-
3
-
-
84889007202
-
-
w.sshguard.net/.
-
-
-
-
4
-
-
84889013319
-
-
The Hail Mary Cloud Data - Data collected by Peter N. M. Hansteen (peter@bsdly.net)
-
The Hail Mary Cloud Data - Data collected by Peter N. M. Hansteen (peter@bsdly.net). http://www.bsdly.net/~peter/hailmary/.
-
-
-
-
6
-
-
84888997843
-
-
Technical report, University of Technology of Compiegne
-
R. Bezut and V. Bernet-Rollande. Study of Dictionary Attacks on SSH. Technical report, University of Technology of Compiegne, http://files.xdec.net/ TX-EN-Bezut-Bernet-Rollande-BruteForce-SSH.pdf,2010.
-
(2010)
Study of Dictionary Attacks on SSH
-
-
Bezut, R.1
Bernet-Rollande, V.2
-
7
-
-
0001393743
-
An approach to the probability distribution of CUSUM run length
-
D. Brook and D. A. Evans. An approach to the probability distribution of CUSUM run length. In Biometrika, volume 59, pages 539-549, 1972.
-
(1972)
Biometrika
, vol.59
, pp. 539-549
-
-
Brook, D.1
Evans, D.A.2
-
11
-
-
84889024397
-
Flow-based Detection of SSH Intrusion Attempts
-
University of Twente, January
-
L. Hellemons. Flow-based Detection of SSH Intrusion Attempts. In 16th Twente Student Conference on IT. University of Twente, January 2012.
-
(2012)
16th Twente Student Conference on IT
-
-
Hellemons, L.1
-
12
-
-
84888996198
-
-
C. Jacquier. Fail2Ban. http://www.fail2ban.org.
-
-
-
Jacquier, C.1
-
13
-
-
79951728212
-
SSH Dictionary Attack and DNS Reverse Resolution Traffic in Campus Network
-
M. Kumagai, Y. Musashi, D. Arturo, L. Romana, K. Takemori, S. Kubota, and K. Sugitani. SSH Dictionary Attack and DNS Reverse Resolution Traffic in Campus Network. In 3rd International Conference on Intelligent Networks and Intelligent Systems, pages 645-648, 2010.
-
(2010)
3rd International Conference on Intelligent Networks and Intelligent Systems
, pp. 645-648
-
-
Kumagai, M.1
Musashi, Y.2
Arturo, D.3
Romana, L.4
Takemori, K.5
Kubota, S.6
Sugitani, K.7
-
14
-
-
84889067995
-
(Visually) Tracking Distributed SSH BruteForce Attacks?
-
Feburary
-
E. L. Malecot, Y. Hori, K. Sakurai, J. Ryou, and H. Lee. (Visually) Tracking Distributed SSH BruteForce Attacks? In 3rd International Joint Workshop on Information Security and Its Applications, pages 1-8, Feburary, 2008.
-
(2008)
3rd International Joint Workshop on Information Security and Its Applications
, pp. 1-8
-
-
Malecot, E.L.1
Hori, Y.2
Sakurai, K.3
Ryou, J.4
Lee, H.5
-
16
-
-
18144385431
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
IEEE
-
A. V. Siris and F. Papagalou. Application of anomaly detection algorithms for detecting SYN flooding attacks. In IEEE GLOBECOM, pages 2050-2054. IEEE, 2004.
-
(2004)
IEEE GLOBECOM
, pp. 2050-2054
-
-
Siris, A.V.1
Papagalou, F.2
-
17
-
-
0242529347
-
Practical automated detection of stealthy portscans
-
S. Staniford, J. A. Hoagland, and J. M. McAlerney. Practical automated detection of stealthy portscans. In 7th ACM Conference on Computer and Communications Security, Athens, Greece, 2000.
-
7th ACM Conference on Computer and Communications Security, Athens, Greece, 2000
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
20
-
-
84860570360
-
Detecting and Analyzing Automated Activity on Twitter
-
Springer
-
C. M. Zhang and V. Paxson. Detecting and Analyzing Automated Activity on Twitter. In Passive and Active Measurement. Springer, 2011.
-
(2011)
Passive and Active Measurement
-
-
Zhang, C.M.1
Paxson, V.2
|