Ns2 wormhole attack jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    8,003 ns2 wormhole attack jobs found, pricing in USD

    I require a Fluent analysis of the model, mainly Aerodynamic analysis at 3 different speeds of 6 m/s, 10 m/s and 14 m/s for angle of attack of 0,3,6,9,12 and 15 degrees for each speed. Its pretty straightforward and all you will have to do is change the values I presume.

    $87 (Avg Bid)
    $87 Avg Bid
    14 bids

    We have the web design (front-end) of our new page [login to view URL] we need the following: 1) The design (front-end) must be 100% responsive, impr...(cache 1 day) and a url to clean the cache of the entire site 5) maximum load time should be maximum of 5 seconds 6) You must have security to avoid DDOS attacks or some other attack.

    $200 (Avg Bid)
    $200 Avg Bid
    13 bids

    ...1 - Horried crocodile: It will jump and fly over the screen and through fire shoots over player. 2 - Honey Bee will fly on the screen with a strong sound of bizzzzz and attack with its stink player has to escape from its range or can kill by throwing hammers on it. 3 - Rolling Cat: Cat will roll like a ball and hit the player he has to jump over

    $153 (Avg Bid)
    $153 Avg Bid
    15 bids
    UI Game 2D 4 days left

    Hi, I need 1 artist UI game for game 2D. Requirement 1. Main UI - Joystick - HP/ ...Requirement 1. Main UI - Joystick - HP/ MP - Popup chat - Icon - Tile - Background 2. 2 Characers - Include animation (idle, run, fly, die) - Can change equipment. - Can attack (normal) - Can attack skill 3. 1 NPC - UI talking with NPC - Has a menu for choose option.

    $150 (Avg Bid)
    $150 Avg Bid
    8 bids

    Please check my description BEFORE you apply. After a recent malware attack I have updated all my wordpress plug-ins. As a result one of the processes on website has became REALLY slow or hangs altogether. I need to get it working the way it was before. I don't know if it is caused be the plug-in updates or the malware. The website is wordpress

    $34 (Avg Bid)
    $34 Avg Bid
    9 bids

    ...need is a Manticor, a winged lion chimera with a scorpion tail. You can decide, whether it moves by flying or walking (it can fly, but its not necessary that it does). For the attack and combat art, you can choose freely from paws, wing-talons (if any), bite and scorpion tail. A few impressions can be seen here: [login to view URL]

    $123 (Avg Bid)
    $123 Avg Bid
    1 bids

    We do have 3 Servers where is ISPConfig installed. One Server is the Main Server who is managing the other servers....our server was attacked. in the log files we saw multiple attacks on the server and database. We also want the have blocked some hosts form outside Europe, so that they can't attack anymore. maybe the ISP config Database is also hacked

    $134 (Avg Bid)
    $134 Avg Bid
    19 bids

    ...KYOKO BAERTSOEN - known for her work with Lunascape and Hooverphonic (for full song, please PM us; lyrics below). The song is a dark triphop sound, think of moby / masstive attack / faithless but a bit darker and rougher to make it more edgier and real. Some examples of people we worked with in the past, where we exposed their work to our fans. - https://www

    $1215 (Avg Bid)
    $1215 Avg Bid
    26 bids
    adversarial machine learning 1 day left
    VERIFIED

    You will create convolutional neural network for online database and fine accuracy of classifier then u will adding some poise it means exposure an attack to degregate classifier performance

    $60 (Avg Bid)
    $60 Avg Bid
    5 bids

    Make presentation slides up to 10 , simply fill the slides with content related to the topic . slides looks good .The topic is Brute force Algorithem/Attack.

    $27 (Avg Bid)
    $27 Avg Bid
    30 bids

    Need hosting and domain registration with instant activation. Need secure server. that protects our files from any attack.

    $159 (Avg Bid)
    $159 Avg Bid
    21 bids

    Hi plane4you, need 5 more articles related to diet and nutrtionist targeting dietbities, sugar, heart attack, high blood presure and different diets that can help them [login to view URL] need 3 heading for same title for seo

    $50 (Avg Bid)
    $50 Avg Bid
    1 bids

    Hi Guys, I have about 20+ characters I will like to animate in Spine. [login to view URL] I will...[login to view URL] my characters are created similar to the artwork in the video I will need animations for each character - idle - walk - attack - hard attack My budget is $10 per character for 20 characters? Thanks

    $162 (Avg Bid)
    $162 Avg Bid
    10 bids

    ...to increase the risk of an electronic attack on the rail infrastructure, as it brings more systems under centralised control. Consequently, the railway industry and government identified a need to understand the security implications of the new technology. structured as follows: Introduction, Main threats, Attack scenarios, Countermeasures, Conclusion

    $137 (Avg Bid)
    $137 Avg Bid
    26 bids

    ...called "Save Your Nuts". We are looking for a 3D artist to the modelization for a Raccoon (cartoon style), with 4 textures and 6 animations (idle, run, horizontal attack, vertical attack, jump, dig). We provide art direction with character illustration and examples of others character already integrated into the game. Video and details of the game:

    $421 (Avg Bid)
    $421 Avg Bid
    36 bids

    ...to continue. This would not be a problem because I paid for it. However, the check fails frequently due to problems on the developer's system (I'm not sure, he is under ddos attack, his system it's simply not working well) and my users suffer a lot from this issue. I need two things: 1) Remove the obfuscation 2) Remove the queries to the developer's

    $110 (Avg Bid)
    $110 Avg Bid
    14 bids

    Hi Farid, next creature i need is a scarab, a co...ers:fixed_height(100,100):origin()/pre00/cd89/th/pre/i/2007/273/8/3/[login to view URL] Again with four animations: - Move - Idle - Attack - Combat Art (a defensive one, not an attack) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian

    $125 (Avg Bid)
    $125 Avg Bid
    1 bids

    Wireless Sensor Network MAC Protocol using NS2

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    1 bids

    ...for us and created the system, and threated to sabotarge it. So we assume the hacker knows the complete source code of the server. Probably some kind of code/SQL injection attack. I've resetted the hosting account password and cPannel/FTP password since we took the server back several months ago. So only me and another Freelancer who is making an alternative

    $500 (Avg Bid)
    $500 Avg Bid
    1 bids

    This is for a cyber exercise scenario. I wanted to have a scenario where a malicious hacker is able to alter the applications program of payment system to cause dis...masked out and non-identifiable. There must be end to end steps description how this can be done, including what are the processes and what parameters to be set to enable such attack.

    $371 (Avg Bid)
    $371 Avg Bid
    5 bids

    I need you help in designing Adaptive Duty Cycling Scheme for Wireless Sensor Network MAC Protocol using Matlab or NS2/3. Please read the paper [login to view URL] in detail and if you have the ability to implement it using matlab or ns2/3 you can bid and contact me. Thank you. Regards,

    $246 (Avg Bid)
    $246 Avg Bid
    6 bids

    ...Foxes will keep dropping from the Helicopters, and your job is to shoot them before they get you. The massive game play trailer opens with a gag as the foxes preparing for the attack while the bunnies are taking positions on the ground. The intro part requires a bit more serious read, imagine that you are doing a low-key sport broadcast on radio. The rest

    $50 (Avg Bid)
    $50 Avg Bid
    1 bids

    ...automatically ban attackers and threats when bad behavior is detected. Threat Logs Each threat and attack is logged into the database, so you can view them later. (No duplicates) Detailed Logs The logs contain many information about the Threat / Attack like Browser, Operating System, Country, State, City, User Agent, Location and other useful information

    $198 (Avg Bid)
    $198 Avg Bid
    12 bids

    ...types of traffic. 4. Select a more secure method of cross site communication. 5. Design wireless networks to be secure as possible. 6. Design security so they can monitor any attack. 7. Insure outside traffic never connects to the internal network. 8. Insure their data is secure in all three states. 9. All departments are segmented from the others, but

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    26 bids

    ...FEMALE for casting (superhero and enemy roles). You have to be liberal, creative, open minded and cooperative. The acting will be for a cinematic movie talking about aliens who attack earth and the rise of superhero. The story, storyboard, technical info will be provided later. The procedure is as following: 1- You bid 2- We discuss details on freelancer

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    7 bids

    three questions 1. Question 1; Choose one case of the following and what would you do? (3 points) 2. Question 2; Apply ethics ...points) 2. Question 2; Apply ethics in IT Professional environments? (3 points) 3. Question 3; Mention some cases of cyber attacks in kingdom of saudi arabia and anti-cyber attack law in kingdom of saudi arabia? (4 points

    $65 (Avg Bid)
    $65 Avg Bid
    42 bids

    I need experts in NS2 and NS3 for a long term project. Details will be given on PM

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    3 bids

    In the Input section the database(Collection of Email like 10,000 mails), Pre-filter and classifier( based on the Naive Baye's algorithm) link attached at the bottom. In Output section, it should be a Spam mail and Non-Spam mail. 1) Use of Dynamically modifying database to store the previously checked Emails and program to append currently scanning Emails. 2) Percentage of Spam. 3) Efficienc...

    $253 (Avg Bid)
    $253 Avg Bid
    8 bids

    Program stop accepting connections at DOS attack

    $208 (Avg Bid)
    $208 Avg Bid
    12 bids

    ...DPM and APM numeric value). Basically some math will need to be done to get these values based on the following. if the weight is 1, he can attack 10 times per minute. for each extra weight, he can attack one time fewer as shown in the following (defense works with similar formula): Weight = 1, 10 attacks per minute. Weight = 2, 9 attacks per minute

    $35 (Avg Bid)
    $35 Avg Bid
    24 bids

    I want to create an algorithm in ns2 for wireless sensor and actor networks. there will be multi-hop clustering in network, all the node will be static except the actor nodes (they are remote). cluster heads will have backup cluster heads.

    $707 (Avg Bid)
    $707 Avg Bid
    3 bids

    ...the result of what is known as a reflection / amplification denial of service (DoS) attack. What this means is that certain ports (in this case, UDP Port 111) can be made to respond to a malicious request, with a lot of traffic being sent to the target of the DoS attack (in this case, Google IP addresses were the targets of the DoS, and your EC2 Instances

    $75 (Avg Bid)
    $75 Avg Bid
    10 bids

    I need a 3D model of Heart attack detector ring This ring can detect heart attack symptoms and starts an alarm when it detects one and send a message to the emergency if you don't turn the alarm off in one minute.

    $103 (Avg Bid)
    $103 Avg Bid
    19 bids

    Hi Farid, next creature i need is...com/originals/54/ab/49/[login to view URL] [login to view URL] Again with four animations: - Move - Idle - Attack - Combat Art (be creative ;) As discussed, bonus for the last project is included for accounting reasons. Best regards Damian

    $125 (Avg Bid)
    $125 Avg Bid
    1 bids

    ...animations and simple gun, bat or knife particle type cut or gun shot shown on eitehr you as your hit or the computer. 5.) You or the Computer draw a weapon card, that has an attack attribute. Either a Knife, a Bat, a Hand Gun, or a Machine Gun. This is the weapon card you have the duration of that game instance. 6.) Knife can cause 5 damage points, bat

    $572 (Avg Bid)
    $572 Avg Bid
    10 bids

    I need you to write a research article on ddos attack on exchange server. it should be case study.

    $89 (Avg Bid)
    $89 Avg Bid
    34 bids

    I have code you just have to run it on my ns2 Also 1 more is to edit netanim animation just write names on each node thats it

    $25 (Avg Bid)
    $25 Avg Bid
    1 bids

    Looking for a professional penetration tester to test my server in order to determine if it's vulnerable to any attack

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    29 bids

    ...will choose between male or female character, just one of each to start. You will have a base health, base intellgence, base attack and defense. Weapon and defense cards are pulled during the game to be able to help with attack and help with defense. 8. You fight to win a street corner. You fight to won both corners and therefore own the street. 9.

    $1268 (Avg Bid)
    $1268 Avg Bid
    36 bids

    I am looking for someone who can perform DDoS attack on my website so i can test security levels of my website. I will also expect you to teach me how to perform DDoS attack

    $143 (Avg Bid)
    $143 Avg Bid
    15 bids

    ...normal flow or anormal flow I mean there is attack or non attack network flow. This dataset is really huge so I have small part of this dataset and you can work on it . you can see attached this dataset.(Excel format). My expectation is that createing a neral network classifier to decide whether there is attack or not. I am not looking perfect classifier

    $65 (Avg Bid)
    $65 Avg Bid
    14 bids

    My website [login to view URL] needs about 40 seconds to load and it is due to some PHP process that is running on background and to few malwar...net and some other scans. The work is about cleaning this website (hosted on an economy shared-hosting on [login to view URL] and with Cloudflare) and to secure it to avoid any other attack. Thank you

    $138 (Avg Bid)
    $138 Avg Bid
    64 bids
    Trophy icon Design a Logo Ended

    ...specialise in antivirus and ransomware protection for businesses, offering state of the art monitoring and fortification solutions to suit your budget. WannaCry ransomware attack was one of the biggest and well know that’s why our name is going to be Wannasmile I want the logo to be sharp and edgy maybe with a smile of sort incorporated in the logo

    $52 (Avg Bid)
    Guaranteed
    $52
    144 entries

    ...three alerts, 1: General Alarm: that sounds when our entire guild are being attacked. 2: Shield Alarm: that sounds when the shield of an member ends and he are vulnerable 3: attack Alarm: that sounds when the guild member are being attacked, so he need to enter fastly to the game and put shield. the alarm sound need to be different and need to sound

    $188 (Avg Bid)
    $188 Avg Bid
    8 bids

    HI , i am building an app and i want to evaluate the security of the features based on A V Comparatives report of how vulnerable my app will be in...comparison to other known security phone apps i need to evaluate the score based on criteria of phone device vulnerability such as microphone access permission can be used for attack on phone for instance

    $137 (Avg Bid)
    $137 Avg Bid
    7 bids

    I help in designing Adaptive Duty Cycling Scheme for Wireless Sensor Network MAC Protocol using Matlab or NS2/3. Implementation using NS2/3 is Preferred. Contact me. Regards,

    $195 (Avg Bid)
    $195 Avg Bid
    8 bids

    I need you to create me a vulner...to SQLi that can can edit, add, view the table. There should be an button where it shows the table of the database that can be penetrated. There should be a button with an attack scenario where the code for adding,deleting, editing the table. There's should be reset button where it resets it back to the beginning.

    $25 (Avg Bid)
    $25 Avg Bid
    2 bids

    I help in designing Adaptive Duty Cycling Scheme for Wireless Sensor Network MAC Protocol using Matlab or NS2/3. Implementation using NS2/3 is Preferred. Contact me. Regards,

    $167 (Avg Bid)
    $167 Avg Bid
    4 bids