|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 153 occurrences of 117 keywords
|
|
|
Results
Found 332 publication records. Showing 332 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
148 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
secure shell, stateful decryption, authenticated encryption, security proofs, SSH |
140 | Takamichi Saito, Toshiyuki Kito, Kentaro Umesawa, Fumio Mizoguchi |
Architectural Defects of the Secure Shell. |
DEXA Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
114 | Yusuke Kosuda, Ryôichi Sasaki |
Proposal and Implementation of SSH Client System Using Ajax. |
I3E |
2009 |
DBLP DOI BibTeX RDF |
mobile PC, security, mobile phone, PDA, Ajax, Smartphone, SSH |
104 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
secure shell, stateful decryption, Authenticated encryption, security proofs |
100 | Gianluca Maiolini, Andrea Baiocchi, Alfonso Iacovazzi, Antonello Rizzi |
Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques. |
Networking |
2009 |
DBLP DOI BibTeX RDF |
statistical traffic classification, cluster analysis, k-means, Traffic analysis, SSH |
100 | Paul Z. Kolano |
Mesh: secure, lightweight grid middleware using existing SSH infrastructure. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
security, distributed systems, authentication, access control, middleware, grids, authorization, delegation, single sign-on, SSH |
96 | Chris Rapier, Benjamin Bennett |
High speed bulk data transfer using the SSH protocol. |
Mardi Gras Conference |
2008 |
DBLP DOI BibTeX RDF |
HPN, HPN-SSH, security, performance, cryptography, buffers, bottlenecks, high performance networks, auto-tuning, SSH |
76 | Gianluca Maiolini, Andrea Baiocchi, Antonello Rizzi, C. Di Iollo |
Statistical classification of services tunneled into SSH connections by a K-means based learning algorithm. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
secure shell, machine learning, traffic analysis |
76 | Maurizio Dusi, Francesco Gringoli, Luca Salgarelli |
A Preliminary Look at the Privacy of SSH Tunnels. |
ICCCN |
2008 |
DBLP DOI BibTeX RDF |
|
76 | Weiping Liu, Wandong Cai |
Study on Security iSCSI Based on SSH. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
70 | Vincent Larivière, Yves Gingras, Éric Archambault |
Canadian collaboration networks: A comparative analysis of the natural sciences, social sciences and the humanities. |
Scientometrics |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson |
Plaintext Recovery Attacks against SSH. |
SP |
2009 |
DBLP DOI BibTeX RDF |
|
57 | Jesus Molina, Xavier Chorin, Michel Cukier |
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
SSH compromises, filesystem data, host intrusion detection systems, intrusion detection systems evaluation |
56 | Éric Archambault, Étienne Vignola-Gagné, Grégoire Côté, Vincent Larivière, Yves Gingras |
Benchmarking scientific output in the social sciences and humanities: The limits of existing databases. |
Scientometrics |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Emilio Remolina, Juan A. Fernandez, Benjamin Kuipers, Javier Gonzalez 0001 |
Formalizing Regions in the Spatial Semantic Hierarchy: An AH-Graphs Implementation Approach. |
COSIT |
1999 |
DBLP DOI BibTeX RDF |
Hierarchical representations of space, Spatial reasoning, Regions, Cognitive map |
52 | Norka B. Lucena, James Pease, Payman Yadollahpour, Steve J. Chapin |
Syntax and Semantics-Preserving Application-Layer Protocol Steganography. |
Information Hiding |
2004 |
DBLP DOI BibTeX RDF |
application protocols, semantics, steganography, syntax, SSH |
48 | Riyad Alshammari, Peter Lichodzijewski, Malcolm I. Heywood, Nur Zincir-Heywood |
Classifying SSH encrypted traffic with minimum packet header features using genetic programming. |
GECCO (Companion) |
2009 |
DBLP DOI BibTeX RDF |
defense applications, encrypted traffic classification, security, genetic programming, active learning, supervised learning, teaming, packet, problem decomposition |
48 | Vladislav Marinov, Jürgen Schönwälder |
Performance Analysis of SNMP over SSH. |
DSOM |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski |
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Yasir Ali, Sean W. Smith |
Flexible and Scalable Public Key Security for SSH. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Phillip D. Pham, Marshall J. Levesque, Kohei Ichikawa, Susumu Date, Jason H. Haga |
Identification of a Specific Inhibitor for the Dual-Specificity Enzyme SSH-2 via Docking Experiments on the Grid. |
eScience |
2008 |
DBLP DOI BibTeX RDF |
SSH-2, dual-specificity phosphatase, Virtual screening, DOCK |
42 | Jeffrey Horton, Reihaneh Safavi-Naini |
Detecting Policy Violations through Traffic Analysis. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim |
Dynamic Authorization and Intrusion Response in Distributed Systems. |
DISCEX (1) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Martín Abadi |
Explicit Communication Revisited: Two New Attacks on Authentication Protocols. |
IEEE Trans. Software Eng. |
1997 |
DBLP DOI BibTeX RDF |
security, authentication, Cryptography, cryptographic protocols, authentication protocols |
39 | Xiaojun Zhu 0001, Jiao Tang |
NB-SSH: NB-IoT-Based Remote SSH Access to UAVs Under Symmetric NAT. |
IEEE Netw. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
39 | Stewart Sentanoe, Hans P. Reiser |
SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic. |
Digit. Investig. |
2022 |
DBLP DOI BibTeX RDF |
|
39 | Sebastian Neef, Nils Wisiol |
Oh SSH-it, what's my fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
39 | Sebastian Neef, Nils Wisiol |
Oh SSH-it, What's My Fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS. |
CANS |
2022 |
DBLP DOI BibTeX RDF |
|
39 | Henk van den Heuvel |
Crossing the SSH Bridge with Interview Data. |
LR4SSHOC@LREC |
2020 |
DBLP BibTeX RDF |
|
39 | Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes |
SSH, the secure shell - the definitive guide: securing your network and services: covers SSH-2 protocol (2. ed.). |
|
2005 |
RDF |
|
37 | Liqun Liang, Shaowu Li, Yumei Chang, Yong Li, Xiaowen Sun, Qingquan Lei |
Differentially Gene Expression in the Brain of Common Carp ( Cyprinus carpio ) Response to Cold Acclimation. |
CCTA |
2007 |
DBLP DOI BibTeX RDF |
cold tolerance, suppression subtractive hybridization (SSH), real-time PCR, Cyprinus carpio |
34 | Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras |
Hidden Markov Model Modeling of SSH Brute-Force Attacks. |
DSOM |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Daniel Ramsbrock, Robin Berthier, Michel Cukier |
Profiling Attacker Behavior Following SSH Compromises. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Giuliano Laccetti, Giovanni Schmid |
A PMI-Aware Extension for the SSH Service. |
PPAM |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Access control, Authorization, Grid security |
34 | Jonathan D. Blower, Keith Haines |
Building Simple, Easy-to-Use Grids with Styx Grid Services and SSH. |
e-Science |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi Sree Deepya |
Reducing the Cost of Session Key Establishment. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Mansoor Alicherry, Angelos D. Keromytis |
DoubleCheck: Multi-path verification against man-in-the-middle attacks. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Maurizio Dusi, Manuel Crotti, Francesco Gringoli, Luca Salgarelli |
Detection of Encrypted Tunnels Across Network Boundaries. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Atul Prakash 0001 |
Security in Practice - Security-Usability Chasm. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Peter C. S. Kwan, Glenn Durfee |
Practical Uses of Virtual Machines for Protection of Sensitive User Data. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Anil Madhavapeddy, Alex Ho, Tim Deegan, David J. Scott, Ripduman Sohan |
Melange: creating a "functional" internet. |
EuroSys |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Piotr Kopta, Tomasz Kuczynski, Roman Wyrzykowski |
Grid Access and User Interface in CLUSTERIX Project. |
PPAM |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Takeshi Fujioka, Hiroki Karuno, Yahiko Kambayashi |
Practices of Information Education with Squeak toward the Secure Improvement of 'Academic Ability'. |
C5 |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle |
The Design and Implementation of Protocol-Based Hidden Key Recovery. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Tong Lin 0002, Chong-Wah Ngo, HongJiang Zhang, Qing-Yun Shi |
Integrating color and spatial features for content-based video retrieval. |
ICIP (3) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Benjamin Kuipers |
A Hierarchy of Qualitative Representations for Space. |
Spatial Cognition |
1998 |
DBLP DOI BibTeX RDF |
|
24 | José Carlos Brustoloni |
Laboratory experiments for network security instruction. |
ACM J. Educ. Resour. Comput. |
2006 |
DBLP DOI BibTeX RDF |
certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle |
24 | Scott E. Hanselman, Luis O. Hernández, Divyangi Anchan, Mahmoud Pegah |
OS X: here we go again. |
SIGUCCS |
2004 |
DBLP DOI BibTeX RDF |
login hooks, logout hooks, network, migration, LDAP, NFS, fonts, SSH, Macintosh OS X |
24 | Carl M. Ellison, Steve Dohrmann |
Public-key support for group collaboration. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
S/MIME, SDSI, PKI, Human-computer interface, IPsec, PGP, SSH, SPKI |
24 | Scott E. Hanselman, Mahmoud Pegah |
Macintosh OS X: a smooth migration. |
SIGUCCS |
2003 |
