|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 153 occurrences of 117 keywords
|
|
|
Results
Found 332 publication records. Showing 332 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
148 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 1-11, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
secure shell, stateful decryption, authenticated encryption, security proofs, SSH |
140 | Takamichi Saito, Toshiyuki Kito, Kentaro Umesawa, Fumio Mizoguchi |
Architectural Defects of the Secure Shell. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2-6 September 2002, Aix-en-Provence, France, pp. 22-28, 2002, IEEE Computer Society, 0-7695-1668-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
114 | Yusuke Kosuda, Ryôichi Sasaki |
Proposal and Implementation of SSH Client System Using Ajax. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Software Services for e-Business and e-Society, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009. Proceedings, pp. 184-196, 2009, Springer, 978-3-642-04279-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile PC, security, mobile phone, PDA, Ajax, Smartphone, SSH |
104 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(2), pp. 206-241, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
secure shell, stateful decryption, Authenticated encryption, security proofs |
100 | Gianluca Maiolini, Andrea Baiocchi, Alfonso Iacovazzi, Antonello Rizzi |
Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2009, 8th International IFIP-TC 6 Networking Conference, Aachen, Germany, May 11-15, 2009. Proceedings, pp. 182-194, 2009, Springer, 978-3-642-01398-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
statistical traffic classification, cluster analysis, k-means, Traffic analysis, SSH |
100 | Paul Z. Kolano |
Mesh: secure, lightweight grid middleware using existing SSH infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 111-120, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, distributed systems, authentication, access control, middleware, grids, authorization, delegation, single sign-on, SSH |
96 | Chris Rapier, Benjamin Bennett |
High speed bulk data transfer using the SSH protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mardi Gras Conference ![In: Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities, Baton Rouge, Louisiana, USA, January 29 - February 3, 2008, pp. 11, 2008, ACM, 978-1-59593-835-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
HPN, HPN-SSH, security, performance, cryptography, buffers, bottlenecks, high performance networks, auto-tuning, SSH |
76 | Gianluca Maiolini, Andrea Baiocchi, Antonello Rizzi, C. Di Iollo |
Statistical classification of services tunneled into SSH connections by a K-means based learning algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 742-746, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
secure shell, machine learning, traffic analysis |
76 | Maurizio Dusi, Francesco Gringoli, Luca Salgarelli |
A Preliminary Look at the Privacy of SSH Tunnels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 17th International Conference on Computer Communications and Networks, IEEE ICCCN 2008, St. Thomas, U.S. Virgin Islands, August 3-7, 2008, pp. 626-632, 2008, IEEE, 978-1-4244-2390-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
76 | Weiping Liu, Wandong Cai |
Study on Security iSCSI Based on SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 457-462, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
70 | Vincent Larivière, Yves Gingras, Éric Archambault |
Canadian collaboration networks: A comparative analysis of the natural sciences, social sciences and the humanities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 68(3), pp. 519-533, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson |
Plaintext Recovery Attacks against SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA, pp. 16-26, 2009, IEEE Computer Society, 978-0-7695-3633-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
57 | Jesus Molina, Xavier Chorin, Michel Cukier |
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 144-155, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SSH compromises, filesystem data, host intrusion detection systems, intrusion detection systems evaluation |
56 | Éric Archambault, Étienne Vignola-Gagné, Grégoire Côté, Vincent Larivière, Yves Gingras |
Benchmarking scientific output in the social sciences and humanities: The limits of existing databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 68(3), pp. 329-342, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Emilio Remolina, Juan A. Fernandez, Benjamin Kuipers, Javier Gonzalez 0001 |
Formalizing Regions in the Spatial Semantic Hierarchy: An AH-Graphs Implementation Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSIT ![In: Spatial Information Theory: Cognitive and Computational Foundations of Geographic Information Science, International Conference COSIT '99, Stade, Germany, August 25-29, 1999, Proceedings, pp. 109-124, 1999, Springer, 3-540-66365-7. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Hierarchical representations of space, Spatial reasoning, Regions, Cognitive map |
