Search

Your search keyword '"Secure Shell"' showing total 220 results

Search Constraints

Start Over You searched for: Descriptor "Secure Shell" Remove constraint Descriptor: "Secure Shell"
220 results on '"Secure Shell"'

Search Results

151. Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR

152. The Advanced Encryption Standard (AES)

153. Statistical classification of services tunneled into SSH connections by a k-means based learning algorithm

154. Classifying SSH encrypted traffic with minimum packet header features using genetic programming

155. Machine learning based encrypted traffic classification: Identifying SSH and Skype

156. Session resumption for the secure shell protocol

157. SSH-Enabled ParaView

158. Collecting the Non-Volatile Data from a Router

159. Proposal and Implementation of SSH Client System Using Ajax

160. Using GMM and SVM-based Techniques for the Classification of SSH-Encrypted Traffic

161. Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol

162. A Secure Migration Protocol for Mobile Agent Systems

163. Configuring Cisco Routers

164. Detecting Stepping-Stone Intruders with Long Connection Chains

165. Performance improvements to NETCONF for airborne tactical networks

166. JanioS

167. A Model for the Study of Privacy Issues in Secure Shell Connections

168. Secure Link Middleware

169. A distributed active response architecture for preventing SSH dictionary attacks

170. A Preliminary Look at the Privacy of SSH Tunnels

171. SpectroGrid: providing simple secure remote access to scientific instruments

172. Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections

173. FOCSE: An OWA-based Evaluation Framework for OS Adoption in Critical Environments

174. Development of Control Applications for High-Throughput Protein Crystallography Experiments

175. Web/File/Telnet/SSH

176. Different approaches for the detection of SSH anomalous connections

177. Detecting Policy Violations through Traffic Analysis

178. A Novel Mechanism for Improving Performance and Security of TCP Flows over Satellite Links

179. Hardware-Accelerated SSH on Self-Reconfigurable Systems

180. Enhancing Scientific Workflows with Secure Shell Functionality in UNICORE Grids

181. Debugging Embedded Software

182. Performance Analysis of SNMP over SSH

183. Design and Implementation of a Mobile SSH Protocol

184. Understanding the Extended Capabilities of the Nessus Environment

185. PIX Firewall Management

186. Bibliotecas de Pasaje de Mensajes y Cómputo Intercluster

187. Making secure TCP connections resistant to server failures

188. Access and accounting schemes of wireless broadband

189. Architectural defects of the secure shell

190. Syntax and Semantics-Preserving Application-Layer Protocol Steganography

191. A text graphics character CAPTCHA for password authentication

192. Remote Management

193. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

194. Authenticated encryption in SSH

195. An experimental study of security vulnerabilities caused by errors

196. Share Desktop Screen to Raspberry Pi

197. The CASS shell

198. An Open Source Multiplatform Virtual Laboratory for Engineering Education

199. Sumo: An Authenticating Web Application with an Embedded R Session

200. Massive data transfer between supercomputers and grid clusters using SCP controlled by FTS

Catalog

Books, media, physical & digital resources