登录
首页 » Unix_Linux » mpolsr_NS2

mpolsr_NS2

于 2012-01-10 发布 文件大小:50KB
0 102
下载积分: 1 下载次数: 11

代码说明:

  ns 2 simulator in secure routing protocols for mibile ad-hoc networks . it`s sample example explan how to begin with the simulation

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • feijishugongji
    《菜鸟也能防黑客之非技术攻击》就是向大家介绍这种方法。正如书名所述,这些方法并不是多么高深的技米,你也一样可以做到。看过《菜鸟也能防黑客之非技术攻击》之后,你会发现在非技术攻击面前,那些所谓的高科技设备是多么的脆弱。想知道黑客怎样从电脑中获取数据而不留痕迹吗?如何不用碰键盘就能侵入邮件服务器吗?这不是魔幻大片,而是真真正正发生在我们身边。 我们都知道信息的重要性。随着计算机时代的来临,大量的信息以电子的形式存储。而用高科技的电子保护系统来保护信息也就是自然而然的事情。作为一名职业黑客,作者的主要工作就是发现这些系统的弱点。在一次又一次的入侵后,作者发现了可以绕开那些所谓高科技防御系统的方法。 你和你身边的人很可能现在就正在受到此种攻击,你准备好了吗?("Rookie also can prevent unskilled hackers attack" is to introduce this method. As the title said, these methods are not rocket technology meters, you can do it too. Read the "rookie can prevent unskilled hackers attack" after, you will find in front of non-technical attacks, how fragile is the so-called high-tech equipment. Want to know how to get data from hackers computer without leaving traces of it? How not to touch the keyboard can invade the mail server? It s not magic movies, but really in our midst. We all know the importance of information. With the advent of the computer age, a lot of information stored in electronic form. And with high-tech electronic protection systems to protect information that is a natural thing. As a professional hacker, author of the main job is to find weaknesses in these systems. Again and again after the invasion, the authors found that can bypass the so-called high-tech defense systems. You and the people around you are likely to suffer such att)
    2013-12-06 14:56:44下载
    积分:1
  • kinglie_v79
    感应双馈发电机系统的仿真,真的是一个好程序,遗传算法无功优化。( Simulation of doubly fed induction generator system, Really is a good program, Genetic algorithm based reactive power optimization.)
    2021-04-29 11:18:43下载
    积分:1
  • Multi-componentsNeuralNetworkandTimeSeriesPredicti
    利用神经网络预测时间序列,以太阳黑子和实际的转子故障信号为例,matlab编程(Using neural network time series prediction to sunspots and the actual rotor fault signal as an example, matlab programming)
    2008-07-27 16:03:23下载
    积分:1
  • 查询某IP地址的计算机是否在局域内,有可执行文件
    查询某IP地址的计算机是否在局域网内,有可执行文件-Query a computer IP address in the LAN, have an executable file
    2023-02-17 10:45:03下载
    积分:1
  • EIGHTNUM
    八数码 大家看看就知道了 宽度搜索 怎么非得够20个子呢?()
    2008-05-14 20:49:53下载
    积分:1
  • Java技术┃JSP相关
    Java技术┃JSP相关-Java technology highlights relevant JSP
    2022-01-31 19:51:56下载
    积分:1
  • nettalk a good Internet phone source code hope you like
    nettalk 一个很好的网络电话源代码 希望大家喜欢-nettalk a good Internet phone source code hope you like
    2023-03-24 19:35:04下载
    积分:1
  • Neural-network-hanshunihe
    设计并训练一神经网络使之逼近下列函数,x,y取值范围(0,3),函数精度0.02。函数为三角函数(Design and training of a neural network approximation the following functions, x, y in the range (0,3), the function accuracy 0.02. Function trigonometric functions)
    2013-03-17 12:36:00下载
    积分:1
  • 一个好的爬行
    一个不错的爬虫程序,可以下载制定网页的内容。-a good crawl
    2023-01-24 11:15:04下载
    积分:1
  • pp14
    说明:  潮流计算程序 采用前推回代方法。在配电网的潮流计算中,与输电网不同,输电网是闭环运行。配电网开环运行 (Flow calculation program uses forward and backward substitution method. The trend in the calculation of distribution network, with different transmission grid, transmission is the closed-loop operation. Distribution Network runs open-loop)
    2011-04-18 16:54:16下载
    积分:1
  • 696516资源总数
  • 106783会员总数
  • 25今日下载