52 | Norka B. Lucena, James Pease, Payman Yadollahpour, Steve J. Chapin |
Syntax and Semantics-Preserving Application-Layer Protocol Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers, pp. 164-179, 2004, Springer, 3-540-24207-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
application protocols, semantics, steganography, syntax, SSH |
48 | Riyad Alshammari, Peter Lichodzijewski, Malcolm I. Heywood, Nur Zincir-Heywood |
Classifying SSH encrypted traffic with minimum packet header features using genetic programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, Companion Material, pp. 2539-2546, 2009, ACM, 978-1-60558-505-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
defense applications, encrypted traffic classification, security, genetic programming, active learning, supervised learning, teaming, packet, problem decomposition |
48 | Vladislav Marinov, Jürgen Schönwälder |
Performance Analysis of SNMP over SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Large Scale Management of Distributed Systems, 17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2006, Dublin, Ireland, October 23-25, 2006, Proceedings, pp. 25-36, 2006, Springer, 3-540-47659-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski |
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings, pp. 191-202, 2006, Springer, 3-540-49462-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Yasir Ali, Sean W. Smith |
Flexible and Scalable Public Key Security for SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 43-56, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Phillip D. Pham, Marshall J. Levesque, Kohei Ichikawa, Susumu Date, Jason H. Haga |
Identification of a Specific Inhibitor for the Dual-Specificity Enzyme SSH-2 via Docking Experiments on the Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eScience ![In: Fourth International Conference on e-Science, e-Science 2008, 7-12 December 2008, Indianapolis, IN, USA, pp. 547-554, 2008, IEEE Computer Society, 978-1-4244-3380-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SSH-2, dual-specificity phosphatase, Virtual screening, DOCK |
42 | Jeffrey Horton, Reihaneh Safavi-Naini |
Detecting Policy Violations through Traffic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 109-120, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim |
Dynamic Authorization and Intrusion Response in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (1) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 50-61, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Martín Abadi |
Explicit Communication Revisited: Two New Attacks on Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 23(3), pp. 185-186, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
security, authentication, Cryptography, cryptographic protocols, authentication protocols |
39 | Xiaojun Zhu 0001, Jiao Tang |
NB-SSH: NB-IoT-Based Remote SSH Access to UAVs Under Symmetric NAT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. Lett. ![In: IEEE Netw. Lett. 6(1), pp. 6-10, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
39 | Stewart Sentanoe, Hans P. Reiser |
SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 40(Supplement), pp. 301337, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
39 | Sebastian Neef, Nils Wisiol |
Oh SSH-it, what's my fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.08846, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
39 | Sebastian Neef, Nils Wisiol |
Oh SSH-it, What's My Fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 21st International Conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022, Proceedings, pp. 71-88, 2022, Springer, 978-3-031-20973-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
39 | Henk van den Heuvel |
Crossing the SSH Bridge with Interview Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LR4SSHOC@LREC ![In: Proceedings of the Workshop about Language Resources for the SSH Cloud, LR4SSHOC@LREC 2020, Marseille, France, May 2020, pp. 42-44, 2020, European Language Resources Association, 979-10-95546-43-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
39 | Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes |
SSH, the secure shell - the definitive guide: securing your network and services: covers SSH-2 protocol (2. ed.). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2005 |
RDF |
|
37 | Liqun Liang, Shaowu Li, Yumei Chang, Yong Li, Xiaowen Sun, Qingquan Lei |
Differentially Gene Expression in the Brain of Common Carp ( Cyprinus carpio ) Response to Cold Acclimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCTA ![In: Computer And Computing Technologies In Agriculture, Volume I, First IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture (CCTA 2007), Wuyishan, China, August 18-20, 2007, pp. 331-339, 2007, Springer, 978-0-387-77250-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cold tolerance, suppression subtractive hybridization (SSH), real-time PCR, Cyprinus carpio |
34 | Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras |
Hidden Markov Model Modeling of SSH Brute-Force Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Integrated Management of Systems, Services, Processes and People in IT, 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2009, Venice, Italy, October 27-28, 2009. Proceedings, pp. 164-176, 2009, Springer, 978-3-642-04988-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Daniel Ramsbrock, Robin Berthier, Michel Cukier |
Profiling Attacker Behavior Following SSH Compromises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 119-124, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Giuliano Laccetti, Giovanni Schmid |
A PMI-Aware Extension for the SSH Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPAM ![In: Parallel Processing and Applied Mathematics, 7th International Conference, PPAM 2007, Gdansk, Poland, September 9-12, 2007, Revised Selected Papers, pp. 932-941, 2007, Springer, 978-3-540-68105-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Access control, Authorization, Grid security |
34 | Jonathan D. Blower, Keith Haines |
Building Simple, Easy-to-Use Grids with Styx Grid Services and SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: Second International Conference on e-Science and Grid Technologies (e-Science 2006), 4-6 December 2006, Amsterdam, The Netherlands, pp. 67, 2006, IEEE Computer Society, 0-7695-2734-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi Sree Deepya |
Reducing the Cost of Session Key Establishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 369-373, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Mansoor Alicherry, Angelos D. Keromytis |
DoubleCheck: Multi-path verification against man-in-the-middle attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia, pp. 557-563, 2009, IEEE Computer Society, 978-1-4244-4672-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Maurizio Dusi, Manuel Crotti, Francesco Gringoli, Luca Salgarelli |
Detection of Encrypted Tunnels Across Network Boundaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1738-1744, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Atul Prakash 0001 |
Security in Practice - Security-Usability Chasm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 1-9, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Peter C. S. Kwan, Glenn Durfee |
Practical Uses of Virtual Machines for Protection of Sensitive User Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 145-161, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Anil Madhavapeddy, Alex Ho, Tim Deegan, David J. Scott, Ripduman Sohan |
Melange: creating a "functional" internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, pp. 101-114, 2007, ACM, 978-1-59593-636-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Piotr Kopta, Tomasz Kuczynski, Roman Wyrzykowski |
Grid Access and User Interface in CLUSTERIX Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPAM ![In: Parallel Processing and Applied Mathematics, 6th International Conference, PPAM 2005, Poznan, Poland, September 11-14, 2005, Revised Selected Papers, pp. 249-257, 2005, Springer, 3-540-34141-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Takeshi Fujioka, Hiroki Karuno, Yahiko Kambayashi |
Practices of Information Education with Squeak toward the Secure Improvement of 'Academic Ability'. ![Search on Bibsonomy](Pics/bibsonomy.png) |
C5 ![In: 2004 Conference on Creating, Connecting and Collaborating through Computing (C5 2004), January 29-30, 2004, Kyoto, Japan, pp. 130-137, 2004, IEEE Computer Society, 0-7695-2166-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle |
The Design and Implementation of Protocol-Based Hidden Key Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 165-179, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Tong Lin 0002, Chong-Wah Ngo, HongJiang Zhang, Qing-Yun Shi |
Integrating color and spatial features for content-based video retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (3) ![In: Proceedings of the 2001 International Conference on Image Processing, ICIP 2001, Thessaloniki, Greece, October 7-10, 2001, pp. 592-595, 2001, IEEE, 0-7803-6725-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Benjamin Kuipers |
A Hierarchy of Qualitative Representations for Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Spatial Cognition ![In: Spatial Cognition, An Interdisciplinary Approach to Representing and Processing Spatial Knowledge, pp. 337-350, 1998, Springer, 3-540-64603-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
24 | José Carlos Brustoloni |
Laboratory experiments for network security instruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Educ. Resour. Comput. ![In: ACM J. Educ. Resour. Comput. 6(4), pp. 5, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
certifying authority, security, education, experiment, fingerprinting, Certificate, password, firewall, IPsec, VPN, SSL, dictionary attack, course, eavesdropping, SSH, port scanning, man-in-the-middle |
24 | Scott E. Hanselman, Luis O. Hernández, Divyangi Anchan, Mahmoud Pegah |
OS X: here we go again. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 221-226, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
login hooks, logout hooks, network, migration, LDAP, NFS, fonts, SSH, Macintosh OS X |
