Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SSH
biblio
Development of a Set of Procedures for Providing Remote Access to a Corporate Computer Network by means of the SSH Protocol (Using the Example of the CISCO IOS Operating System)
Submitted by grigby1 on Fri, 09/30/2022 - 2:55pm
operating systems
corporate computer network remote control
Cisco
ios
iOS Security
Resiliency
SSH
emulation
Mobile communication
computer networks
security
Resistance
Compositionality
Protocols
Software
resilience
Metrics
Human Factors
pubcrawl
biblio
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique: Analysis of SSH AND ℡NET Honeypot
Submitted by grigby1 on Thu, 06/09/2022 - 1:50pm
cyber attack
℡NET
Resiliency
Cowrie
SSH
honeypot
honey pots
Particle measurements
Human Factors
tools
Protocols
Scalability
Safety
resilience
pubcrawl
IP networks
risk management
information security
biblio
SSH and Telnet Protocols Attack Analysis Using Honeypot Technique : *Analysis of SSH AND ℡NET Honeypot
Submitted by grigby1 on Tue, 12/21/2021 - 11:36am
Protocols
Zero day attacks
tools
℡NET
SSH
Safety
risk management
Resiliency
resilience
pubcrawl
composability
Particle measurements
Metrics
IP networks
information security
honeypot
defense
cyber attack
Cowrie
biblio
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches
Submitted by grigby1 on Tue, 03/09/2021 - 1:36pm
learning (artificial intelligence)
telecommunication traffic
SSH
pubcrawl
policy-based governance
pattern classification
password
network traffic anomaly detection
network security
MLP
machine learning classifiers
machine learning approaches
machine learning algorithms
machine learning
LSTM
long short-term memory deep learning approach
Anomaly Detection
Intrusion Detection
internet
Human Factors
Human behavior
high-level attacks
FTP
dictionary-based brute-force attacks
Dictionaries
deep learning.
deep learning
computer network security
Computer Network Attacks
brute-force
brute force attacks
biblio
Virtual Machine Introspection Based SSH Honeypot
Submitted by grigby1 on Mon, 11/19/2018 - 11:25am
High-level interaction
honey pots
honeypot
Human Factors
pubcrawl
resilience
Resiliency
Scalability
SSH
virtual machine introspection
biblio
A Surfeit of SSH Cipher Suites
Submitted by grigby1 on Fri, 09/15/2017 - 10:01am
Applied cryptography
attacks
Lightweight Ciphers
network security
openssh
Protocol Security
pubcrawl
Resiliency
SSH
biblio
A Surfeit of SSH Cipher Suites
Submitted by grigby1 on Tue, 08/22/2017 - 11:07am
Applied cryptography
attacks
composability
Metrics
network coding
network security
openssh
Protocol Security
pubcrawl
Resiliency
SSH
biblio
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
privacy
Web sites
Web site identification
Web pages
Vectors
upstream bandwidth
traffic morphing scheme
traffic analysis countermeasures
traffic analysis attack
TLS
telecommunication traffic
TA attack
Support vector machines
SSH
security
Accuracy
padding
machine learning
IPsec
hypermedia
HTTP traffic
general-purpose TA countermeasures
encryption
encrypted tunnel
encrypted traffic
downstream bandwidth
Cryptography
Bandwidth
attack/countermeasure pairings