The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SSH with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-2001 (16) 2002-2003 (15) 2004 (16) 2005 (15) 2006 (32) 2007 (21) 2008 (15) 2009 (21) 2010-2011 (15) 2012-2013 (16) 2014-2015 (20) 2016-2017 (26) 2018-2019 (31) 2020 (24) 2021-2022 (33) 2023-2024 (16)
Publication types (Num. hits)
article(103) book(3) incollection(3) inproceedings(221) phdthesis(1) proceedings(1)
Venues (Conferences, Journals, ...)
RFC(28) CoRR(12) LR4SSHOC@LREC(10) IACR Cryptol. ePrint Arch.(9) IGARSS(7) CCGRID(6) CCS(5) PEARC(5) PPAM(5) ISCC(4) LISA(4) Scientometrics(4) Frontiers Res. Metrics Anal.(3) ICACCI(3) ICC(3) ISC(3) More (+10 of total 195)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 153 occurrences of 117 keywords

Results
Found 332 publication records. Showing 332 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Neminath Hubballi, Namrata Tiwari, Pratibha Khandait POSTER: Distributed SSH Bruteforce Attack Detection with Flow Content Similarity and Login Failure Reputation. Search on Bibsonomy AsiaCCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Md Delwar Hossain, Hideya Ochiai, Doudou Fall, Youki Kadobayashi SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches. Search on Bibsonomy ICCCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Karel Hynek, Tomás Benes, Tomás Cejka, Hana Kubátová Refined Detection of SSH Brute-Force Attackers Using Machine Learning. Search on Bibsonomy SEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Masaru Ueno, Yuji Imai SSH Kernel: A Jupyter Extension Specifically for Remote Infrastructure Administration. Search on Bibsonomy NOMS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Ron Andrews, Dalton A. Hahn, Alexandru G. Bardas Measuring the Prevalence of the Password Authentication Vulnerability in SSH. Search on Bibsonomy ICC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Hirofumi Tsuruta, Ryosuke Matsumoto sshr: An SSH Proxy Server Responsive to System Changes without Forcing Clients to Change. Search on Bibsonomy COMPSAC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20You Alex Gao, Jim Basney, Alex Withers SciTokens SSH: Token-based Authentication for Remote Login to Scientific Computing Environments. Search on Bibsonomy PEARC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Jason Alt, Rachana Ananthakrishnan, Kyle Chard, Ryan Chard, Ian T. Foster, Lee Liming, Steven Tuecke OAuth SSH with Globus Auth. Search on Bibsonomy PEARC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. Search on Bibsonomy CoNEXT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Baojian Cui, Xiaochun Sun, Yuhong Chen Design and Implementation of Tourism Management System Based on SSH. Search on Bibsonomy SPIoT (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Daan Broeder, Maria Eskevich, Monica Monachini (eds.) Proceedings of the Workshop about Language Resources for the SSH Cloud, LR4SSHOC@LREC 2020, Marseille, France, May 2020 Search on Bibsonomy LR4SSHOC@LREC The full citation details ... 2020 DBLP  BibTeX  RDF
20Daan Broeder, Maria Eskevich, Monica Monachini LR4SSHOC: The Future of Language Resources in the Context of the Social Sciences and Humanities Open Cloud. Search on Bibsonomy LR4SSHOC@LREC The full citation details ... 2020 DBLP  BibTeX  RDF
20Francesca Di Donato, Monica Monachini, Maria Eskevich, Stefanie Pohle, Yoann Moranville, Suzanne Dumouchel Social Sciences and Humanities Pathway Towards the European Open Science Cloud. Search on Bibsonomy LR4SSHOC@LREC The full citation details ... 2020 DBLP  BibTeX  RDF
20Cesare Concordia, Carlo Meghini, Filippo Benedetti Store Scientific Workflows Data in SSHOC Repository. Search on Bibsonomy LR4SSHOC@LREC The full citation details ... 2020 DBLP  BibTeX  RDF
20Maria Pontiki, Maria Gavriilidou, Dimitris Gkoumas, Stelios Piperidis Verbal Aggression as an Indicator of Xenophobic Attitudes in Greek Twitter during and after the Financial Crisis. Search on Bibsonomy LR4SSHOC@LREC The full citation details ... 2020 DBLP  BibTeX  RDF
20Donatella Castelli EOSC as a game-changer in the Social Sciences and Humanities research activities. Search on Bibsonomy LR4SSHOC@LREC The full citation details ... 2020 DBLP  BibTeX  RDF