24 | Carl M. Ellison, Steve Dohrmann |
Public-key support for group collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(4), pp. 547-565, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
S/MIME, SDSI, PKI, Human-computer interface, IPsec, PGP, SSH, SPKI |
24 | Scott E. Hanselman, Mahmoud Pegah |
Macintosh OS X: a smooth migration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 31st Annual ACM SIGUCCS Conference on User Services 2003, San Antonio, TX, USA, September 21-24, 2003, pp. 129-134, 2003, ACM, 1-58113-665-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
NIS, network, migration, NFS, fonts, SSH, Macintosh OS X |
23 | Jesus Molina, Michel Cukier |
Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA, pp. 163-170, 2009, IEEE Computer Society, 978-0-7695-3698-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
filesystem data, attacker behavior, SSH compromise, Intrusion detection systems, honeypots, empirical analysis |
20 | Duong Dinh Tran, Kazuhiro Ogata 0001, Santiago Escobar 0001, Sedat Akleylek, Ayoub Otmani |
Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 1672-1687, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Peter E. Yee |
Update to the IANA SSH Protocol Parameters Registry Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9519, pp. 1-6, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Sachin Kumar Singh, Shreeman Gautam, Cameron Cartier, Sameer Patil, Robert Ricci |
Where The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSDI ![In: 21st USENIX Symposium on Networked Systems Design and Implementation, NSDI 2024, Santa Clara, CA, April 15-17, 2024., 2024, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
20 | Ronan Fablet, Quentin Febvre, Bertrand Chapron |
Multimodal 4DVarNets for the Reconstruction of Sea Surface Dynamics From SST-SSH Synergies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Geosci. Remote. Sens. ![In: IEEE Trans. Geosci. Remote. Sens. 61, pp. 1-14, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Fabian Bäumer, Marcus Brinkmann, Jörg Schwenk |
Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.12422, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger |
Passive SSH Key Compromise via Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1711, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Sivan Toledo |
SSH tunneling to connect to remote computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Impacts ![In: Softw. Impacts 17, pp. 100545, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Joana Cabral Costa, Tiago Roxo, Carolina Galvão Lopes, João B. F. Sequeiros, Tiago M. C. Simões, Pedro R. M. Inácio |
Theoretical and practical assessments over SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Res. Pract. Technol. Enhanc. Learn. ![In: Res. Pract. Technol. Enhanc. Learn. 18, pp. 30, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger |
Passive SSH Key Compromise via Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 2886-2900, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Günter Fahrnberger |
Bloom Filter-Based Realtime Risk Monitoring of SSH Brute Force Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I4CS ![In: Innovations for Community Services - 23rd International Conference, I4CS 2023, Bamberg, Germany, September 11-13, 2023, Proceedings, pp. 48-67, 2023, Springer, 978-3-031-40851-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Julien Piet, Aashish Sharma, Vern Paxson, David A. Wagner 0001 |
Network Detection of Interactive SSH Impostors Using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 4283-4300, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Evan Wilcox, Anne Bowen, Mike Packard |
Understanding Encryption & SSH Cipher Benchmarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PEARC ![In: Practice and Experience in Advanced Research Computing, PEARC 2023, Portland, OR, USA, July 23-27, 2023, pp. 486-488, 2023, ACM, 978-1-4503-9985-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ryo Nakamura, Yohei Kuga |
Multi-threaded scp: Easy and Fast File Transfer over SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PEARC ![In: Practice and Experience in Advanced Research Computing, PEARC 2023, Portland, OR, USA, July 23-27, 2023, pp. 320-323, 2023, ACM, 978-1-4503-9985-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Connor Hetzler, Zachary Chen, Tahir M. Khan |
Analysis of SSH Honeypot Effectiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FICC (2) ![In: Advances in Information and Communication - Proceedings of the 2023 Future of Information and Communication Conference (FICC), Volume 2, San Francisco, CA, USA, 2-3 March 2023., pp. 759-782, 2023, Springer, 978-3-031-28072-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Laure Barbot, Elena Battaner Moro, Stefan Buddenbohm, Cesare Concordia, Maja Dolinar, Matej Durco, Edward Gray, Cristina Grisot, Klaus Illmayer, Martin Kirnbauer, Mari Kleemola, Alexander König, Michael Kurzmeier, Barbara McGillivray, Clara Parente Boavida, Christian Schuster, Irena Vipavc Brvar, Magdalena Wnuk |
