Essays about: "SSH"
Showing result 1 - 5 of 21 essays containing the word SSH.
-
1. Primary Drivers of Sea Level Variability in the North – Baltic Sea Transition Using Machine Learning
University essay from Göteborgs universitet/Institutionen för geovetenskaperAbstract : Global mean sea level is rising, however not uniformly. Regional deviations of sea surface height (SSH) are common due to local drivers, including surface winds, ocean density stratifications, vertical land- & crustal movements and more. READ MORE
-
2. Analysing SSH Clients Using Protocol State Fuzzing
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : .... READ MORE
-
3. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. READ MORE
-
4. Developing a modular, high-interaction honeypot using container virtualization
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : A significant increase of attacks combined with companies neglecting cybersecurity poses a problem for the ever-growing number of Internet-connected devices. With honeypot technology being an invaluable tool for understanding adversaries’ strategies, this project aims to develop a modular honeypot that is able to evolve. READ MORE
-
5. Masquerader Detection via 2fa Honeytokens
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE