Relationship Between Rorschach Aggression Variables and Explicit Hostility;
罗夏测验攻击变量与外显攻击敌意的关系
Rorschach Aggression Variables:A Study of Reliability and Validity;
罗夏测验攻击变量的信度效度研究
Correlation between Personality and Rorschach Aggression Variables;
人格特征与罗夏测验攻击变量的相关性研究
The prevention technology for ARP virus attack;
浅谈ARP病毒攻击的防御技术
Prevention of attack on overflowing loopholes in buffer of Linux system;
对Linux系统缓冲区溢出漏洞攻击的防范
This paper deeply analyses the principle and possiblility of buffer overflow attacking,and buffer overflow s potential dangers according to program code with buffer overflow.
针对C程序语言本身存在的不进行数组边界检查,容易产生缓冲区溢出,进而产生系统瘫痪等缺陷,对缓冲区溢出的原理和溢出攻击进行了详细的阐述。
This paper briefly introduces the general outline of the Okamato E cash scheme and one attacking method against this scheme,discusses the attacking principles and provides some mends and reinforcements for the Okamato E cash schem
本文简要综述了电子货币的发展研究过程 ,分析了Okamoto电子货币体系的特点 ,剖析了一种攻击方法 ,对攻击方法做出了理论分析 ,在此基础上探讨了几种抵御攻击的方案 ,最后提出了一种改进的电子货币系
This paper, based on the theory of IPv6, analyzes the security problem of IPv6 and a couple of classic attacking methods and briefly describes the research on information security.
论文从移动IPv6的基本原理入手,分析移动IPv6存在的安全隐患及几种典型的攻击方法,并对其安全性进行了简单的探讨。
Attacks and Counterattacks of Digital Watermarking;
数字水印技术的攻击与反攻击研究
Attacks on Robustness of Digital Watermarking and the Responding Remedies;
数字水印稳健性攻击及相应策略
In this paper,we first analyze the principle of DoS/DDoS attacks,and then we update the classification of DDoS/DRDoS attacks,including 3 categories such as TCP/IP protocol vulnerabilities attacks,software vulnerabilities attacks and brute-force attacks.
DDoS攻击(包括DRDoS攻击)给网络安全带来了巨大的危害。