Creating a DH workflow in the SSH Open Marketplace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DH ![In: Annual International Conference of the Alliance of Digital Humanities Organizations, DH 2022, Graz, Austria, July 10-14, 2023, Conference Abstracts, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Junwon Lee, Heejo Lee |
An SSH predictive model using machine learning with web proxy session logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 21(2), pp. 311-322, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Wei Cui, Jungang Yang 0004, Yongjun Jia, Jie Zhang 0019 |
Oceanic Eddy Detection and Analysis from Satellite-Derived SSH and SST Fields in the Kuroshio Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 14(22), pp. 5776, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Qiang Wang, Wei Zheng, Fan Wu, Huizhong Zhu, Aigong Xu, Yifan Shen, Yelong Zhao |
Improving the SSH Retrieval Precision of Spaceborne GNSS-R Based on a New Grid Search Multihidden Layer Neural Network Feature Optimization Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 14(13), pp. 3161, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Hainan Wang, Jerry Chun-Wei Lin |
Unit test system of online English course based on SSH Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Scalable Inf. Syst. ![In: EAI Endorsed Trans. Scalable Inf. Syst. 9(5), pp. e2, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Zhenhui Wang, Dezhi Han, Ming Li, Han Liu 0009, Mingming Cui |
The abnormal traffic detection scheme based on PCA and SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Connect. Sci. ![In: Connect. Sci. 34(1), pp. 1201-1220, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Christofer Fellicious, Stewart Sentanoe, Michael Granitzer, Hans P. Reiser |
SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.05243, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Alexandre Dulaunoy, Jean-Louis Huynen, Aurelien Thirion |
Active and Passive Collection of SSH key material for cyber threat intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.04922, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Ronan Fablet, Bertrand Chapron, Julien Le Sommer, Florian Sévellec |
Inversion of sea surface currents from satellite-derived SST-SSH synergies with 4DVarNets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.13059, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Gokul Kannan Sadasivam, Chittaranjan Hota, Anand Bhojan |
Detection of stealthy single-source SSH password guessing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Evol. Syst. ![In: Evol. Syst. 13(1), pp. 1-15, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Nicholas Gajcowski, Michael Jenkins |
Commercial National Security Algorithm (CNSA) Suite Cryptography for Secure Shell (SSH). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9212, pp. 1-10, March 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Mark D. Baushke |
Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9142, pp. 1-19, January 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek |
Practical Privacy-Preserving Authentication for SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 740, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
20 | Junwon Lee, Heejo Lee |
Improving SSH detection model using IPA time and WGAN-GP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 116, pp. 102672, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Alireza Zarei, Yim Seung-Bin, Matej Durco, Klaus Illmayer, Laure Barbot, Frank Fischer 0005, Edward Gray |
Der SSH Open Marketplace - Kontextualisiertes Praxiswissen für die Digital Humanities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DHd ![In: 8. Tagung des Verbands Digital Humanities im deutschsprachigen Raum, DHd 2022, Potsdam, Germany, March 7 - 11, 2022, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Cesare Concordia, Nicolas Larrousse, Edward Gray |
The SSH Data Citation Service, A Tool to Explore and Collect Citation Metadata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TPDL ![In: Linking Theory and Practice of Digital Libraries - 26th International Conference on Theory and Practice of Digital Libraries, TPDL 2022, Padua, Italy, September 20-23, 2022, Proceedings, pp. 351-356, 2022, Springer, 978-3-031-16801-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Günter Fahrnberger |
Realtime Risk Monitoring of SSH Brute Force Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I4CS ![In: Innovations for Community Services - 22nd International Conference, I4CS 2022, Delft, The Netherlands, June 13-15, 2022, Proceedings, pp. 75-95, 2022, Springer, 978-3-031-06667-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek |
Practical Privacy-Preserving Authentication for SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pp. 3345-3362, 2022, USENIX Association, 978-1-939133-31-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
20 | Junior Samuel López-Yépez, Antoine Fagette |