20Sebastian Nordhoff From the attic to the cloud: mobilization of endangered language resources with linked data. Search on Bibsonomy LR4SSHOC@LREC The full citation details ... 2020 DBLP  BibTeX  RDF
20Christopher Cieri Stretching Disciplinary Boundaries in Language Resource Development and Use: a Linguistic Data Consortium Position Paper. Search on Bibsonomy LR4SSHOC@LREC The full citation details ... 2020 DBLP  BibTeX  RDF
20Ruben Ros, Marieke van Erp, Auke Rijpma, Richard Zijdeman Mining Wages in Nineteenth-Century Job Advertisements. The Application of Language Resources and Language Technology to study Economic and Social Inequality. Search on Bibsonomy LR4SSHOC@LREC The full citation details ... 2020 DBLP  BibTeX  RDF
20Peter McLaren, Gordon Russell 0001, William J. Buchanan, Zhiyuan Tan 0001 Decrypting live SSH traffic in virtual environments. Search on Bibsonomy Digit. Investig. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Ke Zhang 0005, Xinyao Guo, Yingxuan He, Xinsheng Wang, Yurong Guo, Qiaolin Ding IMS-SSH: multiscale face detection method in unconstrained settings. Search on Bibsonomy J. Electronic Imaging The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Florian Bayer, Juan Gorraiz, Christian Gumpenberger, Arantxa Itúrbide, Isabel Iribarren-Maestro, Steve Reding Investigating SSH Research and Publication Practices in Disciplinary and Institutional Contexts. A Survey-Based Comparative Approach in Two Universities. Search on Bibsonomy Frontiers Res. Metrics Anal. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Gunnar Sivertsen Understanding and Evaluating Research and Scholarly Publishing in the Social Sciences and Humanities (SSH). Search on Bibsonomy Data Inf. Manag. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Peter McLaren, Gordon Russell 0001, William J. Buchanan, Zhiyuan Tan 0001 Decrypting live SSH traffic in virtual environments. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
20Poul Meier Melchiorsen Bibliometric differences - a case study in bibliometric evaluation across SSH and STEM. Search on Bibsonomy J. Documentation The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Eric Crockett 0001, Christian Paquin, Douglas Stebila Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
20Pavel Celeda, Petr Velan, Benjamin Kral, Ondrej Kozak Enabling SSH Protocol Visibility in Flow Monitoring. Search on Bibsonomy IM The full citation details ... 2019 DBLP  BibTeX  RDF
20Gourav Prateek Sharma, Wouter Tavernier, Didier Colle, Mario Pickavet Dynamic accelerator provisioning for SSH tunnels in NFV environments. Search on Bibsonomy NetSoft The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Amine Belqruch, Abdelilah Maach SCADA security using SSH honeypot. Search on Bibsonomy NISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Tindaro Cicero, Marco Malgarini Robustness of journal classifications in SSH: an empirical analysis from Italy. Search on Bibsonomy ISSI The full citation details ... 2019 DBLP  BibTeX  RDF
20Siluo Yang, Mengxue Zheng Analysis of SSH impact based on Citations and Altmetrics. Search on Bibsonomy ISSI The full citation details ... 2019 DBLP  BibTeX  RDF
20Phuong Cao, Yuming Wu, Subho S. Banerjee, Justin Azoff, Alexander Withers, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks. Search on Bibsonomy NSDI The full citation details ... 2019 DBLP  BibTeX  RDF
20Tatu Ylönen SSH Key Management Challenges and Requirements. Search on Bibsonomy NTMS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Vincent Ghiëtte, Harm Griffioen, Christian Doerr Fingerprinting Tooling used for SSH Compromisation Attempts. Search on Bibsonomy RAID The full citation details ... 2019 DBLP  BibTeX  RDF
