Search

Your search keyword '"Secure Shell"' showing total 215 results

Search Constraints

Start Over You searched for: Descriptor "Secure Shell" Remove constraint Descriptor: "Secure Shell"
215 results on '"Secure Shell"'

Search Results

1. Distributed Training of Large-Scale Deep Learning Models in Commodity Hardware

2. Realtime Risk Monitoring of SSH Brute Force Attacks

3. Secure Shell Remote Access for Virtualized Computing Environment

4. Investigations into decrypting live secure traffic in virtual environments

5. Deployment of Cloud Using Open-Source Virtualization: Study of VM Migration Methods and Benefits

6. Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection

7. Cancelable bimodal shell using fingerprint and iris.

9. Decrypting live SSH traffic in virtual environments.

11. GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN

12. Analysis of Kubernetes for Distributed Healthcare System Development using COVID-19 Healthcare App

13. Implementasi Compatibility Layer Pada Jaringan Server Diskless Berbasis Lubuntu 18.04 LTS

14. Secure Shell (SSH)

15. A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet.

16. Experimental Evaluation of Security Monitoring and Notification on Network Intrusion Detection System for Server Security

17. SSH and Telnet Protocols Attack Analysis Using Honeypot Technique: Analysis of SSH AND TELNET Honeypot

18. Design and implementation of parallel processing for embedded system online experiment teaching platform

19. Runtime verification for trustworthy secure shell deployment

20. Towards Quantum Resistant Key Agreement Schemes Using Unpredictability

21. SSH brute force attack mitigation in Internet of Things (IoT) network : An edge device security measure

22. Causal analysis of attacks against honeypots based on properties of countries

23. Development of a web interface for submitting jobs to SLURM

24. A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification

25. Design of cross-cultural teaching management system for international students based on cloud service platform.

26. Design and Implementation of Raspberry House: An IoT Security Framework

27. Python Network Automation Labs: SSH paramiko and netmiko

28. Secure Shell (SSH)

29. Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH

30. Webpage controlled surveillance bot using Raspberry Pi

31. POSTER: Distributed SSH Bruteforce Attack Detection with Flow Content Similarity and Login Failure Reputation

32. Performance Evaluation of Widely Used Portknoking Algorithms.

33. Implementation of NETCONF Standard by Major Customers in Croatia

34. A Method for Microservices Handover in A Local Area Network

35. OAuth SSH with Globus Auth

36. SciTokens SSH: Token-based Authentication for Remote Login to Scientific Computing Environments

37. Human Behavior Traits Detection and Avoidance Using Secure Shell Based Environment

38. Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks

39. Measuring the Prevalence of the Password Authentication Vulnerability in SSH

40. Deprecating RC4 in Secure Shell (SSH)

41. Secure Shell (SSH) Key Exchange Method Using Curve25519 and Curve448

42. Ed25519 and Ed448 Public Key Algorithms for the Secure Shell (SSH) Protocol

43. Review and Analysis of Cowrie Artefacts and Their Potential to be Used Deceptively

44. An Empirical Analysis of Plugin-Based Tor Traffic over SSH Tunnel

45. Robot Operating System Integrated robot control through Secure Shell(SSH)

46. Using Honeypot Programs for Providing Defense of Banking Network Infrastructure

47. Outsourced Ciphertext-Policy based Privacy Preservation for Mobile Cloud Computing

48. Detecting Malicious Activity With DNS Backscatter Over Time

50. Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm.

Catalog

Books, media, physical & digital resources