The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SSH with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-2001 (16) 2002-2003 (15) 2004 (16) 2005 (15) 2006 (32) 2007 (21) 2008 (15) 2009 (21) 2010-2011 (15) 2012-2013 (16) 2014-2015 (20) 2016-2017 (26) 2018-2019 (31) 2020 (24) 2021-2022 (33) 2023-2024 (16)
Publication types (Num. hits)
article(103) book(3) incollection(3) inproceedings(221) phdthesis(1) proceedings(1)
Venues (Conferences, Journals, ...)
RFC(28) CoRR(12) LR4SSHOC@LREC(10) IACR Cryptol. ePrint Arch.(9) IGARSS(7) CCGRID(6) CCS(5) PEARC(5) PPAM(5) ISCC(4) LISA(4) Scientometrics(4) Frontiers Res. Metrics Anal.(3) ICACCI(3) ICC(3) ISC(3) More (+10 of total 195)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 153 occurrences of 117 keywords

Results
Found 332 publication records. Showing 332 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Hristo N. Djidjev, Lyudmil Aleksandrov Generation of SSH Network Traffic Data for IDS Testbeds. Search on Bibsonomy CSET The full citation details ... 2013 DBLP  BibTeX  RDF
20Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga Identifying User Authentication Methods on Connections for SSH Dictionary Attack Detection. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Ioannis Koniaris, Georgios I. Papadimitriou, Petros Nicopolitidis Analysis and visualization of SSH attacks using honeypots. Search on Bibsonomy EUROCON The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Silvia González, Javier Sedano, Urko Zurutuza, Enaitz Ezpeleta, Diego Martínez, Álvaro Herrero 0001, Emilio Corchado Classification of SSH Anomalous Connections. Search on Bibsonomy SOCO-CISIS-ICEUTE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Przemyslaw Plesowicz, Piotr Laszczyk Evaluation of secure signal transmission in automatic control using SSH tunneling. Search on Bibsonomy MMAR The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Anna Sperotto, Michel Mandjes, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Denis Bider, Mark D. Baushke SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol. Search on Bibsonomy RFC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Robin Seggelmann, Michael Tüxen, Erwin P. Rathgeb SSH over SCTP - Optimizing a multi-channel protocol by adapting it to SCTP. Search on Bibsonomy CSNDSP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Craig Valli SSH - Somewhat Secure Host. Search on Bibsonomy CSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga SSH Dictionary Attack Detection Based on Flow Analysis. Search on Bibsonomy SAINT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Laurens Hellemons, Luuk Hendriks, Rick Hofstede, Anna Sperotto, Ramin Sadre, Aiko Pras SSHCure: A Flow-Based SSH Intrusion Detection System. Search on Bibsonomy AIMS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20André Egners, Dominic Gatzen, Andriy Panchenko 0001, Ulrike Meyer Introducing SOR: SSH-based Onion Routing. Search on Bibsonomy AINA Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Marijke De Soete SSH. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Peter Gutmann Do Users Verify SSH Keys? Search on Bibsonomy login Usenix Mag. The full citation details ... 2011 DBLP  BibTeX  RDF
20Margaret Wasserman Using the NETCONF Protocol over Secure Shell (SSH). Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Kevin M. Igoe Suite B Cryptographic Suites for Secure Shell (SSH). Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Stephen C. Williams Analysis of the SSH Key Exchange Protocol. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
20Felipe Rodrigues Martinêz Basile, Flávio Cezar Amate Secure Transmission of Medical Images by SSH Tunneling. Search on Bibsonomy HCI (22) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Matti Hirvonen, Mirko Sailio Two-phased method for identifying SSH encrypted application flows. Search on Bibsonomy IWCMC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Stephen C. Williams Analysis of the SSH Key Exchange Protocol. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Jin Peng, Xin Zhao SSH-Based Device Identity and Trust Initialization. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Wenjun Zhang 0001 Integrated Web Architecture Based on Web3D, Flex and SSH. Search on Bibsonomy J. Softw. Eng. Appl. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Kenneth G. Paterson, Gaven J. Watson Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
20Paul Z. Kolano Dynamic load balancing of SSH sessions using user-specific selection policies. Search on Bibsonomy ISCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Kenneth G. Paterson, Gaven J. Watson Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. Search on Bibsonomy EUROCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Wenjun Zhang 0001 E-Commerce Architecture Based on Web3D, Web2.0 & SSH. Search on Bibsonomy ICEE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Riyad Alshammari, Nur Zincir-Heywood Generalization of signatures for SSH encrypted traffic identification. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Maurizio Dusi, Alice Este, Francesco Gringoli, Luca Salgarelli Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic. Search on Bibsonomy ICC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Nan Dun, Kenjiro Taura, Akinori Yonezawa GMount: An Ad Hoc and Locality-Aware Distributed File System by Using SSH and FUSE. Search on Bibsonomy CCGRID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20P. Iyappan, K. S. Arvind, N. Geetha, S. Vanitha Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol. Search on Bibsonomy ICETET The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Joyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth An SSH-based Toolkit for User-based Network Services. Search on Bibsonomy LISA The full citation details ... 2009 DBLP  BibTeX  RDF
20Riyad Alshammari, Nur Zincir-Heywood Machine learning based encrypted traffic classification: Identifying SSH and Skype. Search on Bibsonomy CISDA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Ana Liz Souto Oliveira, Flávia Coimbra Delicato, Marcos Pirmez JanioS: um serviço de SSH para o Prometheus. Search on Bibsonomy WebMedia (Companion) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Dan Wendlandt, David G. Andersen, Adrian Perrig Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. Search on Bibsonomy USENIX Annual Technical Conference The full citation details ... 2008 DBLP  BibTeX  RDF
20An Qin 0001, Haiyan Yu, Chengchun Shu, Bing Xu XOS-SSH: A Lightweight User-Centric Tool to Support Remote Execution in Virtual Organizations. Search on Bibsonomy LASCO The full citation details ... 2008 DBLP  BibTeX  RDF
20Timo Dotzauer, Tobias Lütticke, Alexander von Gernler Das SSH-Buch - Leitfaden für den sicheren Einsatz von OpenSSH. Search on Bibsonomy 2007   RDF
20Riyad Alshammari, Nur Zincir-Heywood A flow based approach for SSH traffic detection. Search on Bibsonomy SMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Sheng-Che Tseng, Chinchun Meng, Wei-Yu Chen True 50% Duty-Cycle SSH and SHH SiGe BiCMOS Divide-by-3 Prescalers. Search on Bibsonomy IEICE Trans. Electron. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Jeffrey Hutzelman, Joseph Salowey, Joseph Galbraith, Von Welch Generic Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre The Secure Shell (SSH) Transport Layer Encryption Modes. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Joseph Galbraith, Phillip Remaker The Secure Shell (SSH) Session Channel Break Extension. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Sami Lehtinen, Chris Lonvick The Secure Shell (SSH) Protocol Assigned Numbers. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Frank Cusack, Martin Forssen Generic Message Exchange Authentication for the Secure Shell Protocol (SSH). Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Tatu Ylönen, Chris Lonvick The Secure Shell (SSH) Connection Protocol. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Ben Harris Improved Arcfour Modes for the Secure Shell (SSH) Transport Layer Protocol. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Tatu Ylönen, Chris Lonvick The Secure Shell (SSH) Authentication Protocol. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Tatu Ylönen, Chris Lonvick The Secure Shell (SSH) Transport Layer Protocol. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Jakob Schlyter, Wesley Griffin Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Tatu Ylönen, Chris Lonvick The Secure Shell (SSH) Protocol Architecture. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Margaret Wasserman, Ted Goddard Using the NETCONF Configuration Protocol over Secure SHell (SSH). Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Ben Harris RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Markus Friedl, Niels Provos, William Allen Simpson Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Joseph Galbraith, Rodney Thayer The Secure Shell (SSH) Public Key File Format. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia D. McLain Inoculating SSH Against Address Harvesting. Search on Bibsonomy NDSS The full citation details ... 2006 DBLP  BibTeX  RDF
20Teemu Koponen, Pasi Eronen, Mikko Särelä Resilient Connections for SSH and TLS. Search on Bibsonomy USENIX Annual Technical Conference, General Track The full citation details ... 2006 DBLP  BibTeX  RDF
20Mark Striebeck Ssh! We Are Adding a Process... Search on Bibsonomy AGILE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Peter Landrock SSH. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Iván González, Francisco J. Gomez-Arribas, Sergio López-Buedo Hardware-Accelerated SSH on Self-Reconfigurable Systems. Search on Bibsonomy FPT The full citation details ... 2005 DBLP  BibTeX  RDF
20William Yurcik, Chao Liu 0001 A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. Search on Bibsonomy CCGRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Nicholas Rosasco, David Larochelle How and Why More Secure Technologies Succeed in Legacy Markets - Lessons from the Success of SSH. Search on Bibsonomy Economics of Information Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20S. Omar, T. Kimura SSH Client for Mobile Phones Using I-Mode. Search on Bibsonomy International Conference on Wireless Networks The full citation details ... 2004 DBLP  BibTeX  RDF
20Robert A. Napier Secure Automation: Achieving Least Privilege with SSH, Sudo, and Suid. Search on Bibsonomy LISA The full citation details ... 2004 DBLP  BibTeX  RDF
20Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
20Daniel J. Barrett, Richard E. Silverman SSH the secure shell - the definitive guide: network security. Search on Bibsonomy 2001   RDF
20Dawn Xiaodong Song, David A. Wagner 0001, Xuqing Tian Timing Analysis of Keystrokes and Timing Attacks on SSH. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2001 DBLP  BibTeX  RDF
20Siegfried Höfinger Load Balancing for the Electronic Structure Program GREMLIN in a Very Heterogenous SSH-Connected WAN-Cluster of UNIX-Type Hosts. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Niels Provos, Peter Honeyman ScanSSH: Scanning the Internet for SSH Servers. Search on Bibsonomy LISA The full citation details ... 2001 DBLP  BibTeX  RDF
20Giles Orr, Jacob Wyatt SSH Port Forwarding. Search on Bibsonomy Annual Linux Showcase & Conference The full citation details ... 2000 DBLP  BibTeX  RDF
20Christopher Thorpe SSU: Extending SSH for Secure Root Administration. Search on Bibsonomy LISA The full citation details ... 1998 DBLP  BibTeX  RDF
20Jean Rohmer SSH : un outil et des techniques simples à implémenter pour construire et simuler des modèles hiérarchisés de systèmes. Search on Bibsonomy 1976   RDF
14Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang Ciphertext verification security of symmetric encryption schemes. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption
14Anil Madhavapeddy Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language. Search on Bibsonomy ICFEM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Wei Ding 0003, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle Detecting Stepping-Stone Intruders with Long Connection Chains. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Jason Ansel, Kapil Arya, Gene Cooperman DMTCP: Transparent checkpointing for cluster computations and the desktop. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta A Unified Approach to Intra-domain Security. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Benoit Claudel, Guillaume Huard, Olivier Richard TakTuk, adaptive deployment of remote executions. Search on Bibsonomy HPDC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF remote executions deployment, adaptivity, work-stealing
14Marek Kumpost, Vashek Matyas User Profiling and Re-identification: Case of University-Wide Network Analysis. Search on Bibsonomy TrustBus The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Andre Charbonneau, Victor Terskikh SpectroGrid: Providing Simple Secure Remote Access to Scientific Instruments. Search on Bibsonomy HPCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Remote instrumentation, Security, Grid computing
14Yun-Yu Lee, Ing-Yi Chen, Sy-Yen Kuo, Hsi-Hai Liu, Yuh-Rong Leu Implementation of OpenWrt-based IP PnP gateway. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IP plug and play, wireless network, access control, gateway, hotspot
