy consumption and the attack simulation
results,MAC achieves a good energy efficient and bottom.1ayer attack
responsibility. Platform: |
Size: 4249600 |
Author:陈过 |
Hits:
Description: 用WEB 压力测试工具模拟请求服务的DOS 攻击.-WEB stress test tools with a request service DOS attack simulation Platform: |
Size: 3021824 |
Author:pudn2011 |
Hits:
Description: fira5v5仿真源程序,此代码速度非常快,攻击力非常猛。编程者在此基础上肯定能修改出非常好的比赛程序。祝比赛成功!-fira5v5 simulation source code, this code is very fast, very fierce attack. On this basis, the programmer must be able to modify a very good game program. Good game success!
Platform: |
Size: 2280448 |
Author: |
Hits:
Description: 以下是有关弹道方面的一些仿真程序,有关次专业的同僚可一起探讨,为中华之强胜而奋斗
附件包括:
1、战术导弹导弹弹道仿真程序
2、攻击垂直机动目标比例导引三维弹道仿真
3、空地导弹弹道仿真程序
4、倾斜平面三点法攻击机动目标弹道仿真程序-The following is the ballistic aspects of the simulation program, and related sub-professional colleagues can explore China a strong win the struggle
Accessories include:
A tactical missile missile trajectory simulation program
2, attack vertical maneuvering target ratio of guided three-dimensional trajectory simulation
Ground missile trajectory simulation program
Inclined plane three-point method to attack maneuvering target trajectory simulation program
Platform: |
Size: 20480 |
Author:战斗机 |
Hits:
Description: 本代码是在NS2软件中通过tcl语言实现DoS网络攻击模拟的。-The code is in the NS2software, through the Tcl language to achieve DoS network attack simulation. Platform: |
Size: 10240 |
Author:福福 |
Hits:
Description: 本程序为抗JPEG压缩的半脆弱性彩色图像数字水印,主要原理为DCT转换和DCT系数比较法,内含5中攻击仿真测试以及GUI界面,测试环境为MATLAB2009a,系本人2013年本科毕业设计-The procedures for the anti-JPEG compression semi-fragile color image watermarking, the main principle is the DCT transform and DCT coefficients comparative law, including five in the attack simulation testing and GUI interface, the test environment is MATLAB2009a, Department I graduated design 2013 Platform: |
Size: 4152320 |
Author:hanzitong |
Hits: