Attack simulation ns2 jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
Job State
11,970 attack simulation ns2 jobs found, pricing in USD

I have a few websites and I need to test. I need someone who is smart and can get to the website. let me know your price.

$122 (Avg Bid)
$122 Avg Bid
5 bids

...or Developer." "No College No Problem" Milestones 1. Take content given and create a layout plan of all the framework going into creating the different stages. (Plan of attack) 2. Comb through all content given and create a structured curicculuim base that is broken down using the 3 stages Beginner, Intermediate, and Advanced. (Putting the peices

$1072 (Avg Bid)
$1072 Avg Bid
20 bids

the title of simulation is :EMV Protocol Verifications Using AnB Tool upon Visa Card im looking for an a programmer expert on computer security concepts to do the simulation using ANB tool to apply EMV protocol verification

$485 (Avg Bid)
$485 Avg Bid
6 bids

...software to create, read, update and delete the data. Looking for a developer with experience who can first focus on content instead of design and together we can make a clear attack plan for the beginning of the project. User Interface: -search tool -connect e-mail -generating templates ( we will have them ready asap) The software can be similar

$2808 (Avg Bid)
$2808 Avg Bid
57 bids
Ansys simulation 6 days left

I have 2 models on ansys and I need to generate the ansys report for the simulation and with start point medial point and at the end , at each point take the image of heat exchange , the project is heat exchange. like the following paper .

$5 / hr (Avg Bid)
$5 / hr Avg Bid
13 bids

i need a script build for the online multiplayer game command and conquer tiberium alliances. i need it to be an auto simulation to calculate the best attack for the battle [url removed, login to view] to work on chrome/tampermonkey.

$58 (Avg Bid)
$58 Avg Bid
7 bids

...has a card-subtitle as a description of race + subtype ( use Human - Warrior for your designs or any other description you like ) Hero card has 2 main stats: ATK and DEF ( attack & defense ) that starts at 1-3 value and with the continuation of the game increases to 10 at most. Read p3 just below. Hero card has X HP ( use 12 value for your designs

$34 (Avg Bid)
Guaranteed
$34 Avg Bid
1 entries
Swamp Simulation 5 days left

I need assistance with the development of a swamp simulation.

$21 / hr (Avg Bid)
$21 / hr Avg Bid
33 bids

...hero is a swordsman and the enemies are dragons,goblins,monsters etc. Each enemy has its own AI. The player move forwards ,backwards ,up and down and he has the abilities to attack with his sword and fires fireball. Also he can collect power ups in the levels to make it stronger , faster and improves his health. Each level start with 3 lives , if the

$2952 (Avg Bid)
$2952 Avg Bid
92 bids

I am looking for someone to build me a very basic game style simulation of a basketball game. What I am looking for is a basic half court basketball layout. 1 player on offense. 1 player on defense. And then some general commands for the offensive player to move left, right, forward, backward. And the defensive player follows/mimics the offensive player

$257 (Avg Bid)
$257 Avg Bid
26 bids

I need 3 things 1. Check logfiles on cloudserver to determine why server crashes daily 2. Check logfiles to determine what scripts are causing th...cloudserver to determine why server crashes daily 2. Check logfiles to determine what scripts are causing the server to load slowly. 3. Cloudflare Rule setup to stop a ddos attack on a specific page.

$123 (Avg Bid)
$123 Avg Bid
12 bids

...eye something with new and fresh hip hop sound. possibly featuring small glimpse of characters from video games and anime shows in moments of action like Naruto shippuden, attack on titan , dragon ball z and fighting games like naruto ultimate ninja storm 4 , dragon ball fighter z and other games. so someone knowledgable in the field of gaming would

$328 (Avg Bid)
$328 Avg Bid
46 bids

I need a code in C++ with OpenGL to create a simulation of a rigid body fracture with meshes. I will need to simulate specially objects falling and brittle fracturing for the object. Any kind of object could be use, and any algorithm can be used to do the simulation. Nevertheless, you can use this paper as a reference: [url removed, login to view]

$146 (Avg Bid)
$146 Avg Bid
10 bids

I have a STEP file that I need an optic simulation made on. Attached is also the PCB with LEDs that will light through the light guide onto the front part. Each LED is a RGB LEDs APA-102-2C Link to LED: [url removed, login to view] I need to know if the division of light is equal in

$139 (Avg Bid)
$139 Avg Bid
12 bids

...your research for each topic. One such topic is "Intrusion Detection through deception - Learn how to easily set up honeypots and wire-traps to detect if you are under attack" We have a couple of sites and videos which we will give you for this topic. You can use your own research too. Another topic is "Combating Insider Threat" The language

$121 (Avg Bid)
$121 Avg Bid
22 bids

...computer will always work with the same speed as it did when it was new, this guarantee that the computer can not participate in a massive hacking attack at the same time with millions of other computers (DDoS attack). The software provides 99% hacker protection, compare to today's 60%. The program can be installed in satellites that are already in space

$128 (Avg Bid)
$128 Avg Bid
13 bids

...Raspberry PI 3 to : - Scan Wi-Fi networks - Capture WPA2 handshakes - WPS pin attack then send it to server and i can access the server from my android app to do following : - View scanned networks - Select SSID to capture handshake - Select SSID to WPS pin attack now i can do using aircrack package manually in Raspberry PI 3 . but i want

$188 (Avg Bid)
$188 Avg Bid
5 bids

The paper presents a modeling approach for target acquisition and engagement within a combat simulation. Combat simulation is an important method for testing methods, technologies, and tactics in order to inform government decision makers. The system described in this paper assumes that if a target is within the minimum distance for acquisition, the

$100 (Avg Bid)
$100 Avg Bid
1 bids

...where the user credentials like passwords to your online banking, social media, email and other important data can be stolen. This is called the wireless man in the middle attack. So when you type a website address in the address bar in your web browser, the man in the middle can actually add things to the page that were never there!!! For example

$162 (Avg Bid)
$162 Avg Bid
21 bids