Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.
標簽: keys Aircrack-ng cracking WPA-PSK
上傳時間: 2013-12-25
上傳用戶:bruce
FERRET - a broadcast analysis tool This tool is designed to demonstrate the problem of "data seapage". The average machine broadcasts a lot of information about itself on open networks. This tool captures and organizes this information. This code is extremely low quality, hacked together in order to demonstrate the problem at the BlackHat Federal 2007 conference. Higher quality code should be available around May 2007 on our website at http://www.erratasec.com.
標簽: tool demonstrate broadcast analysis
上傳時間: 2013-11-30
上傳用戶:1101055045
Model for Opnet. Use this model to generate traffic between source and destination pairs. The resultant traffic file can then be imported into the networks to mimic traffic patterns and represent background loading on a network
標簽: destination generate between traffic
上傳時間: 2017-08-06
上傳用戶:gaome
Abstract—Stable direct and indirect decentralized adaptive radial basis neural network controllers are presented for a class of interconnected nonlinear systems. The feedback and adaptation mechanisms for each subsystem depend only upon local measurements to provide asymptotic tracking of a reference trajectory. Due to the functional approximation capabilities of radial basis neural networks, the dynamics for each subsystem are not required to be linear in a set of unknown coeffi cients as is typically required in decentralized adaptive schemes. In addition, each subsystem is able to adaptively compensate for disturbances and interconnections with unknown bounds.
標簽: decentralized controllers Abstract adaptive
上傳時間: 2017-08-17
上傳用戶:gdgzhym
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.
標簽: cryptographic applications attractive for
上傳時間: 2013-12-07
上傳用戶:zhuimenghuadie
Adaptive Coordinated Medium Access Control (AC-MAC), a contention-based Medium Access Control protocol for wireless sensor networks. To handle the load variations in some real-time sensor applications, ACMAC introduces the adaptive duty cycle scheme within the framework of sensor-MAC (S-MAC).
標簽: Control Access Medium contention-based
上傳時間: 2014-12-22
上傳用戶:gundan
Abstract-In this paper, simple autonomous chaotic circuits coupled by resistors are investigated. By carrying out computer calculations and circuit experiments, irregular self-switching phenomenon of three spatial patterns characterized by the phase states of quasi-synchronization of chaos can be observed from only four simple chaotic circuits. This is the same phenomenon as chaotic wandering of spatial patterns observed very often from systems with a large number of degrees of freedom. Namely, one of spatial-temporal chaos observed from systems of large size can be also generated in the proposed system consisting of only four chaotic circuits. A six subcircuits case and a coupled chaotic circuits networks are also studied, and such systems are confirmed to produce more complicated spatio-temporal phenomena.
標簽: investigated Abstract-In autonomous resistors
上傳時間: 2014-06-09
上傳用戶:h886166
The goal of this thesis is the development of traffic engineering rules for cellular packet radio networks based on GPRS and EDGE. They are based on traffic models for typical mobile applications. Load generators, representing these traffic models, are developed and integrated into a simulation environment with the prototypical implementation of the EGPRS protocols and models for the radio channel, which were also developed in the framework of this thesis. With this simulation tool a comprehensive performance evaluation is carried out that leads to the traffic engineering rules.
標簽: development engineering cellular traffic
上傳時間: 2014-01-11
上傳用戶:Miyuki
Pattern Analysis is the process of fi nding general relations in a set of data, and forms the core of many disciplines, from neural networks to so-called syn- tactical pattern recognition, from statistical pattern recognition to machine learning and data mining. Applications of pattern analysis range from bioin- formatics to document retrieval.
標簽: the relations Analysis Pattern
上傳時間: 2017-09-07
上傳用戶:SimonQQ
達拉斯 1-Wire 主機通信 這份資料展示了如何把 1-Wire 主機通信在應用到一個AVR系統中,不僅僅是在軟件方面,還有U(S)ART模式下的應用。
上傳時間: 2017-09-10
上傳用戶:lijinchuan