The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SSH with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-2001 (16) 2002-2003 (15) 2004 (16) 2005 (15) 2006 (32) 2007 (21) 2008 (15) 2009 (21) 2010-2011 (15) 2012-2013 (16) 2014-2015 (20) 2016-2017 (26) 2018-2019 (31) 2020 (24) 2021-2022 (33) 2023-2024 (16)
Publication types (Num. hits)
article(103) book(3) incollection(3) inproceedings(221) phdthesis(1) proceedings(1)
Venues (Conferences, Journals, ...)
RFC(28) CoRR(12) LR4SSHOC@LREC(10) IACR Cryptol. ePrint Arch.(9) IGARSS(7) CCGRID(6) CCS(5) PEARC(5) PPAM(5) ISCC(4) LISA(4) Scientometrics(4) Frontiers Res. Metrics Anal.(3) ICACCI(3) ICC(3) ISC(3) More (+10 of total 195)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 153 occurrences of 117 keywords

Results
Found 332 publication records. Showing 332 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
148Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure shell, stateful decryption, authenticated encryption, security proofs, SSH
140Takamichi Saito, Toshiyuki Kito, Kentaro Umesawa, Fumio Mizoguchi Architectural Defects of the Secure Shell. Search on Bibsonomy DEXA Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
114Yusuke Kosuda, Ryôichi Sasaki Proposal and Implementation of SSH Client System Using Ajax. Search on Bibsonomy I3E The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile PC, security, mobile phone, PDA, Ajax, Smartphone, SSH
104Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secure shell, stateful decryption, Authenticated encryption, security proofs
100Gianluca Maiolini, Andrea Baiocchi, Alfonso Iacovazzi, Antonello Rizzi Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques. Search on Bibsonomy Networking The full citation details ... 2009 DBLP  DOI  BibTeX  RDF statistical traffic classification, cluster analysis, k-means, Traffic analysis, SSH
100Paul Z. Kolano Mesh: secure, lightweight grid middleware using existing SSH infrastructure. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, distributed systems, authentication, access control, middleware, grids, authorization, delegation, single sign-on, SSH
96Chris Rapier, Benjamin Bennett High speed bulk data transfer using the SSH protocol. Search on Bibsonomy Mardi Gras Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HPN, HPN-SSH, security, performance, cryptography, buffers, bottlenecks, high performance networks, auto-tuning, SSH
76Gianluca Maiolini, Andrea Baiocchi, Antonello Rizzi, C. Di Iollo Statistical classification of services tunneled into SSH connections by a K-means based learning algorithm. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF secure shell, machine learning, traffic analysis
76Maurizio Dusi, Francesco Gringoli, Luca Salgarelli A Preliminary Look at the Privacy of SSH Tunnels. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
76Weiping Liu, Wandong Cai Study on Security iSCSI Based on SSH. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
70Vincent Larivière, Yves Gingras, Éric Archambault Canadian collaboration networks: A comparative analysis of the natural sciences, social sciences and the humanities. Search on Bibsonomy Scientometrics The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
62Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson Plaintext Recovery Attacks against SSH. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
57Jesus Molina, Xavier Chorin, Michel Cukier Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SSH compromises, filesystem data, host intrusion detection systems, intrusion detection systems evaluation
56Éric Archambault, Étienne Vignola-Gagné, Grégoire Côté, Vincent Larivière, Yves Gingras Benchmarking scientific output in the social sciences and humanities: The limits of existing databases. Search on Bibsonomy Scientometrics The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
56Emilio Remolina, Juan A. Fernandez, Benjamin Kuipers, Javier Gonzalez 0001 Formalizing Regions in the Spatial Semantic Hierarchy: An AH-Graphs Implementation Approach. Search on Bibsonomy COSIT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Hierarchical representations of space, Spatial reasoning, Regions, Cognitive map
52Norka B. Lucena, James Pease, Payman Yadollahpour, Steve J. Chapin Syntax and Semantics-Preserving Application-Layer Protocol Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2004 DBLP  DOI  BibTeX  RDF application protocols, semantics, steganography, syntax, SSH
48Riyad Alshammari, Peter Lichodzijewski, Malcolm I. Heywood, Nur Zincir-Heywood Classifying SSH encrypted traffic with minimum packet header features using genetic programming. Search on Bibsonomy GECCO (Companion) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF defense applications, encrypted traffic classification, security, genetic programming, active learning, supervised learning, teaming, packet, problem decomposition
