Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Hristo N. Djidjev, Lyudmil Aleksandrov |
Generation of SSH Network Traffic Data for IDS Testbeds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSET ![In: 6th Workshop on Cyber Security Experimentation and Test, CSET '13, Washington, D.C., USA, August 12, 2013, 2013, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
20 | Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga |
Identifying User Authentication Methods on Connections for SSH Dictionary Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC Workshops ![In: IEEE 37th Annual Computer Software and Applications Conference, COMPSAC Workshops 2013, Kyoto, Japan, July 22-26, 2013, pp. 593-598, 2013, IEEE Computer Society, 978-1-4799-2159-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
20 | Ioannis Koniaris, Georgios I. Papadimitriou, Petros Nicopolitidis |
Analysis and visualization of SSH attacks using honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCON ![In: Proceedings of Eurocon 2013, International Conference on Computer as a Tool, Zagreb, Croatia, July 1-4, 2013, pp. 65-72, 2013, IEEE, 978-1-4673-2230-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
20 | Silvia González, Javier Sedano, Urko Zurutuza, Enaitz Ezpeleta, Diego Martínez, Álvaro Herrero 0001, Emilio Corchado |
Classification of SSH Anomalous Connections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOCO-CISIS-ICEUTE ![In: International Joint Conference SOCO'13-CISIS'13-ICEUTE'13 - Salamanca, Spain, September 11th-13th, 2013 Proceedings, pp. 479-488, 2013, Springer, 978-3-319-01853-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
20 | Przemyslaw Plesowicz, Piotr Laszczyk |
Evaluation of secure signal transmission in automatic control using SSH tunneling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMAR ![In: 18th International Conference on Methods & Models in Automation & Robotics, MMAR 2013, Międzyzdroje, Poland, August 26-29, 2013, pp. 672-677, 2013, IEEE, 978-1-4673-5506-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
20 | Anna Sperotto, Michel Mandjes, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras |
Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 9(2), pp. 128-141, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Denis Bider, Mark D. Baushke |
SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6668, pp. 1-5, July 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Robin Seggelmann, Michael Tüxen, Erwin P. Rathgeb |
SSH over SCTP - Optimizing a multi-channel protocol by adapting it to SCTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSNDSP ![In: 8th International Symposium on Communication Systems, Networks & Digital Signal Processing, CSNDSP 2012, Poznan, Poland, July 18-20, 2012, pp. 1-6, 2012, IEEE, 978-1-4577-1472-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Craig Valli |
SSH - Somewhat Secure Host. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSS ![In: Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings, pp. 227-235, 2012, Springer, 978-3-642-35361-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga |
SSH Dictionary Attack Detection Based on Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 12th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2012, Izmir, Turkey, July 16-20, 2012, pp. 51-59, 2012, IEEE Computer Society, 978-1-4673-2001-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Laurens Hellemons, Luuk Hendriks, Rick Hofstede, Anna Sperotto, Ramin Sadre, Aiko Pras |
SSHCure: A Flow-Based SSH Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMS ![In: Dependable Networks and Services - 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, Luxembourg, Luxembourg, June 4-8, 2012. Proceedings, pp. 86-97, 2012, Springer, 978-3-642-30632-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | André Egners, Dominic Gatzen, Andriy Panchenko 0001, Ulrike Meyer |
Introducing SOR: SSH-based Onion Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 26th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, Fukuoka, Japan, March 26-29, 2012, pp. 280-286, 2012, IEEE Computer Society, 978-1-4673-0867-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Marijke De Soete |
SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1252-1253, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Peter Gutmann |
Do Users Verify SSH Keys? ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 36(4), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
20 | Margaret Wasserman |
Using the NETCONF Protocol over Secure Shell (SSH). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6242, pp. 1-11, June 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Kevin M. Igoe |
Suite B Cryptographic Suites for Secure Shell (SSH). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6239, pp. 1-14, May 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Stephen C. Williams |
Analysis of the SSH Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 276, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
20 | Felipe Rodrigues Martinêz Basile, Flávio Cezar Amate |
Secure Transmission of Medical Images by SSH Tunneling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (22) ![In: HCI International 2011 - Posters' Extended Abstracts - International Conference, HCI International 2011, Orlando, FL, USA, July 9-14, 2011, Proceedings, Part I, pp. 486-490, 2011, Springer, 978-3-642-22097-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Matti Hirvonen, Mirko Sailio |
Two-phased method for identifying SSH encrypted application flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, Istanbul, Turkey, 4-8 July, 2011, pp. 1033-1038, 2011, IEEE, 978-1-4244-9539-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Stephen C. Williams |
