搜索结果
找到约 29 项符合
Exploit 的查询结果
按分类筛选
书籍 Feedback+Strategies+for+Wireless+Communication
During the past decade, many wireless communication techniques have been
developedto achievevariousgoals suchas higherdata rate,morerobustlink quality,
and higher number of users in a given bandwidth. For wireless communication
systems, depending on the availability of a feedback link, two approache ...
技术资料 A_Guide_to_Kernel_Exploitation
A Guide to Kernel Exploitation,Attacking the Core
---
With the number of security countermeasures against user-land exploitation greater
than ever these days, kernel-level exploitation is becoming increasingly popular
among attackers and, generically, exploit writers. Playing with the heart of a c ...
Delphi控件源码 *** HyperString v6.0 *** (c)1996-2000 EFD Systems, All rights reserved
*** HyperString v6.0 ***
(c)1996-2000 EFD Systems, All rights reserved
efd@mindspring.com
*** THIS IS NOT PUBLIC DOMAIN SOFTWARE ***
See below for license agreement, disclaimer, installation and use.
Introduction ------------- ...
文件格式 We present a particle filter construction for a system that exhibits time-scale separation. The sep
We present a particle filter construction for a system that exhibits
time-scale separation. The separation of time-scales allows two simplifications
that we exploit: i) The use of the averaging principle for the
dimensional reduction of the system needed to solve for each particle
and ii) the factor ...
Internet/网络编程 工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com /
工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com // GDI+ buffer overrun exploit by FoToZ // NB: the headers here are only sample headers taken from a .JPG file, // with the FF FE 00 01 inserted in header1. // Sample shellco ...
技术资料 超越Hadoop的大数据技术:用Spark 和Shark进行基于内存的实时大数据分析
超越Hadoop的大数据技术:用Spark 和Shark进行基于内存的实时大数据分析Big Data beyond Hadoop
Big Dta today
• The is in the room
Big Data beyond Hadoop
• Real-time analytical processing (RTAP)
– Discover and explore data iteratively and interactively for real-time insights
• Advanced machine leaning ...
Internet/网络编程 I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco
I. Introduction
This code exploits a previously undisclosed vulnerability in the bit string
decoding code in the Microsoft ASN.1 library. This vulnerability is not related
to the bit string vulnerability described in eEye advisory AD20040210-2. Both
vulnerabilities were fixed in the MS04-007 patch. ...
论文 Large-scale+Antenna+Systems
To meet the future demand for huge traffic volume of wireless data service, the research on the fifth generation
(5G) mobile communication systems has been undertaken in recent years. It is expected that the spectral and energy
efficiencies in 5G mobile communication systems should be ten-fold highe ...
技术资料 基于单片机的智能轮椅控制系统设计
为提高轮椅使用者的生活自理能力,本文提出一种智能轮椅控制系统.该系统由STM32单片机进行控制,采用模块化、系统化设计,电源模块、摇杆模块、避障模块、驱动模块构成有机整体,各个模块共同作用、相互协调,共同构成了一个安全可靠的轮椅控制系统.通过通信设计可实现模块间数据的发送与接收.该轮椅设置手动控制和自动控制两种 ...