Increasing attacker engagement on SSH honeypots using semantic embeddings of cyber-attack patterns and deep reinforcement learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSCI ![In: IEEE Symposium Series on Computational Intelligence, SSCI 2022, Singapore, December 4-7, 2022, pp. 389-395, 2022, IEEE, 978-1-6654-8768-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Björn Hammarfelt, Isak Hammar, Helena Francke |
Ensuring Quality and Status: Peer Review Practices in Kriterium, A Portal for Quality-Marked Monographs and Edited Volumes in Swedish SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Res. Metrics Anal. ![In: Frontiers Res. Metrics Anal. 6, pp. 740297, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Abel Z. Agghey, Lunodzo J. Mwinuka, Sanket M. Pandhare, Mussa Ally Dida, Jema David Ndibwile |
Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 13(11), pp. 2192, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Yifan Jiang 0001, He Zhang 0004, Jianming Zhang 0001, Yilin Wang, Zhe Lin 0001, Kalyan Sunkavalli, Simon Chen, Sohrab Amirghodsi, Sarah Kong, Zhangyang Wang |
SSH: A Self-Supervised Framework for Image Harmonization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2108.06805, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
20 | Daniel Reti, David Klaaßen, Simon Duque Antón, Hans Dieter Schotten |
Secure (S)Hell: Introducing an SSH Deception Proxy Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2104.03666, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
20 | Yajie Wang, Alesia A. Zuccala |
Scholarly book publishers as publicity agents for SSH titles on Twitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 126(6), pp. 4817-4840, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | José Tomás Martínez Garre, Manuel Gil Pérez, Antonio Ruiz-Martínez |
A novel Machine Learning-based approach for the detection of SSH botnet infection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 115, pp. 387-396, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Xiao Luo 0002, Chengchao Yao, Nur Zincir-Heywood |
Modelling and visualising SSH brute force attack behaviours through a hybrid learning framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 16(1/2), pp. 170-191, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Yifan Jiang 0001, He Zhang 0004, Jianming Zhang 0001, Yilin Wang, Zhe L. Lin, Kalyan Sunkavalli, Simon Chen, Sohrab Amirghodsi, Sarah Kong, Zhangyang Wang |
SSH: A Self-Supervised Framework for Image Harmonization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCV ![In: 2021 IEEE/CVF International Conference on Computer Vision, ICCV 2021, Montreal, QC, Canada, October 10-17, 2021, pp. 4812-4821, 2021, IEEE, 978-1-6654-2812-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | John T. Hancock, Taghi M. Khoshgoftaar, Joffrey L. Leevy |
Detecting SSH and FTP Brute Force Attacks in Big Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLA ![In: 20th IEEE International Conference on Machine Learning and Applications, ICMLA 2021, Pasadena, CA, USA, December 13-16, 2021, pp. 760-765, 2021, IEEE, 978-1-6654-4337-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Daniel Reti, David Klaaßen, Simon Duque Antón, Hans Dieter Schotten |
Secure (S)Hell: Introducing an SSH Deception Proxy Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberSA ![In: International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021, pp. 1-6, 2021, IEEE, 978-1-6654-2529-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Pratibha Khandait, Namrata Tiwari, Neminath Hubballi |
Who is Trying to Compromise Your SSH Server ? An Analysis of Authentication Logs and Detection of Bruteforce Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCN (Adjunct Volume) ![In: ICDCN '21: International Conference on Distributed Computing and Networking, Virtual Event, Nara, Japan, January 5-8, 2021, Adjunct Volume, pp. 127-132, 2021, ACM, 978-1-4503-8184-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Maxime Beauchamp, Mohamed Mahmoud Amar, Quentin Febvre, Ronan Fablet |
End-to-End Learning of Variational Interpolation Schemes for Satellite-Derived SSH Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IGARSS ![In: IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2021, Brussels, Belgium, July 11-16, 2021, pp. 7418-7421, 2021, IEEE, 978-1-6654-0369-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Ben Harris, Loganaden Velvindron |
Ed25519 and Ed448 Public Key Algorithms for the Secure Shell (SSH) Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8709, pp. 1-7, February 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Loganaden Velvindron |
Deprecating RC4 in Secure Shell (SSH). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8758, pp. 1-5, April 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Aris Adamantiadis, Simon Josefsson, Mark D. Baushke |
Secure Shell (SSH) Key Exchange Method Using Curve25519 and Curve448. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8731, pp. 1-6, February 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Matej Zuzcák, Milan Zenka |
Expert system assessing threat level of attacks on a hybrid SSH honeynet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 92, pp. 101784, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 332 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|