Analysis of the SSH Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings, pp. 356-374, 2011, Springer, 978-3-642-25515-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Jin Peng, Xin Zhao |
SSH-Based Device Identity and Trust Initialization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 19(5), pp. 237-242, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Wenjun Zhang 0001 |
Integrated Web Architecture Based on Web3D, Flex and SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Softw. Eng. Appl. ![In: J. Softw. Eng. Appl. 3(1), pp. 73-80, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Kenneth G. Paterson, Gaven J. Watson |
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 95, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
20 | Paul Z. Kolano |
Dynamic load balancing of SSH sessions using user-specific selection policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 15th IEEE Symposium on Computers and Communications, ISCC 2010, Riccione, Italy, June 22-25, 2010, pp. 272-278, 2010, IEEE Computer Society, 978-1-4244-7755-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Kenneth G. Paterson, Gaven J. Watson |
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings, pp. 345-361, 2010, Springer, 978-3-642-13189-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Wenjun Zhang 0001 |
E-Commerce Architecture Based on Web3D, Web2.0 & SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEE ![In: The International Conference on E-Business and E-Government, ICEE 2010, 7-9 May 2010, Guangzhou, China, Proceedings, pp. 2300-2303, 2010, IEEE Computer Society, 978-0-7695-3997-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Riyad Alshammari, Nur Zincir-Heywood |
Generalization of signatures for SSH encrypted traffic identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICS ![In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, Nashville, TN, USA, March 31 - April 2, 2009, pp. 167-174, 2009, IEEE, 978-1-4244-2769-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Maurizio Dusi, Alice Este, Francesco Gringoli, Luca Salgarelli |
Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009, pp. 1-6, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Nan Dun, Kenjiro Taura, Akinori Yonezawa |
GMount: An Ad Hoc and Locality-Aware Distributed File System by Using SSH and FUSE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009, pp. 188-195, 2009, IEEE Computer Society, 978-0-7695-3622-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | P. Iyappan, K. S. Arvind, N. Geetha, S. Vanitha |
Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETET ![In: Proceedings of the Second International Conference on Emerging Trends in Engineering & Technology, ICETET 2009, Nagpur, Maharashtra, India, 16-18 December 2009, pp. 808-813, 2009, IEEE Computer Society, 978-0-7695-3884-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Joyita Sikder, Manigandan Radhakrishnan, Jon A. Solworth |
An SSH-based Toolkit for User-based Network Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 23rd Large Installation System Administration Conference, November 1-6, 2009, Baltimore, MD, USA, pp. 119-127, 2009, USENIX Association, 978-1-931971-71-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
20 | Riyad Alshammari, Nur Zincir-Heywood |
Machine learning based encrypted traffic classification: Identifying SSH and Skype. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISDA ![In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, Ottawa, Canada, July 8-10, 2009, pp. 1-8, 2009, IEEE, 978-1-4244-3764-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Ana Liz Souto Oliveira, Flávia Coimbra Delicato, Marcos Pirmez |
JanioS: um serviço de SSH para o Prometheus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WebMedia (Companion) ![In: Companion Proceedings of the XIV Brazilian Symposium on Multimedia and the Web, WebMedia '08, Vila Velha, Espírito Santo, Brazil, October 26-29, 2008, pp. 173-175, 2008, ACM, 978-85-7669-199-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Dan Wendlandt, David G. Andersen, Adrian Perrig |
Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Annual Technical Conference ![In: 2008 USENIX Annual Technical Conference, Boston, MA, USA, June 22-27, 2008. Proceedings, pp. 321-334, 2008, USENIX Association, 978-1-931971-59-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
20 | An Qin 0001, Haiyan Yu, Chengchun Shu, Bing Xu |
XOS-SSH: A Lightweight User-Centric Tool to Support Remote Execution in Virtual Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LASCO ![In: First USENIX Workshop on Large-Scale Computing, LASCO 2008, June 23, 2008, Boston, MA, USA, Proceedings, 2008, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
20 | Timo Dotzauer, Tobias Lütticke, Alexander von Gernler |
Das SSH-Buch - Leitfaden für den sicheren Einsatz von OpenSSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2007 |
RDF |
|
20 | Riyad Alshammari, Nur Zincir-Heywood |
A flow based approach for SSH traffic detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, Canada, 7-10 October 2007, pp. 296-301, 2007, IEEE, 978-1-4244-0990-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Sheng-Che Tseng, Chinchun Meng, Wei-Yu Chen |
True 50% Duty-Cycle SSH and SHH SiGe BiCMOS Divide-by-3 Prescalers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Electron. ![In: IEICE Trans. Electron. 89-C(6), pp. 725-731, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Jeffrey Hutzelman, Joseph Salowey, Joseph Galbraith, Von Welch |
