|
Volumn 1, Issue , 2005, Pages 111-120
|
A first step toward detecting SSH identity theft in HPC cluster environments: Discriminating masqueraders based on command behavior
|
Author keywords
Cluster security; Masquerading; SSH identity theft
|
Indexed keywords
CLUSTER SECURITY;
MASQUERADING;
SSH IDENTITY THEFTS;
SUPPORT VECTOR MACHINE;
INFORMATION MANAGEMENT;
LEARNING SYSTEMS;
MULTI AGENT SYSTEMS;
PRECISION ENGINEERING;
SECURITY OF DATA;
USER INTERFACES;
COMPUTER CRIME;
|
EID: 33845484215
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/CCGRID.2005.1558542 Document Type: Conference Paper |
Times cited : (10)
|
References (16)
|