Search

Your search keyword '"Secure Shell"' showing total 139 results

Search Constraints

Start Over You searched for: Descriptor "Secure Shell" Remove constraint Descriptor: "Secure Shell" Topic computer Remove constraint Topic: computer
139 results on '"Secure Shell"'

Search Results

1. GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN

2. Implementasi Compatibility Layer Pada Jaringan Server Diskless Berbasis Lubuntu 18.04 LTS

3. Secure Shell (SSH)

4. Experimental Evaluation of Security Monitoring and Notification on Network Intrusion Detection System for Server Security

5. SSH and Telnet Protocols Attack Analysis Using Honeypot Technique: Analysis of SSH AND TELNET Honeypot

6. Runtime verification for trustworthy secure shell deployment

7. Development of a web interface for submitting jobs to SLURM

8. A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification

9. SSH brute force attack mitigation in Internet of Things (IoT) network : An edge device security measure

10. Design and Implementation of Raspberry House: An IoT Security Framework

11. Python Network Automation Labs: SSH paramiko and netmiko

12. Webpage controlled surveillance bot using Raspberry Pi

13. POSTER: Distributed SSH Bruteforce Attack Detection with Flow Content Similarity and Login Failure Reputation

14. Implementation of NETCONF Standard by Major Customers in Croatia

15. OAuth SSH with Globus Auth

16. SciTokens SSH: Token-based Authentication for Remote Login to Scientific Computing Environments

17. Human Behavior Traits Detection and Avoidance Using Secure Shell Based Environment

18. Measuring the Prevalence of the Password Authentication Vulnerability in SSH

19. Deprecating RC4 in Secure Shell (SSH)

20. Review and Analysis of Cowrie Artefacts and Their Potential to be Used Deceptively

21. Outsourced Ciphertext-Policy based Privacy Preservation for Mobile Cloud Computing

22. Detecting Malicious Activity With DNS Backscatter Over Time

23. Using Honeypot Programs for Providing Defense of Banking Network Infrastructure

24. AI Powered System Providing Knowledge Based Solution for Errors in Server Logs

25. Network Simulation and Vulnerability Assessment Tool for an Enterprise Network

26. SSH Key Management Challenges and Requirements

27. Trustless Two-Factor Authentication Using Smart Contracts in Blockchains

28. Decrypting live SSH traffic in virtual environments

29. Deriving ChaCha20 Key Streams From Targeted Memory Analysis

30. Honeypot System for Attacks on SSH Protocol

31. Code Analysis and Improvement of Onion Routing Anonymous Systems

32. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

33. Installation of OpenStack (Liberty release) using PackStack

34. GWMEP: Task-Manageras-a-Service in Apache CloudStack

35. Norwegian e-Infrastructure for Life Sciences (NeLS)

36. An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System

37. Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection

38. A novel HIDS and log collection based system for digital forensics in cloud environment

39. ViPAR: a software platform for the Virtual Pooling and Analysis of Research Data

40. A flow-based detection method for stealthy dictionary attacks against Secure Shell

41. Lightweight VNF Manager Solution for Virtual Functions

42. Deployment of Cloud Using Open-Source Virtualization: Study of VM Migration Methods and Benefits

43. Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks

44. Evaluating shallow and deep networks for secure shell (ssh)traffic analysis

45. Virtual Machine Introspection Based SSH Honeypot

46. Secure Shell (Remote Access)

47. INTRUSION DETECTION SYSTEM IN SECURE SHELL TRAFFIC IN CLOUD ENVIRONMENT

48. Honey Encryption: Encryption beyond the Brute-Force Barrier

49. Development of remote robot control system for snake-like robot based on SSH protocol and iOS system

50. Computer-Aided English Teaching Platform Based on Secure Shell Framework

Catalog

Books, media, physical & digital resources