Generic Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4462, pp. 1-29, May 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
The Secure Shell (SSH) Transport Layer Encryption Modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4344, pp. 1-12, January 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Joseph Galbraith, Phillip Remaker |
The Secure Shell (SSH) Session Channel Break Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4335, pp. 1-6, January 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Sami Lehtinen, Chris Lonvick |
The Secure Shell (SSH) Protocol Assigned Numbers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4250, pp. 1-20, January 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Frank Cusack, Martin Forssen |
Generic Message Exchange Authentication for the Secure Shell Protocol (SSH). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4256, pp. 1-12, January 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Tatu Ylönen, Chris Lonvick |
The Secure Shell (SSH) Connection Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4254, pp. 1-24, January 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Ben Harris |
Improved Arcfour Modes for the Secure Shell (SSH) Transport Layer Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4345, pp. 1-5, January 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Tatu Ylönen, Chris Lonvick |
The Secure Shell (SSH) Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4252, pp. 1-17, January 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Tatu Ylönen, Chris Lonvick |
The Secure Shell (SSH) Transport Layer Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4253, pp. 1-32, January 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Jakob Schlyter, Wesley Griffin |
Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4255, pp. 1-9, January 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Tatu Ylönen, Chris Lonvick |
The Secure Shell (SSH) Protocol Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4251, pp. 1-30, January 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Margaret Wasserman, Ted Goddard |
Using the NETCONF Configuration Protocol over Secure SHell (SSH). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4742, pp. 1-10, December 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Ben Harris |
RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4432, pp. 1-8, March 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Markus Friedl, Niels Provos, William Allen Simpson |
Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4419, pp. 1-10, March 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Joseph Galbraith, Rodney Thayer |
The Secure Shell (SSH) Public Key File Format. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 4716, pp. 1-10, November 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia D. McLain |
Inoculating SSH Against Address Harvesting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA, 2006, The Internet Society, 1-891562-22-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
20 | Teemu Koponen, Pasi Eronen, Mikko Särelä |
Resilient Connections for SSH and TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Annual Technical Conference, General Track ![In: Proceedings of the 2006 USENIX Annual Technical Conference, Boston, MA, USA, May 30 - June 3, 2006, pp. 329-340, 2006, USENIX. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
20 | Mark Striebeck |
Ssh! We Are Adding a Process... ![Search on Bibsonomy](Pics/bibsonomy.png) |
AGILE ![In: AGILE 2006 Conference (AGILE 2006), 23-28 July 2006, Minneapolis, Minnesota, USA, pp. 185-193, 2006, IEEE Computer Society, 0-7695-2562-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Peter Landrock |
SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Iván González, Francisco J. Gomez-Arribas, Sergio López-Buedo |
Hardware-Accelerated SSH on Self-Reconfigurable Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPT ![In: Proceedings of the 2005 IEEE International Conference on Field-Programmable Technology, FPT 2005, 11-14 December 2005, Singapore, pp. 289-290, 2005, IEEE, 0-7803-9407-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
20 | William Yurcik, Chao Liu 0001 |
A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 9-12 May, 2005, Cardiff, UK, pp. 111-120, 2005, IEEE Computer Society, 0-7803-9074-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Nicholas Rosasco, David Larochelle |
How and Why More Secure Technologies Succeed in Legacy Markets - Lessons from the Success of SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Economics of Information Security ![In: Economics of Information Security, pp. 247-254, 2004, Springer, 1-4020-8089-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | S. Omar, T. Kimura |
SSH Client for Mobile Phones Using I-Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Wireless Networks ![In: Proceedings of the International Conference on Wireless Networks, ICWN '04, Volume 2 & Proceedings of the International Conference on Pervasive Computing and Communications, PCC'04, June 21-24, 2004, Las Vegas, Nevada, USA, pp. 677-, 2004, CSREA Press, 1-932415-39-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
20 | Robert A. Napier |
Secure Automation: Achieving Least Privilege with SSH, Sudo, and Suid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 18th Conference on Systems Administration (LISA 2004), Atlanta, USA, November 14-19, 2004, pp. 203-212, 2004, USENIX. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
20 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2002, pp. 78, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