20Anagha Jamthe, Mike Packard, Joe Stubbs, Gilbert Curbelo, Roseline Shapi, Elias Chalhoub SSH-Backed API Performance Case Study. Search on Bibsonomy Bench The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Zhong Guan, Gaopeng Gou, Yangyang Guan, Bingxu Wang An Empirical Analysis of Plugin-Based Tor Traffic over SSH Tunnel. Search on Bibsonomy MILCOM The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Wanlin Zhai, Longhao Yan, He Wang 0005, Jiguo Qiao, Hao Liang Accuracy of Ssh Measurement by Usv Equipped With Gps -A Comparison with the Gps Buoy. Search on Bibsonomy IGARSS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Pascal Bonnefond, Olivier Laurain, Pierre Exertier, Francois Boy, Thierry Guinle, Nicolas Picot, Sylvie Labroue, Matthias Raynal, Craig Donlon, Pierre Féménias, Tommaso Parrinello, Salvatore Dinardo Calibrating the SAR SSH of Sentinel-3A and CryoSat-2 over the Corsica Facilities. Search on Bibsonomy Remote. Sens. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Markus C. Hayden, Martin Weiß, Alice Pechriggl, Daniel Wutti Insights Into University Knowledge Transfer in the Social Sciences and Humanities (SSH) and Other Scientific Disciplines - More Similarities Than Differences. Search on Bibsonomy Frontiers Res. Metrics Anal. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Sándor Soós, Zsófia Vida, András Schubert Long-term trends in the multidisciplinarity of some typical natural and social sciences, and its implications on the SSH versus STM distinction. Search on Bibsonomy Scientometrics The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Massimiliano Cannata, Giovanni Profeta, Michela Voegeli, Manuel Lüscher, Laura Morandi Crossing SSH and STEM approaches in a MapDesign course using open data and software. Search on Bibsonomy PeerJ Prepr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Denis Bider Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol. Search on Bibsonomy RFC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Denis Bider Extension Negotiation in the Secure Shell (SSH) Protocol. Search on Bibsonomy RFC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Yotam Harchol, Ittai Abraham, Benny Pinkas Distributed SSH Key Management with Proactive RSA Threshold Signatures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
20Stefan Hagedorn d.fence - Sicherer Fernzugriff auf Agrarsteuerungen mit Hilfe eines SSH-Reverse-Proxys mit grafischer Bedien- und Verwaltungsoberfläche. Search on Bibsonomy GIL Jahrestagung The full citation details ... 2018 DBLP  BibTeX  RDF
20Yotam Harchol, Ittai Abraham, Benny Pinkas Distributed SSH Key Management with Proactive RSA Threshold Signatures. Search on Bibsonomy ACNS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Jorge David de Hoz Diego, Jose Saldana, Julián Fernández-Navajas, José Ruíz-Mas, Rebeca Guerrero Rodriguez, Felix de Jesus Mar Luna SSH as an Alternative to TLS in IoT Environments using HTTP. Search on Bibsonomy GIoTS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection. Search on Bibsonomy NordSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Jiaoqi Fu, Chao Chen, Xu Lu Analysis of Spatio-Temporal Pattern Evolution of SSH in Zhoushan Sea Area. Search on Bibsonomy IGARSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Maofei Jiang, Ke Xu 0012, Yalong Liu Assessment of Reprocessed SSH and SWH Measurements Derived from HY-2A Radar Altimeter. Search on Bibsonomy IGARSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Mahyar Najibi, Pouya Samangouei, Rama Chellappa, Larry S. Davis SSH: Single Stage Headless Face Detector. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
20Mark D. Baushke More Modular Exponentiation (MODP) Diffie-Hellman (DH) Key Exchange (KEX) Groups for Secure Shell (SSH). Search on Bibsonomy RFC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Simon Tatham, Darren Tucker IUTF8 Terminal Mode in Secure Shell (SSH). Search on Bibsonomy RFC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Mahyar Najibi, Pouya Samangouei, Rama Chellappa, Larry S. Davis SSH: Single Stage Headless Face Detector. Search on Bibsonomy ICCV The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran Evaluating shallow and deep networks for secure shell (ssh)traffic analysis. Search on Bibsonomy ICACCI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks. Search on Bibsonomy ICACCI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Paul Fiterau-Brostean, Toon Lenaerts, Erik Poll, Joeri de Ruiter, Frits W. Vaandrager, Patrick Verleg Model learning and model checking of SSH implementations. Search on Bibsonomy SPIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Clémentine Maurice, Manuel Weber, Michael Schwarz 0001, Lukas Giner, Daniel Gruss, Carlo Alberto Boano, Stefan Mangard, Kay Römer Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