DBLP DOI BibTeX RDF |
NIS, network, migration, NFS, fonts, SSH, Macintosh OS X |
23 | Jesus Molina, Michel Cukier |
Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. |
NCA |
2009 |
DBLP DOI BibTeX RDF |
filesystem data, attacker behavior, SSH compromise, Intrusion detection systems, honeypots, empirical analysis |
20 | Duong Dinh Tran, Kazuhiro Ogata 0001, Santiago Escobar 0001, Sedat Akleylek, Ayoub Otmani |
Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Peter E. Yee |
Update to the IANA SSH Protocol Parameters Registry Requirements. |
RFC |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Sachin Kumar Singh, Shreeman Gautam, Cameron Cartier, Sameer Patil, Robert Ricci |
Where The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Them. |
NSDI |
2024 |
DBLP BibTeX RDF |
|
20 | Ronan Fablet, Quentin Febvre, Bertrand Chapron |
Multimodal 4DVarNets for the Reconstruction of Sea Surface Dynamics From SST-SSH Synergies. |
IEEE Trans. Geosci. Remote. Sens. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk |
Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger |
Passive SSH Key Compromise via Lattices. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
20 | Sivan Toledo |
SSH tunneling to connect to remote computers. |
Softw. Impacts |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Joana Cabral Costa, Tiago Roxo, Carolina Galvão Lopes, João B. F. Sequeiros, Tiago M. C. Simões, Pedro R. M. Inácio |
Theoretical and practical assessments over SSH. |
Res. Pract. Technol. Enhanc. Learn. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger |
Passive SSH Key Compromise via Lattices. |
CCS |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Günter Fahrnberger |
Bloom Filter-Based Realtime Risk Monitoring of SSH Brute Force Attacks. |
I4CS |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Julien Piet, Aashish Sharma, Vern Paxson, David A. Wagner 0001 |
Network Detection of Interactive SSH Impostors Using Deep Learning. |
USENIX Security Symposium |
2023 |
DBLP BibTeX RDF |
|
20 | Evan Wilcox, Anne Bowen, Mike Packard |
Understanding Encryption & SSH Cipher Benchmarking. |
PEARC |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ryo Nakamura, Yohei Kuga |
Multi-threaded scp: Easy and Fast File Transfer over SSH. |
PEARC |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Connor Hetzler, Zachary Chen, Tahir M. Khan |
Analysis of SSH Honeypot Effectiveness. |
FICC (2) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Laure Barbot, Elena Battaner Moro, Stefan Buddenbohm, Cesare Concordia, Maja Dolinar, Matej Durco, Edward Gray, Cristina Grisot, Klaus Illmayer, Martin Kirnbauer, Mari Kleemola, Alexander König, Michael Kurzmeier, Barbara McGillivray, Clara Parente Boavida, Christian Schuster, Irena Vipavc Brvar, Magdalena Wnuk |
Creating a DH workflow in the SSH Open Marketplace. |
DH |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Junwon Lee, Heejo Lee |
An SSH predictive model using machine learning with web proxy session logs. |
Int. J. Inf. Sec. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Wei Cui, Jungang Yang 0004, Yongjun Jia, Jie Zhang 0019 |
Oceanic Eddy Detection and Analysis from Satellite-Derived SSH and SST Fields in the Kuroshio Extension. |
Remote. Sens. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Qiang Wang, Wei Zheng, Fan Wu, Huizhong Zhu, Aigong Xu, Yifan Shen, Yelong Zhao |
Improving the SSH Retrieval Precision of Spaceborne GNSS-R Based on a New Grid Search Multihidden Layer Neural Network Feature Optimization Method. |
Remote. Sens. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Hainan Wang, Jerry Chun-Wei Lin |
Unit test system of online English course based on SSH Framework. |
EAI Endorsed Trans. Scalable Inf. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Zhenhui Wang, Dezhi Han, Ming Li, Han Liu 0009, Mingming Cui |
The abnormal traffic detection scheme based on PCA and SSH. |
Connect. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Christofer Fellicious, Stewart Sentanoe, Michael Granitzer, Hans P. Reiser |
SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Alexandre Dulaunoy, Jean-Louis Huynen, Aurelien Thirion |
Active and Passive Collection of SSH key material for cyber threat intelligence. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Ronan Fablet, Bertrand Chapron, Julien Le Sommer, Florian Sévellec |
Inversion of sea surface currents from satellite-derived SST-SSH synergies with 4DVarNets. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Gokul Kannan Sadasivam, Chittaranjan Hota, Anand Bhojan |
Detection of stealthy single-source SSH password guessing attacks. |
Evol. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Nicholas Gajcowski, Michael Jenkins |