48Vladislav Marinov, Jürgen Schönwälder Performance Analysis of SNMP over SSH. Search on Bibsonomy DSOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Yasir Ali, Sean W. Smith Flexible and Scalable Public Key Security for SSH. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Phillip D. Pham, Marshall J. Levesque, Kohei Ichikawa, Susumu Date, Jason H. Haga Identification of a Specific Inhibitor for the Dual-Specificity Enzyme SSH-2 via Docking Experiments on the Grid. Search on Bibsonomy eScience The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SSH-2, dual-specificity phosphatase, Virtual screening, DOCK
42Jeffrey Horton, Reihaneh Safavi-Naini Detecting Policy Violations through Traffic Analysis. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim Dynamic Authorization and Intrusion Response in Distributed Systems. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Martín Abadi Explicit Communication Revisited: Two New Attacks on Authentication Protocols. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security, authentication, Cryptography, cryptographic protocols, authentication protocols
39Xiaojun Zhu 0001, Jiao Tang NB-SSH: NB-IoT-Based Remote SSH Access to UAVs Under Symmetric NAT. Search on Bibsonomy IEEE Netw. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
39Stewart Sentanoe, Hans P. Reiser SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic. Search on Bibsonomy Digit. Investig. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
39Sebastian Neef, Nils Wisiol Oh SSH-it, what's my fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
39Sebastian Neef, Nils Wisiol Oh SSH-it, What's My Fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS. Search on Bibsonomy CANS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
39Henk van den Heuvel Crossing the SSH Bridge with Interview Data. Search on Bibsonomy LR4SSHOC@LREC The full citation details ... 2020 DBLP  BibTeX  RDF
39Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes SSH, the secure shell - the definitive guide: securing your network and services: covers SSH-2 protocol (2. ed.). Search on Bibsonomy 2005   RDF
37Liqun Liang, Shaowu Li, Yumei Chang, Yong Li, Xiaowen Sun, Qingquan Lei Differentially Gene Expression in the Brain of Common Carp ( Cyprinus carpio ) Response to Cold Acclimation. Search on Bibsonomy CCTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cold tolerance, suppression subtractive hybridization (SSH), real-time PCR, Cyprinus carpio
34Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras Hidden Markov Model Modeling of SSH Brute-Force Attacks. Search on Bibsonomy DSOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Daniel Ramsbrock, Robin Berthier, Michel Cukier Profiling Attacker Behavior Following SSH Compromises. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Giuliano Laccetti, Giovanni Schmid A PMI-Aware Extension for the SSH Service. Search on Bibsonomy PPAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Access control, Authorization, Grid security
34Jonathan D. Blower, Keith Haines Building Simple, Easy-to-Use Grids with Styx Grid Services and SSH. Search on Bibsonomy e-Science The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi Sree Deepya Reducing the Cost of Session Key Establishment. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Mansoor Alicherry, Angelos D. Keromytis DoubleCheck: Multi-path verification against man-in-the-middle attacks. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Maurizio Dusi, Manuel Crotti, Francesco Gringoli, Luca Salgarelli Detection of Encrypted Tunnels Across Network Boundaries. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Atul Prakash 0001 Security in Practice - Security-Usability Chasm. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Peter C. S. Kwan, Glenn Durfee Practical Uses of Virtual Machines for Protection of Sensitive User Data. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Anil Madhavapeddy, Alex Ho, Tim Deegan, David J. Scott, Ripduman Sohan Melange: creating a "functional" internet. Search on Bibsonomy EuroSys The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Piotr Kopta, Tomasz Kuczynski, Roman Wyrzykowski Grid Access and User Interface in CLUSTERIX Project. Search on Bibsonomy PPAM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Takeshi Fujioka, Hiroki Karuno, Yahiko Kambayashi Practices of Information Education with Squeak toward the Secure Improvement of 'Academic Ability'. Search on Bibsonomy C5 The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle The Design and Implementation of Protocol-Based Hidden Key Recovery. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Tong Lin 0002, Chong-Wah Ngo, HongJiang Zhang, Qing-Yun Shi Integrating color and spatial features for content-based video retrieval. Search on Bibsonomy ICIP (3) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Benjamin Kuipers A Hierarchy of Qualitative Representations for Space. Search on Bibsonomy Spatial Cognition The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
24José Carlos Brustoloni Laboratory experiments for network security instruction. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle
24Scott E. Hanselman, Luis O. Hernández, Divyangi Anchan, Mahmoud Pegah OS X: here we go again. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF login hooks, logout hooks, network, migration, LDAP, NFS, fonts, SSH, Macintosh OS X