20Derek Simmel, Shane Filus Flexible Enforcement of Multi-factor Authentication with SSH via Linux-PAM for Federated Identity Users. Search on Bibsonomy PEARC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Joona Kannisto, Jarmo Harju The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Scott Callaghan, Gideon Juve, Karan Vahi, Philip J. Maechling, Thomas H. Jordan, Ewa Deelman rvGAHP: push-based job submission using reverse SSH connections. Search on Bibsonomy WORKS@SC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Redouane Lguensat, Miao Sun, Ge Chen 0002, Fenglin Tian, Ronan Fablet Spatio-temporal interpolation of altimeter-derived SSH fields using analog data assimilation: A case-study in the south china sea. Search on Bibsonomy IGARSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Ronan Fablet, Manuel Lopez-Radcenco, Jacques Verron, Baptiste Mourre, Bertrand Chapron, Ananda Pascual Learning multi-tracer convolutional models for the reconstruction of high-resolution SSH fields. Search on Bibsonomy IGARSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser Virtual Machine Introspection Based SSH Honeypot. Search on Bibsonomy SHCIS@DAIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Chengchao Yao, Xiao Luo 0002, Nur Zincir-Heywood Data analytics for modeling and visualizing attack behaviors: A case study on SSH brute force attacks. Search on Bibsonomy SSCI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Clément Le Goff, Ronan Fablet, Pierre Tandeo, Emmanuelle Autret, Bertrand Chapron Spatio-Temporal Decomposition of Satellite-Derived SST-SSH Fields: Links Between Surface Data and Ocean Interior Dynamics in the Agulhas Region. Search on Bibsonomy IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Nicolás Robinson-García, Thed N. van Leeuwen, Ismael Ràfols SSH & the City. A Network Approach for Tracing the Societal Contribution of the Social Sciences and Humanities for Local Development. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
20Chen Luo 0001, Anshumali Shrivastava SSH (Sketch, Shingle, & Hash) for Indexing Massive-Scale Time Series. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
20Silvia González, Álvaro Herrero 0001, Javier Sedano, Urko Zurutuza, Emilio Corchado Different approaches for the detection of SSH anomalous connections. Search on Bibsonomy Log. J. IGPL The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Martin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson A Surfeit of SSH Cipher Suites. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Gry Ane Vikanes Lavik, Gunnar Sivertsen Erih Plus - Making the Ssh Visible, Searchable and Available. Search on Bibsonomy CRIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Gokul Kannan Sadasivam, Chittaranjan Hota, Bhojan Anand Classification of SSH Attacks Using Machine Learning Algorithms. Search on Bibsonomy ICITCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Karthikeyan Bhargavan, Gaëtan Leurent Transcript Collision Attacks: Breaking Authentication in TLS, IKE and SSH. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
20Yang Tian, Takahiro Matsuno, Shugen Ma Development of remote robot control system for snake-like robot based on SSH protocol and iOS system. Search on Bibsonomy ROBIO The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Chen Luo 0001, Anshumali Shrivastava SSH (Sketch, Shingle, & Hash) for Indexing Massive-Scale Time Series. Search on Bibsonomy NIPS Time Series Workshop The full citation details ... 2016 DBLP  BibTeX  RDF
20Shou-Hsuan Stephen Huang, Hongyang Zhang, Michael Phay Detecting Stepping-Stone Intruders by Identifying Crossover Packets in SSH Connections. Search on Bibsonomy AINA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga A New Approach to Identify User Authentication Methods toward SSH Dictionary Attack Detection. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Dorai Ashok Shanmugavel Anbalagan Secure Shell (SSH): Public Key Authentication over Hypertext Transfer Protocol (HTTP). Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
