Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach
Over the last two decades (2000–2020), the Internet has rapidly evolved, resulting in symmetrical and asymmetrical Internet consumption patterns and billions of users worldwide. With the immense rise of the Internet, attacks and malicious behaviors pose a huge threat to our computing environment. Br...
Guardado en:
Autores principales: | Abel Z. Agghey, Lunodzo J. Mwinuka, Sanket M. Pandhare, Mussa A. Dida, Jema D. Ndibwile |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/9c763430fd354a42aa6617531e7082cc |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
-
PÓLYA'S COMBINATORIAL METHOD AND THE ISOMER ENUMERATION PROBLEM
por: Matamala,Adelio R.
Publicado: (2002) -
Leptospirosis research: fast, easy and reliable enumeration of mobile leptospires
por: SCHREIER,STEFAN, et al.
Publicado: (2009) -
The pros and cons of "self-enumeration"
por: Bogue, Donald J.
Publicado: (2014) -
Simultaneous enumeration of Phaeodactylum tricornutum (MLB292) and bacteria growing in mixed communities
por: Soto,Katia, et al.
Publicado: (2005) -
Branch duplication in trees: uniqueness of sedes and enumeration of sedes
por: Johnson,Charles R., et al.
Publicado: (2020)