24Carl M. Ellison, Steve Dohrmann Public-key support for group collaboration. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF S/MIME, SDSI, PKI, Human-computer interface, IPsec, PGP, SSH, SPKI
24Scott E. Hanselman, Mahmoud Pegah Macintosh OS X: a smooth migration. Search on Bibsonomy SIGUCCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF NIS, network, migration, NFS, fonts, SSH, Macintosh OS X
23Jesus Molina, Michel Cukier Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF filesystem data, attacker behavior, SSH compromise, Intrusion detection systems, honeypots, empirical analysis
20Duong Dinh Tran, Kazuhiro Ogata 0001, Santiago Escobar 0001, Sedat Akleylek, Ayoub Otmani Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Peter E. Yee Update to the IANA SSH Protocol Parameters Registry Requirements. Search on Bibsonomy RFC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Sachin Kumar Singh, Shreeman Gautam, Cameron Cartier, Sameer Patil, Robert Ricci Where The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Them. Search on Bibsonomy NSDI The full citation details ... 2024 DBLP  BibTeX  RDF
20Ronan Fablet, Quentin Febvre, Bertrand Chapron Multimodal 4DVarNets for the Reconstruction of Sea Surface Dynamics From SST-SSH Synergies. Search on Bibsonomy IEEE Trans. Geosci. Remote. Sens. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger Passive SSH Key Compromise via Lattices. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Sivan Toledo SSH tunneling to connect to remote computers. Search on Bibsonomy Softw. Impacts The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Joana Cabral Costa, Tiago Roxo, Carolina Galvão Lopes, João B. F. Sequeiros, Tiago M. C. Simões, Pedro R. M. Inácio Theoretical and practical assessments over SSH. Search on Bibsonomy Res. Pract. Technol. Enhanc. Learn. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger Passive SSH Key Compromise via Lattices. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Günter Fahrnberger Bloom Filter-Based Realtime Risk Monitoring of SSH Brute Force Attacks. Search on Bibsonomy I4CS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Julien Piet, Aashish Sharma, Vern Paxson, David A. Wagner 0001 Network Detection of Interactive SSH Impostors Using Deep Learning. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
20Evan Wilcox, Anne Bowen, Mike Packard Understanding Encryption & SSH Cipher Benchmarking. Search on Bibsonomy PEARC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Ryo Nakamura, Yohei Kuga Multi-threaded scp: Easy and Fast File Transfer over SSH. Search on Bibsonomy PEARC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Connor Hetzler, Zachary Chen, Tahir M. Khan Analysis of SSH Honeypot Effectiveness. Search on Bibsonomy FICC (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Laure Barbot, Elena Battaner Moro, Stefan Buddenbohm, Cesare Concordia, Maja Dolinar, Matej Durco, Edward Gray, Cristina Grisot, Klaus Illmayer, Martin Kirnbauer, Mari Kleemola, Alexander König, Michael Kurzmeier, Barbara McGillivray, Clara Parente Boavida, Christian Schuster, Irena Vipavc Brvar, Magdalena Wnuk Creating a DH workflow in the SSH Open Marketplace. Search on Bibsonomy DH The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Junwon Lee, Heejo Lee An SSH predictive model using machine learning with web proxy session logs. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Wei Cui, Jungang Yang 0004, Yongjun Jia, Jie Zhang 0019 Oceanic Eddy Detection and Analysis from Satellite-Derived SSH and SST Fields in the Kuroshio Extension. Search on Bibsonomy Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Qiang Wang, Wei Zheng, Fan Wu, Huizhong Zhu, Aigong Xu, Yifan Shen, Yelong Zhao Improving the SSH Retrieval Precision of Spaceborne GNSS-R Based on a New Grid Search Multihidden Layer Neural Network Feature Optimization Method. Search on Bibsonomy Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Hainan Wang, Jerry Chun-Wei Lin Unit test system of online English course based on SSH Framework. Search on Bibsonomy EAI Endorsed Trans. Scalable Inf. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Zhenhui Wang, Dezhi Han, Ming Li, Han Liu 0009, Mingming Cui The abnormal traffic detection scheme based on PCA and SSH. Search on Bibsonomy Connect. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Christofer Fellicious, Stewart Sentanoe, Michael Granitzer, Hans P. Reiser SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Alexandre Dulaunoy, Jean-Louis Huynen, Aurelien Thirion Active and Passive Collection of SSH key material for cyber threat intelligence. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Ronan Fablet, Bertrand Chapron, Julien Le Sommer, Florian Sévellec Inversion of sea surface currents from satellite-derived SST-SSH synergies with 4DVarNets. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Gokul Kannan Sadasivam, Chittaranjan Hota, Anand Bhojan Detection of stealthy single-source SSH password guessing attacks. Search on Bibsonomy Evol. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Nicholas Gajcowski, Michael Jenkins Commercial National Security Algorithm (CNSA) Suite Cryptography for Secure Shell (SSH). Search on Bibsonomy RFC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Mark D. Baushke Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH). Search on Bibsonomy RFC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek Practical Privacy-Preserving Authentication for SSH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
20Junwon Lee, Heejo Lee Improving SSH detection model using IPA time and WGAN-GP. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Alireza Zarei, Yim Seung-Bin, Matej Durco, Klaus Illmayer, Laure Barbot, Frank Fischer 0005, Edward Gray Der SSH Open Marketplace - Kontextualisiertes Praxiswissen für die Digital Humanities. Search on Bibsonomy DHd The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Cesare Concordia, Nicolas Larrousse, Edward Gray The SSH Data Citation Service, A Tool to Explore and Collect Citation Metadata. Search on Bibsonomy TPDL The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Günter Fahrnberger Realtime Risk Monitoring of SSH Brute Force Attacks. Search on Bibsonomy I4CS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek Practical Privacy-Preserving Authentication for SSH. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2022 DBLP  BibTeX  RDF
20Junior Samuel López-Yépez, Antoine Fagette Increasing attacker engagement on SSH honeypots using semantic embeddings of cyber-attack patterns and deep reinforcement learning. Search on Bibsonomy SSCI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Björn Hammarfelt, Isak Hammar, Helena Francke Ensuring Quality and Status: Peer Review Practices in Kriterium, A Portal for Quality-Marked Monographs and Edited Volumes in Swedish SSH. Search on Bibsonomy Frontiers Res. Metrics Anal. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Abel Z. Agghey, Lunodzo J. Mwinuka, Sanket M. Pandhare, Mussa Ally Dida, Jema David Ndibwile Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach. Search on Bibsonomy Symmetry The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Yifan Jiang 0001, He Zhang 0004, Jianming Zhang 0001, Yilin Wang, Zhe Lin 0001, Kalyan Sunkavalli, Simon Chen, Sohrab Amirghodsi, Sarah Kong, Zhangyang Wang SSH: A Self-Supervised Framework for Image Harmonization. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
20Daniel Reti, David Klaaßen, Simon Duque Antón, Hans Dieter Schotten Secure (S)Hell: Introducing an SSH Deception Proxy Framework. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
20Yajie Wang, Alesia A. Zuccala Scholarly book publishers as publicity agents for SSH titles on Twitter. Search on Bibsonomy Scientometrics The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20José Tomás Martínez Garre, Manuel Gil Pérez, Antonio Ruiz-Martínez A novel Machine Learning-based approach for the detection of SSH botnet infection. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Xiao Luo 0002, Chengchao Yao, Nur Zincir-Heywood Modelling and visualising SSH brute force attack behaviours through a hybrid learning framework. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Yifan Jiang 0001, He Zhang 0004, Jianming Zhang 0001, Yilin Wang, Zhe L. Lin, Kalyan Sunkavalli, Simon Chen, Sohrab Amirghodsi, Sarah Kong, Zhangyang Wang SSH: A Self-Supervised Framework for Image Harmonization. Search on Bibsonomy ICCV The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20John T. Hancock, Taghi M. Khoshgoftaar, Joffrey L. Leevy Detecting SSH and FTP Brute Force Attacks in Big Data. Search on Bibsonomy ICMLA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Daniel Reti, David Klaaßen, Simon Duque Antón, Hans Dieter Schotten Secure (S)Hell: Introducing an SSH Deception Proxy Framework. Search on Bibsonomy CyberSA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Pratibha Khandait, Namrata Tiwari, Neminath Hubballi Who is Trying to Compromise Your SSH Server ? An Analysis of Authentication Logs and Detection of Bruteforce Attacks. Search on Bibsonomy ICDCN (Adjunct Volume) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Maxime Beauchamp, Mohamed Mahmoud Amar, Quentin Febvre, Ronan Fablet End-to-End Learning of Variational Interpolation Schemes for Satellite-Derived SSH Data. Search on Bibsonomy IGARSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Ben Harris, Loganaden Velvindron Ed25519 and Ed448 Public Key Algorithms for the Secure Shell (SSH) Protocol. Search on Bibsonomy RFC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Loganaden Velvindron Deprecating RC4 in Secure Shell (SSH). Search on Bibsonomy RFC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Aris Adamantiadis, Simon Josefsson, Mark D. Baushke Secure Shell (SSH) Key Exchange Method Using Curve25519 and Curve448. Search on Bibsonomy RFC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Matej Zuzcák, Milan Zenka Expert system assessing threat level of attacks on a hybrid SSH honeynet. Search on Bibsonomy Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 332 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license