Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Hristo N. Djidjev, Lyudmil Aleksandrov |
Generation of SSH Network Traffic Data for IDS Testbeds. |
CSET |
2013 |
DBLP BibTeX RDF |
|
20 | Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga |
Identifying User Authentication Methods on Connections for SSH Dictionary Attack Detection. |
COMPSAC Workshops |
2013 |
DBLP DOI BibTeX RDF |
|
20 | Ioannis Koniaris, Georgios I. Papadimitriou, Petros Nicopolitidis |
Analysis and visualization of SSH attacks using honeypots. |
EUROCON |
2013 |
DBLP DOI BibTeX RDF |
|
20 | Silvia González, Javier Sedano, Urko Zurutuza, Enaitz Ezpeleta, Diego Martínez, Álvaro Herrero 0001, Emilio Corchado |
Classification of SSH Anomalous Connections. |
SOCO-CISIS-ICEUTE |
2013 |
DBLP DOI BibTeX RDF |
|
20 | Przemyslaw Plesowicz, Piotr Laszczyk |
Evaluation of secure signal transmission in automatic control using SSH tunneling. |
MMAR |
2013 |
DBLP DOI BibTeX RDF |
|
20 | Anna Sperotto, Michel Mandjes, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras |
Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study. |
IEEE Trans. Netw. Serv. Manag. |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Denis Bider, Mark D. Baushke |
SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol. |
RFC |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Robin Seggelmann, Michael Tüxen, Erwin P. Rathgeb |
SSH over SCTP - Optimizing a multi-channel protocol by adapting it to SCTP. |
CSNDSP |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Craig Valli |
SSH - Somewhat Secure Host. |
CSS |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga |
SSH Dictionary Attack Detection Based on Flow Analysis. |
SAINT |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Laurens Hellemons, Luuk Hendriks, Rick Hofstede, Anna Sperotto, Ramin Sadre, Aiko Pras |
SSHCure: A Flow-Based SSH Intrusion Detection System. |
AIMS |
2012 |
DBLP DOI BibTeX RDF |
|
20 | André Egners, Dominic Gatzen, Andriy Panchenko 0001, Ulrike Meyer |
Introducing SOR: SSH-based Onion Routing. |
AINA Workshops |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Marijke De Soete |
SSH. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Peter Gutmann |
Do Users Verify SSH Keys? |
login Usenix Mag. |
2011 |
DBLP BibTeX RDF |
|
20 | Margaret Wasserman |
Using the NETCONF Protocol over Secure Shell (SSH). |
RFC |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Kevin M. Igoe |
Suite B Cryptographic Suites for Secure Shell (SSH). |
RFC |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Stephen C. Williams |
Analysis of the SSH Key Exchange Protocol. |
IACR Cryptol. ePrint Arch. |
2011 |
DBLP BibTeX RDF |
|
20 | Felipe Rodrigues Martinêz Basile, Flávio Cezar Amate |
Secure Transmission of Medical Images by SSH Tunneling. |
HCI (22) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Matti Hirvonen, Mirko Sailio |
Two-phased method for identifying SSH encrypted application flows. |
IWCMC |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Stephen C. Williams |
Analysis of the SSH Key Exchange Protocol. |
IMACC |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Jin Peng, Xin Zhao |
SSH-Based Device Identity and Trust Initialization. |
Inf. Secur. J. A Glob. Perspect. |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Wenjun Zhang 0001 |
Integrated Web Architecture Based on Web3D, Flex and SSH. |
J. Softw. Eng. Appl. |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Kenneth G. Paterson, Gaven J. Watson |
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
20 | Paul Z. Kolano |
Dynamic load balancing of SSH sessions using user-specific selection policies. |
ISCC |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Kenneth G. Paterson, Gaven J. Watson |
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. |
EUROCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Wenjun Zhang 0001 |
E-Commerce Architecture Based on Web3D, Web2.0 & SSH. |
ICEE |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Riyad Alshammari, Nur Zincir-Heywood |
Generalization of signatures for SSH encrypted traffic identification. |
CICS |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Maurizio Dusi, Alice Este, Francesco Gringoli, Luca Salgarelli |
Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic. |
ICC |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Nan Dun, Kenjiro Taura, Akinori Yonezawa |
GMount: An Ad Hoc and Locality-Aware Distributed File System by Using SSH and FUSE. |
CCGRID |
2009 |
DBLP DOI BibTeX RDF |
|
20 | P. Iyappan, K. S. Arvind, N. Geetha, S. Vanitha |
Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol. |
ICETET |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Joyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth |
An SSH-based Toolkit for User-based Network Services. |
LISA |
2009 |
DBLP BibTeX RDF |
|
20 | Riyad Alshammari, Nur Zincir-Heywood |
Machine learning based encrypted traffic classification: Identifying SSH and Skype. |
CISDA |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Ana Liz Souto Oliveira, Flávia Coimbra Delicato, Marcos Pirmez |
JanioS: um serviço de SSH para o Prometheus. |
WebMedia (Companion) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Dan Wendlandt, David G. Andersen, Adrian Perrig |
Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. |
USENIX Annual Technical Conference |
2008 |
DBLP BibTeX RDF |
|
20 | An Qin 0001, Haiyan Yu, Chengchun Shu, Bing Xu |
