共 50 条
- [31] CAUDIT: Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks [J]. PROCEEDINGS OF THE 16TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, 2019, : 667 - 682
- [33] A Statistical Analysis of Large Passwords Lists, Used to Optimize Brute Force Attacks [J]. 4TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 111 - 128
- [34] Universal Randomized Guessing with Application to Asynchronous Decentralized Brute-Force Attacks [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 485 - 489
- [36] Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic [J]. ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
- [37] Detection of HTTPS Brute-Force Attacks with Packet-Level Feature Set [J]. 2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 114 - 122
- [39] TOPASE: Detection of Brute Force Attacks used Disciplined IPs from IDS Log [J]. PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1361 - 1364
- [40] What's in a Name? Using Words' Uniqueness to Identify Hackers in Brute Force Attacks [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2020, 14 (01): : 361 - 382