Search

Your search keyword '"Secure Shell"' showing total 65 results

Search Constraints

Start Over You searched for: Descriptor "Secure Shell" Remove constraint Descriptor: "Secure Shell" Topic computer network Remove constraint Topic: computer network
65 results on '"Secure Shell"'

Search Results

1. GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN

2. Secure Shell (SSH)

3. Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH

4. Implementation of NETCONF Standard by Major Customers in Croatia

5. A Method for Microservices Handover in A Local Area Network

6. Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks

7. Secure Shell (SSH) Key Exchange Method Using Curve25519 and Curve448

8. Ed25519 and Ed448 Public Key Algorithms for the Secure Shell (SSH) Protocol

9. Detecting Malicious Activity With DNS Backscatter Over Time

10. An Empirical Analysis of Plugin-Based Tor Traffic over SSH Tunnel

11. Honeypot System for Attacks on SSH Protocol

12. Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit Selection

13. Mobile Ad-hoc Networks Security Aspects in Black Hole Attack

14. Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol

15. Extension Negotiation in the Secure Shell (SSH) Protocol

16. Penetration and Security of OpenSSH Remote Secure Shell Service on Raspberry Pi 2

17. Secure Shell (Remote Access)

18. INTRUSION DETECTION SYSTEM IN SECURE SHELL TRAFFIC IN CLOUD ENVIRONMENT

19. Brute-force Attacks Analysis against SSH in HPC Multi-user Service Environment

20. Performance evaluation and analysis of layer 3 tunneling between OpenSSH and OpenVPN in a wide area network environment

21. 6to4 tunneling framework using OpenSSH

22. Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?

23. A Comparison Study on Key Exchange-Authentication protocol

24. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

25. Real-Time Transmission of Voice Over 802.11 Wireless Networks Using Raspberry Pi

26. Integrating cloud-WSN to analyze weather data and notify SaaS user alerts during weather disasters

27. A New Secure Virtual Connector Approach for Communication within Large Distributed Systems

28. A VPN framework through multi-layer tunnels based on OpenSSH

29. Configuring the Network

30. The Trellis security infrastructure for overlay metacomputers and bridged distributed file systems

31. A15: Secure signal tunneling for SCADA and PLCs using SSH protocol

32. A security protocol intended to ease QoS management in IP networks

33. Hybrid Conventional and Quantum Security for Software Defined and Virtualized Networks

34. Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol

35. Configuring Network Access

36. Detection of SSH host spoofing in control systems through network telemetry analysis

37. IEEE standards for encrypted storage

38. Securing Authentication and Trusted Migration of Weblets in the Cloud with Reduced Traffic

39. Performance Evaluation of Widely used Portknoking Algorithms

40. SSH over SCTP — Optimizing a multi-channel protocol by adapting it to SCTP

41. Introducing SOR: SSH-based Onion Routing

42. The classification of SSH tunneled traffic using maximum likelihood classifier

43. Two-phased method for identifying SSH encrypted application flows

44. Maintaining Access

45. Mobile Virtual Private Networking

46. Statistical classification of services tunneled into SSH connections by a k-means based learning algorithm

47. Session resumption for the secure shell protocol

48. SSH-Enabled ParaView

49. Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol

50. Detecting Stepping-Stone Intruders with Long Connection Chains

Catalog

Books, media, physical & digital resources