has been cited by the following article(s):
[1]
|
Network and System Security
Lecture Notes in Computer Science,
2019
DOI:10.1007/978-3-030-36938-5_12
|
|
|
[2]
|
Graph clustering and anomaly detection of access control log for forensic purposes
Digital Investigation,
2017
DOI:10.1016/j.diin.2017.05.001
|
|
|
[3]
|
A flow-based detection method for stealthy dictionary attacks against Secure Shell
Journal of Information Security and Applications,
2015
DOI:10.1016/j.jisa.2014.08.003
|
|
|
[4]
|
SSH Dictionary Attack Detection Based on Flow Analysis
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet,
2012
DOI:10.1109/SAINT.2012.16
|
|
|