XOS-SSH: A Lightweight User-Centric Tool to Support Remote Execution in Virtual Organizations. |
LASCO |
2008 |
DBLP BibTeX RDF |
|
20 | Timo Dotzauer, Tobias Lütticke, Alexander von Gernler |
Das SSH-Buch - Leitfaden für den sicheren Einsatz von OpenSSH. |
|
2007 |
RDF |
|
20 | Riyad Alshammari, Nur Zincir-Heywood |
A flow based approach for SSH traffic detection. |
SMC |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Sheng-Che Tseng, Chinchun Meng, Wei-Yu Chen |
True 50% Duty-Cycle SSH and SHH SiGe BiCMOS Divide-by-3 Prescalers. |
IEICE Trans. Electron. |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Jeffrey Hutzelman, Joseph Salowey, Joseph Galbraith, Von Welch |
Generic Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol. |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
The Secure Shell (SSH) Transport Layer Encryption Modes. |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Joseph Galbraith, Phillip Remaker |
The Secure Shell (SSH) Session Channel Break Extension. |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Sami Lehtinen, Chris Lonvick |
The Secure Shell (SSH) Protocol Assigned Numbers. |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Frank Cusack, Martin Forssen |
Generic Message Exchange Authentication for the Secure Shell Protocol (SSH). |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Tatu Ylönen, Chris Lonvick |
The Secure Shell (SSH) Connection Protocol. |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Ben Harris |
Improved Arcfour Modes for the Secure Shell (SSH) Transport Layer Protocol. |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Tatu Ylönen, Chris Lonvick |
The Secure Shell (SSH) Authentication Protocol. |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Tatu Ylönen, Chris Lonvick |
The Secure Shell (SSH) Transport Layer Protocol. |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Jakob Schlyter, Wesley Griffin |
Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints. |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Tatu Ylönen, Chris Lonvick |
The Secure Shell (SSH) Protocol Architecture. |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Margaret Wasserman, Ted Goddard |
Using the NETCONF Configuration Protocol over Secure SHell (SSH). |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Ben Harris |
RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol. |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Markus Friedl, Niels Provos, William Allen Simpson |
Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol. |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Joseph Galbraith, Rodney Thayer |
The Secure Shell (SSH) Public Key File Format. |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia D. McLain |
Inoculating SSH Against Address Harvesting. |
NDSS |
2006 |
DBLP BibTeX RDF |
|
20 | Teemu Koponen, Pasi Eronen, Mikko Särelä |
Resilient Connections for SSH and TLS. |
USENIX Annual Technical Conference, General Track |
2006 |
DBLP BibTeX RDF |
|
20 | Mark Striebeck |
Ssh! We Are Adding a Process... |
AGILE |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Peter Landrock |
SSH. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Iván González, Francisco J. Gomez-Arribas, Sergio López-Buedo |
Hardware-Accelerated SSH on Self-Reconfigurable Systems. |
FPT |
2005 |
DBLP BibTeX RDF |
|
20 | William Yurcik, Chao Liu 0001 |
A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. |
CCGRID |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Nicholas Rosasco, David Larochelle |
How and Why More Secure Technologies Succeed in Legacy Markets - Lessons from the Success of SSH. |
Economics of Information Security |
2004 |
DBLP DOI BibTeX RDF |
|
20 | S. Omar, T. Kimura |
SSH Client for Mobile Phones Using I-Mode. |
International Conference on Wireless Networks |
2004 |
DBLP BibTeX RDF |
|
20 | Robert A. Napier |
Secure Automation: Achieving Least Privilege with SSH, Sudo, and Suid. |
LISA |
2004 |
DBLP BibTeX RDF |
|
20 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
20 | Daniel J. Barrett, Richard E. Silverman |
SSH the secure shell - the definitive guide: network security. |
|
2001 |
RDF |
|
20 | Dawn Xiaodong Song, David A. Wagner 0001, Xuqing Tian |
Timing Analysis of Keystrokes and Timing Attacks on SSH. |
USENIX Security Symposium |
2001 |
DBLP BibTeX RDF |
|
20 | Siegfried Höfinger |
Load Balancing for the Electronic Structure Program GREMLIN in a Very Heterogenous SSH-Connected WAN-Cluster of UNIX-Type Hosts. |
International Conference on Computational Science (2) |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Niels Provos, Peter Honeyman |
ScanSSH: Scanning the Internet for SSH Servers. |
LISA |
2001 |
DBLP BibTeX RDF |
|
20 | Giles Orr, Jacob Wyatt |
SSH Port Forwarding. |
Annual Linux Showcase & Conference |
2000 |
DBLP BibTeX RDF |
|
20 | Christopher Thorpe |
SSU: Extending SSH for Secure Root Administration. |
LISA |
1998 |
DBLP BibTeX RDF |
|
20 | Jean Rohmer |
SSH : un outil et des techniques simples à implémenter pour construire et simuler des modèles hiérarchisés de systèmes. |
|
1976 |
RDF |
|
14 | Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang |
Ciphertext verification security of symmetric encryption schemes. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption |
14 | Anil Madhavapeddy |
Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language. |
ICFEM |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Wei Ding 0003, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle |
Detecting Stepping-Stone Intruders with Long Connection Chains. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Jason Ansel, Kapil Arya, Gene Cooperman |
DMTCP: Transparent checkpointing for cluster computations and the desktop. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta |
A Unified Approach to Intra-domain Security. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Benoit Claudel, Guillaume Huard, Olivier Richard |
TakTuk, adaptive deployment of remote executions. |
HPDC |
2009 |
DBLP DOI BibTeX RDF |
remote executions deployment, adaptivity, work-stealing |
14 | Marek Kumpost, Vashek Matyas |
User Profiling and Re-identification: Case of University-Wide Network Analysis. |
TrustBus |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Andre Charbonneau, Victor Terskikh |
SpectroGrid: Providing Simple Secure Remote Access to Scientific Instruments. |
HPCS |
2008 |
DBLP DOI BibTeX RDF |
Remote instrumentation, Security, Grid computing |
14 | Yun-Yu Lee, Ing-Yi Chen, Sy-Yen Kuo, Hsi-Hai Liu, Yuh-Rong Leu |
Implementation of OpenWrt-based IP PnP gateway. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
IP plug and play, wireless network, access control, gateway, hotspot |
14 | Pemjit Aphimaeteethomrong, Veera Muangsin |
A Visualization Portal for a Tsunami Warning System on a Distributed Environment. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Tsunami Visualization, Visualization Portal, Warning System, Distributed Environment |
14 | Ken Hironaka, Hideo Saito, Kei Takahashi, Kenjiro Taura |
gluepy: A Simple Distributed Python Programming Framework for Complex Grid Environments. |
LCPC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Mudhakar Srivatsa, Ling Liu 0001, Arun Iyengar |
Preserving Caller Anonymity in Voice-over-IP Networks. |
SP |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Nan Dun, Kenjiro Taura, Akinori Yonezawa |
GMount: Build your grid file system on the fly. |
GRID |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Riyad Alshammari, Nur Zincir-Heywood |
Investigating Two Different Approaches for Encrypted Traffic Classification. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Andreas Petlund, Kristian Evensen, Carsten Griwodz, Pål Halvorsen |
TCP mechanisms for improving the user experience for time-dependent thin-stream applications. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato J. O. Figueiredo |
WOW: Self-organizing Wide Area Overlay Networks of Virtual Workstations. |
J. Grid Comput. |
2007 |
DBLP DOI BibTeX RDF |
Clusters, Grid computing, Networks, P2P, Virtual |
14 | Assaf Rinot |
Antichains in partially ordered sets of singular cofinality. |
Arch. Math. Log. |
2007 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 03E04, 06A07, 03E35 |
14 | Peter Dimopoulos, Panlop Zeephongsekul, Zahir Tari |
A dynamic priority approach to reducing delay in interactive TCP connections. |
Telecommun. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Internet traffic queue management, Dynamic priority discipline, TCP |
14 | Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo |
Analysis of Computer Intrusions Using Sequences of Function Calls. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
unauthorized access (for example, hacking), Security, design, intrusion detection, management, anomaly detection, auditing, logging, forensic analysis |
14 | Shinichi Mukosaka, Hideki Koike |
Integrated visualization system for monitoring security in large-scale local area network. |
APVIS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Shervin Erfani |
Tutorial 4: Wireless and Wireline Security Management. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Alfredo Pironti 0001, Riccardo Sisto |
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Gabriel Parmer, Richard West |
Mutable Protection Domains: Towards a Component-Based System for Dependable and Predictable Computing. |
RTSS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | David R. Piegdon, Lexi Pimenidis |
Targeting Physically Addressable Memory. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Raphael C.-W. Phan, Serge Vaudenay |
Security-Preserving Asymmetric Protocol Encapsulation. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Pawel Czarnul |
BC-MPI: Running an MPI Application on Multiple Clusters with BeesyCluster Connectivity. |
PPAM |
2007 |
DBLP DOI BibTeX RDF |
WAN-aware MPI, threads and MPI, grid middleware |
14 | Martin Hlavác, Tomás Rosa |
Extended Hidden Number Problem and Its Cryptanalytic Applications. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
DSA implementation, hyper-threading, lattice, sliding window, side channel analysis, cache analysis |
14 | Eli Biham, Orr Dunkelman, Nathan Keller |
New Cryptanalytic Results on IDEA. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Leif Nixon |
The Stakkato Intrusions: What Happened and What Have We Learned?. |
CCGRID |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato J. O. Figueiredo |
WOW: Self-Organizing Wide Area Overlay Networks of Virtual Workstations. |
HPDC |
2006 |
DBLP DOI BibTeX RDF |
self-organizing wide area overlay network, virtual workstation, WOW distributed system, peer-to-peer technique, user-level decentralized technique, IP packet, PVM-based fastDNAml application, virtual IP layer, virtual machine, local-area network, firewalls, WAN, cluster of workstations, high-throughput computing, client-server application |