搜索结果

找到约 29 项符合 Exploit 的查询结果

书籍 Feedback+Strategies+for+Wireless+Communication

During the past decade, many wireless communication techniques have been developedto achievevariousgoals suchas higherdata rate,morerobustlink quality, and higher number of users in a given bandwidth. For wireless communication systems, depending on the availability of a feedback link, two approache ...
https://www.eeworm.com/dl/521902.html
查看: 75

技术资料 A_Guide_to_Kernel_Exploitation

A Guide to Kernel Exploitation,Attacking the Core --- With the number of security countermeasures against user-land exploitation greater than ever these days, kernel-level exploitation is becoming increasingly popular among attackers and, generically, exploit writers. Playing with the heart of a c ...
https://www.eeworm.com/dl/979681.html
下载: 8
查看: 9324

Delphi控件源码 *** HyperString v6.0 *** (c)1996-2000 EFD Systems, All rights reserved

*** HyperString v6.0 *** (c)1996-2000 EFD Systems, All rights reserved efd@mindspring.com *** THIS IS NOT PUBLIC DOMAIN SOFTWARE *** See below for license agreement, disclaimer, installation and use. Introduction ------------- ...
https://www.eeworm.com/dl/666/460841.html
下载: 196
查看: 1111

文件格式 We present a particle filter construction for a system that exhibits time-scale separation. The sep

We present a particle filter construction for a system that exhibits time-scale separation. The separation of time-scales allows two simplifications that we exploit: i) The use of the averaging principle for the dimensional reduction of the system needed to solve for each particle and ii) the factor ...
https://www.eeworm.com/dl/639/241531.html
下载: 80
查看: 1093

Internet/网络编程 工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com /

工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com // GDI+ buffer overrun exploit by FoToZ // NB: the headers here are only sample headers taken from a .JPG file, // with the FF FE 00 01 inserted in header1. // Sample shellco ...
https://www.eeworm.com/dl/620/107062.html
下载: 170
查看: 1095

技术资料 超越Hadoop的大数据技术:用Spark 和Shark进行基于内存的实时大数据分析

超越Hadoop的大数据技术:用Spark 和Shark进行基于内存的实时大数据分析Big Data beyond Hadoop Big Dta today • The is in the room Big Data beyond Hadoop • Real-time analytical processing (RTAP) – Discover and explore data iteratively and interactively for real-time insights • Advanced machine leaning ...
https://www.eeworm.com/dl/896513.html
下载: 7
查看: 4394

Internet/网络编程 I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. ...
https://www.eeworm.com/dl/620/152835.html
下载: 92
查看: 1097

论文 Large-scale+Antenna+Systems

To meet the future demand for huge traffic volume of wireless data service, the research on the fifth generation (5G) mobile communication systems has been undertaken in recent years. It is expected that the spectral and energy efficiencies in 5G mobile communication systems should be ten-fold highe ...
https://www.eeworm.com/dl/521948.html
查看: 72

技术资料 基于单片机的智能轮椅控制系统设计

为提高轮椅使用者的生活自理能力,本文提出一种智能轮椅控制系统.该系统由STM32单片机进行控制,采用模块化、系统化设计,电源模块、摇杆模块、避障模块、驱动模块构成有机整体,各个模块共同作用、相互协调,共同构成了一个安全可靠的轮椅控制系统.通过通信设计可实现模块间数据的发送与接收.该轮椅设置手动控制和自动控制两种 ...
https://www.eeworm.com/dl/897687.html
下载: 9
查看: 472