20Xie Ma, Hui Yang, Neng Li, Xiongfei Zhi, Weihong Zhong The application of SSH technology in operation and management control platform development of mobile communication accounting system. Search on Bibsonomy J. Comput. Methods Sci. Eng. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Mattijs Jonker, Rick Hofstede, Anna Sperotto, Aiko Pras Unveiling flat traffic on the Internet: An SSH attack case study. Search on Bibsonomy IM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20M. Solomon Zemene, P. S. Avadhani Implementing high interaction honeypot to study SSH attacks. Search on Bibsonomy ICACCI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Jamil Ahmad, Muhammad Sajjad, Irfan Mehmood, Sung Wook Baik SSH: Salient Structures Histogram for Content Based Image Retrieval. Search on Bibsonomy NBiS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Maryam M. Najafabadi, Taghi M. Khoshgoftaar, Chad Calvert, Clifford Kemp Detection of SSH Brute Force Attacks Using Aggregated Netflow Data. Search on Bibsonomy ICMLA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Idan Morad, Asaf Shabtai Detecting Computers in Cyber Space Maliciously Exploited as SSH Proxies. Search on Bibsonomy SECITC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20AbdelRahman Abdou, David Barrera 0003, Paul C. van Oorschot What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks. Search on Bibsonomy PASSWORDS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Pierre Tandeo, Bertrand Chapron, Sileye O. Ba, Emmanuelle Autret, Ronan Fablet Segmentation of Mesoscale Ocean Surface Dynamics Using Satellite SST and SSH Observations. Search on Bibsonomy IEEE Trans. Geosci. Remote. Sens. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Rick Hofstede, Luuk Hendriks, Anna Sperotto, Aiko Pras SSH Compromise Detection using NetFlow/IPFIX. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Abe Singer Hostbased SSH: A Better Alternative. Search on Bibsonomy login Usenix Mag. The full citation details ... 2014 DBLP  BibTeX  RDF
20Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. Search on Bibsonomy CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Adrian Pauna, Victor Valeriu Patriciu CASSHH - Case Adaptive SSH Honeypot. Search on Bibsonomy SNDS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Oliver Gasser, Ralph Holz, Georg Carle A deeper understanding of SSH: Results from Internet-wide scans. Search on Bibsonomy NOMS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Sándor Soós, Zsófia Vida Topic overlay maps and the cognitive structure of policy-related SSH. Search on Bibsonomy CogInfoCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Xiaojun Liu, Fangying Du, Junyi Li SSH: Image Index Based on Sparse Spectral Hashing. Search on Bibsonomy CSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Stanislav Ponomarev, Nathan Wallace, Travis Atkison Detection of SSH host spoofing in control systems through network telemetry analysis. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Pierre Tandeo, Ronan Fablet, Pierre Ailliot Hidden surface dynamical modes and SSH retrievals from a joint analysis of altimetry and microwave SST. Search on Bibsonomy IGARSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Adrian Pauna, Ion Bica RASSH - Reinforced adaptive SSH honeypot. Search on Bibsonomy COMM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20David Cadé, Bruno Blanchet From Computationally-Proved Protocol Specifications to Implementations and Application to SSH. Search on Bibsonomy J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Benjamin Dowling, Florian Giesen, Florian Kohlar, Jörg Schwenk, Douglas Stebila Multi-ciphersuite security and the SSH protocol. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
20ZiJie Hu Some Fixes To SSH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
20Mobin Javed, Vern Paxson Detecting stealthy, distributed SSH brute-forcing. Search on Bibsonomy CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 332 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license