14Pemjit Aphimaeteethomrong, Veera Muangsin A Visualization Portal for a Tsunami Warning System on a Distributed Environment. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Tsunami Visualization, Visualization Portal, Warning System, Distributed Environment
14Ken Hironaka, Hideo Saito, Kei Takahashi, Kenjiro Taura gluepy: A Simple Distributed Python Programming Framework for Complex Grid Environments. Search on Bibsonomy LCPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Mudhakar Srivatsa, Ling Liu 0001, Arun Iyengar Preserving Caller Anonymity in Voice-over-IP Networks. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Nan Dun, Kenjiro Taura, Akinori Yonezawa GMount: Build your grid file system on the fly. Search on Bibsonomy GRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Riyad Alshammari, Nur Zincir-Heywood Investigating Two Different Approaches for Encrypted Traffic Classification. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Andreas Petlund, Kristian Evensen, Carsten Griwodz, Pål Halvorsen TCP mechanisms for improving the user experience for time-dependent thin-stream applications. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato J. O. Figueiredo WOW: Self-organizing Wide Area Overlay Networks of Virtual Workstations. Search on Bibsonomy J. Grid Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Clusters, Grid computing, Networks, P2P, Virtual
14Assaf Rinot Antichains in partially ordered sets of singular cofinality. Search on Bibsonomy Arch. Math. Log. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 03E04, 06A07, 03E35
14Peter Dimopoulos, Panlop Zeephongsekul, Zahir Tari A dynamic priority approach to reducing delay in interactive TCP connections. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Internet traffic queue management, Dynamic priority discipline, TCP
14Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo Analysis of Computer Intrusions Using Sequences of Function Calls. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF unauthorized access (for example, hacking), Security, design, intrusion detection, management, anomaly detection, auditing, logging, forensic analysis
14Shinichi Mukosaka, Hideki Koike Integrated visualization system for monitoring security in large-scale local area network. Search on Bibsonomy APVIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Shervin Erfani Tutorial 4: Wireless and Wireline Security Management. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Alfredo Pironti 0001, Riccardo Sisto An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Gabriel Parmer, Richard West Mutable Protection Domains: Towards a Component-Based System for Dependable and Predictable Computing. Search on Bibsonomy RTSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14David R. Piegdon, Lexi Pimenidis Targeting Physically Addressable Memory. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Raphael C.-W. Phan, Serge Vaudenay Security-Preserving Asymmetric Protocol Encapsulation. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Pawel Czarnul BC-MPI: Running an MPI Application on Multiple Clusters with BeesyCluster Connectivity. Search on Bibsonomy PPAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF WAN-aware MPI, threads and MPI, grid middleware
14Martin Hlavác, Tomás Rosa Extended Hidden Number Problem and Its Cryptanalytic Applications. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DSA implementation, hyper-threading, lattice, sliding window, side channel analysis, cache analysis
14Eli Biham, Orr Dunkelman, Nathan Keller New Cryptanalytic Results on IDEA. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Leif Nixon The Stakkato Intrusions: What Happened and What Have We Learned?. Search on Bibsonomy CCGRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato J. O. Figueiredo WOW: Self-Organizing Wide Area Overlay Networks of Virtual Workstations. Search on Bibsonomy HPDC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF self-organizing wide area overlay network, virtual workstation, WOW distributed system, peer-to-peer technique, user-level decentralized technique, IP packet, PVM-based fastDNAml application, virtual IP layer, virtual machine, local-area network, firewalls, WAN, cluster of workstations, high-throughput computing, client-server application
Displaying result #201 - #300 of 332 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license