20 | Daniel J. Barrett, Richard E. Silverman |
SSH the secure shell - the definitive guide: network security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2001 |
RDF |
|
20 | Dawn Xiaodong Song, David A. Wagner 0001, Xuqing Tian |
Timing Analysis of Keystrokes and Timing Attacks on SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 10th USENIX Security Symposium, August 13-17, 2001, Washington, D.C., USA, 2001, USENIX. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
20 | Siegfried Höfinger |
Load Balancing for the Electronic Structure Program GREMLIN in a Very Heterogenous SSH-Connected WAN-Cluster of UNIX-Type Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2001, International Conference, San Francisco, CA, USA, May 28-30, 2001. Proceedings, Part II, pp. 801-810, 2001, Springer, 3-540-42233-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Niels Provos, Peter Honeyman |
ScanSSH: Scanning the Internet for SSH Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 15th Conference on Systems Administration (LISA 2001), San Diego, California, USA, December 2-7, 2001, pp. 25-30, 2001, USENIX, 1-880446-05-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
20 | Giles Orr, Jacob Wyatt |
SSH Port Forwarding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Annual Linux Showcase & Conference ![In: 4th Annual Linux Showcase & Conference 2000, Atlanta, Georgia, USA, October 10-14, 2000, 2000, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
20 | Christopher Thorpe |
SSU: Extending SSH for Secure Root Administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 12th Conference on Systems Administration (LISA-98), Boston, MA, USA, December 6-11, 1998, pp. 27-36, 1998, USENIX, 1-880446-40-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
20 | Jean Rohmer |
SSH : un outil et des techniques simples à implémenter pour construire et simuler des modèles hiérarchisés de systèmes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
1976 |
RDF |
|
14 | Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang |
Ciphertext verification security of symmetric encryption schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(9), pp. 1617-1631, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption |
14 | Anil Madhavapeddy |
Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFEM ![In: Formal Methods and Software Engineering, 11th International Conference on Formal Engineering Methods, ICFEM 2009, Rio de Janeiro, Brazil, December 9-12, 2009. Proceedings, pp. 446-465, 2009, Springer, 978-3-642-10372-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Wei Ding 0003, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle |
Detecting Stepping-Stone Intruders with Long Connection Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 665-669, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Jason Ansel, Kapil Arya, Gene Cooperman |
DMTCP: Transparent checkpointing for cluster computations and the desktop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-12, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta |
A Unified Approach to Intra-domain Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 219-224, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Benoit Claudel, Guillaume Huard, Olivier Richard |
TakTuk, adaptive deployment of remote executions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 18th ACM International Symposium on High Performance Distributed Computing, HPDC 2009, Garching, Germany, June 11-13, 2009, pp. 91-100, 2009, ACM, 978-1-60558-587-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
remote executions deployment, adaptivity, work-stealing |
14 | Marek Kumpost, Vashek Matyas |
User Profiling and Re-identification: Case of University-Wide Network Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings, pp. 1-10, 2009, Springer, 978-3-642-03747-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Andre Charbonneau, Victor Terskikh |
SpectroGrid: Providing Simple Secure Remote Access to Scientific Instruments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCS ![In: 22nd Annual International Symposium on High Performance Computing Systems and Applications (HPCS 2008), June 9-11, 2008, Québec City, Canada, pp. 76-82, 2008, IEEE Computer Society, 978-0-7695-3250-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Remote instrumentation, Security, Grid computing |
14 | Yun-Yu Lee, Ing-Yi Chen, Sy-Yen Kuo, Hsi-Hai Liu, Yuh-Rong Leu |
Implementation of OpenWrt-based IP PnP gateway. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 5th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2008, Yilan, Taiwan, September 10-12, 2008, pp. 105, 2008, ACM, 978-1-60558-089-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IP plug and play, wireless network, access control, gateway, hotspot |
14 | Pemjit Aphimaeteethomrong, Veera Muangsin |
A Visualization Portal for a Tsunami Warning System on a Distributed Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 694-699, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Tsunami Visualization, Visualization Portal, Warning System, Distributed Environment |
14 | Ken Hironaka, Hideo Saito, Kei Takahashi, Kenjiro Taura |
gluepy: A Simple Distributed Python Programming Framework for Complex Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCPC ![In: Languages and Compilers for Parallel Computing, 21th International Workshop, LCPC 2008, Edmonton, Canada, July 31 - August 2, 2008, Revised Selected Papers, pp. 249-263, 2008, Springer, 978-3-540-89739-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Mudhakar Srivatsa, Ling Liu 0001, Arun Iyengar |
Preserving Caller Anonymity in Voice-over-IP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 50-63, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Nan Dun, Kenjiro Taura, Akinori Yonezawa |
GMount: Build your grid file system on the fly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 9th IEEE/ACM International Conference on Grid Computing (Grid 2008), Tsukuba, Japan, September 29 - October 1, 2008, pp. 328-333, 2008, IEEE Computer Society, 978-1-4244-2578-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Riyad Alshammari, Nur Zincir-Heywood |
Investigating Two Different Approaches for Encrypted Traffic Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 156-166, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Andreas Petlund, Kristian Evensen, Carsten Griwodz, Pål Halvorsen |
TCP mechanisms for improving the user experience for time-dependent thin-stream applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings, pp. 176-183, 2008, IEEE Computer Society, 978-1-4244-2412-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato J. O. Figueiredo |
WOW: Self-organizing Wide Area Overlay Networks of Virtual Workstations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Grid Comput. ![In: J. Grid Comput. 5(2), pp. 151-172, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Clusters, Grid computing, Networks, P2P, Virtual |
14 | Assaf Rinot |
Antichains in partially ordered sets of singular cofinality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Arch. Math. Log. ![In: Arch. Math. Log. 46(5-6), pp. 457-464, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 03E04, 06A07, 03E35 |
14 | Peter Dimopoulos, Panlop Zeephongsekul, Zahir Tari |
A dynamic priority approach to reducing delay in interactive TCP connections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 34(1-2), pp. 59-70, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Internet traffic queue management, Dynamic priority discipline, TCP |
14 | Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo |
Analysis of Computer Intrusions Using Sequences of Function Calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(2), pp. 137-150, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
unauthorized access (for example, hacking), Security, design, intrusion detection, management, anomaly detection, auditing, logging, forensic analysis |
14 | Shinichi Mukosaka, Hideki Koike |
Integrated visualization system for monitoring security in large-scale local area network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APVIS ![In: APVIS 2007, 6th International Asia-Pacific Symposium on Visualization 2007, Sydney, Australia, 5-7 February 2007, pp. 41-44, 2007, IEEE Computer Society, 1-4244-0808-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Shervin Erfani |
Tutorial 4: Wireless and Wireline Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Alfredo Pironti 0001, Riccardo Sisto |
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 839-844, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Gabriel Parmer, Richard West |
Mutable Protection Domains: Towards a Component-Based System for Dependable and Predictable Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTSS ![In: Proceedings of the 28th IEEE Real-Time Systems Symposium (RTSS 2007), 3-6 December 2007, Tucson, Arizona, USA, pp. 365-378, 2007, IEEE Computer Society, 0-7695-3062-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | David R. Piegdon, Lexi Pimenidis |
Targeting Physically Addressable Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings, pp. 193-212, 2007, Springer, 978-3-540-73613-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Raphael C.-W. Phan, Serge Vaudenay |
Security-Preserving Asymmetric Protocol Encapsulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 346-366, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Pawel Czarnul |
BC-MPI: Running an MPI Application on Multiple Clusters with BeesyCluster Connectivity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPAM ![In: Parallel Processing and Applied Mathematics, 7th International Conference, PPAM 2007, Gdansk, Poland, September 9-12, 2007, Revised Selected Papers, pp. 271-280, 2007, Springer, 978-3-540-68105-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
WAN-aware MPI, threads and MPI, grid middleware |
14 | Martin Hlavác, Tomás Rosa |
Extended Hidden Number Problem and Its Cryptanalytic Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers, pp. 114-133, 2006, Springer, 978-3-540-74461-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DSA implementation, hyper-threading, lattice, sliding window, side channel analysis, cache analysis |
14 | Eli Biham, Orr Dunkelman, Nathan Keller |
New Cryptanalytic Results on IDEA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 412-427, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Leif Nixon |
The Stakkato Intrusions: What Happened and What Have We Learned?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 16-19 May 2006, Singapore, pp. 27, 2006, IEEE Computer Society, 0-7695-2585-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato J. O. Figueiredo |
WOW: Self-Organizing Wide Area Overlay Networks of Virtual Workstations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, HPDC-15, Paris, France, June 19-23, 2006, pp. 30-42, 2006, IEEE, 1-4244-0307-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
self-organizing wide area overlay network, virtual workstation, WOW distributed system, peer-to-peer technique, user-level decentralized technique, IP packet, PVM-based fastDNAml application, virtual IP layer, virtual machine, local-area network, firewalls, WAN, cluster of workstations, high-throughput computing, client-server application |