Commercial National Security Algorithm (CNSA) Suite Cryptography for Secure Shell (SSH). |
RFC |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Mark D. Baushke |
Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH). |
RFC |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek |
Practical Privacy-Preserving Authentication for SSH. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
20 | Junwon Lee, Heejo Lee |
Improving SSH detection model using IPA time and WGAN-GP. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Alireza Zarei, Yim Seung-Bin, Matej Durco, Klaus Illmayer, Laure Barbot, Frank Fischer 0005, Edward Gray |
Der SSH Open Marketplace - Kontextualisiertes Praxiswissen für die Digital Humanities. |
DHd |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Cesare Concordia, Nicolas Larrousse, Edward Gray |
The SSH Data Citation Service, A Tool to Explore and Collect Citation Metadata. |
TPDL |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Günter Fahrnberger |
Realtime Risk Monitoring of SSH Brute Force Attacks. |
I4CS |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek |
Practical Privacy-Preserving Authentication for SSH. |
USENIX Security Symposium |
2022 |
DBLP BibTeX RDF |
|
20 | Junior Samuel López-Yépez, Antoine Fagette |
Increasing attacker engagement on SSH honeypots using semantic embeddings of cyber-attack patterns and deep reinforcement learning. |
SSCI |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Björn Hammarfelt, Isak Hammar, Helena Francke |
Ensuring Quality and Status: Peer Review Practices in Kriterium, A Portal for Quality-Marked Monographs and Edited Volumes in Swedish SSH. |
Frontiers Res. Metrics Anal. |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Abel Z. Agghey, Lunodzo J. Mwinuka, Sanket M. Pandhare, Mussa Ally Dida, Jema David Ndibwile |
Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach. |
Symmetry |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Yifan Jiang 0001, He Zhang 0004, Jianming Zhang 0001, Yilin Wang, Zhe Lin 0001, Kalyan Sunkavalli, Simon Chen, Sohrab Amirghodsi, Sarah Kong, Zhangyang Wang |
SSH: A Self-Supervised Framework for Image Harmonization. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
20 | Daniel Reti, David Klaaßen, Simon Duque Antón, Hans Dieter Schotten |
Secure (S)Hell: Introducing an SSH Deception Proxy Framework. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
20 | Yajie Wang, Alesia A. Zuccala |
Scholarly book publishers as publicity agents for SSH titles on Twitter. |
Scientometrics |
2021 |
DBLP DOI BibTeX RDF |
|
20 | José Tomás Martínez Garre, Manuel Gil Pérez, Antonio Ruiz-Martínez |
A novel Machine Learning-based approach for the detection of SSH botnet infection. |
Future Gener. Comput. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Xiao Luo 0002, Chengchao Yao, Nur Zincir-Heywood |
Modelling and visualising SSH brute force attack behaviours through a hybrid learning framework. |
Int. J. Inf. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Yifan Jiang 0001, He Zhang 0004, Jianming Zhang 0001, Yilin Wang, Zhe L. Lin, Kalyan Sunkavalli, Simon Chen, Sohrab Amirghodsi, Sarah Kong, Zhangyang Wang |
SSH: A Self-Supervised Framework for Image Harmonization. |
ICCV |
2021 |
DBLP DOI BibTeX RDF |
|
20 | John T. Hancock, Taghi M. Khoshgoftaar, Joffrey L. Leevy |
Detecting SSH and FTP Brute Force Attacks in Big Data. |
ICMLA |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Daniel Reti, David Klaaßen, Simon Duque Antón, Hans Dieter Schotten |
Secure (S)Hell: Introducing an SSH Deception Proxy Framework. |
CyberSA |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Pratibha Khandait, Namrata Tiwari, Neminath Hubballi |
Who is Trying to Compromise Your SSH Server ? An Analysis of Authentication Logs and Detection of Bruteforce Attacks. |
ICDCN (Adjunct Volume) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Maxime Beauchamp, Mohamed Mahmoud Amar, Quentin Febvre, Ronan Fablet |
End-to-End Learning of Variational Interpolation Schemes for Satellite-Derived SSH Data. |
IGARSS |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Ben Harris, Loganaden Velvindron |
Ed25519 and Ed448 Public Key Algorithms for the Secure Shell (SSH) Protocol. |
RFC |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Loganaden Velvindron |
Deprecating RC4 in Secure Shell (SSH). |
RFC |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Aris Adamantiadis, Simon Josefsson, Mark D. Baushke |
Secure Shell (SSH) Key Exchange Method Using Curve25519 and Curve448. |
RFC |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Matej Zuzcák, Milan Zenka |
Expert system assessing threat level of attacks on a hybrid SSH honeynet. |
Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 332 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|