Academic literature on the topic 'SSH SHELL'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SSH SHELL.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SSH SHELL"

1

Tohirin, Tohirin. "PENERAPAN KEAMANAN REMOTE SERVER MELALUI SSH DENGAN KOMBINASI KRIPTOGRAFI ASIMETRIS DAN AUTENTIKASI DUA LANGKAH." Jurnal Teknologi Informasi 4, no. 1 (June 2, 2020): 133–38. http://dx.doi.org/10.36294/jurti.v4i1.1262.

Full text
Abstract:
Abstract - System security is an absolute requirement that must be considered by users, especially network administrators to protect data. Every time a system is maintained and monitored, an administrator requires remote access such as a secure shell (SSH) to enter the system with a secure channel. By default, SSH is not secure because there is a great chance that the account will be taken over by brute force techniques. The application of asymmetric cryptography on SSH accounts is considered safe than SSH remote login by default. However, this is still not enough because hackers could control the computer that is used by administrators to do remote servers. It also can be hacked with key scanning techniques. The combination of asymmetric cryptography and two-step authentication can be a solution so that the server will be very difficult to penetrate.Keywords - Server Security, SSH, Asymmetric Cryptosystems, Two-Step Authentication.Abstrak - Keamanan sistem menjadi syarat mutlak yang harus diperhatikan oleh pengguna, khususnya administrator jaringan guna melindungi data. Setiap melakukan pemeliharaan dan monitoring sistem, seorang administrator membutuhkan akses masuk dengan cara remote seperti secure shell (SSH) ke dalam sistem dengan saluran yang aman. Secara default, SSH tidak aman karena berpeluang besar akun diambil alih dengan teknik brute force. Penerapan kriptografi asimetris pada akun SSH dinilai aman daripada remote login SSH secara default. Akan tetapi hal tersebut masih belum cukup karena bisa saja peretas justru mengendalikan komputer yang digunakan oleh administrator dalam melakukan remote server. Selain itu juga dapat diretas dengan teknik key scanning. Kombinasi kriptografi asimetris dan autentikasi dua langkah dapat menjadi solusi sehingga server akan sangat susah ditembus.Kata Kunci – Keamanan Server, SSH, Kriptografi Asimetris, Autentikasi Dua Langkah.
APA, Harvard, Vancouver, ISO, and other styles
2

Hidayat, Muh Adrian Juniarta, and Hadian Mandala Putra. "Sistem Keamanan Server Linux CentOS Dengan Metode Port Knock dan RST Cookies." Infotek : Jurnal Informatika dan Teknologi 6, no. 2 (July 20, 2023): 411–20. http://dx.doi.org/10.29408/jit.v6i2.17500.

Full text
Abstract:
The increase in online-based services makes a security system for server computers increasingly needed. A server computer is a device that must always be available to be accessed anytime and anywhere. Some of the security systems needed for server computers include security for ssh port access for remote server access needs and a security system to protect servers from Denial of Service (DoS) attacks which can make the server down and completely inaccessible. In this study, a security system is proposed for a server computer with the Linux CentOS operating system on a port 22 secure shell(ssh) access system using the port knock method and a security system to prevent Denial of Service (DoS) attacks on server computers using the RST Cookies method. The simulation results from the port 22 Secure Shell (SSH) access experiment for the server computer can work well where port 22 Secure Shell(SSH) will remain closed and cannot be accessed carelessly except by accessing several ports first according to predefined port knocking rules. Likewise, the implementation of a security system with the RST Cookies method works very well to prevent Denial of Service (DoS) attacks and can still keep the server accessible with a good response time of under 1 ms
APA, Harvard, Vancouver, ISO, and other styles
3

Costa, Joana Cabral, Tiago Roxo, Carolina Lopes, João B. F. Sequeiros, Tiago M. C. Simões, and Pedro R. M. Inácio. "Theoretical and practical assessments over SSH." Research and Practice in Technology Enhanced Learning 18 (January 2, 2023): 030. http://dx.doi.org/10.58459/rptel.2023.18030.

Full text
Abstract:
During the COVID-19 pandemic, universities worldwide were forced to close, causing a shift from presential to remote classes. This situation motivated teachers to find suitable tools to evaluate students remotely, fairly, and accurately. However, currently available systems are either survey or exercise evaluation based, not suitable for competency-based assessments. Faced with this context and limitations of available evaluation systems, we developed TestsOverSSH, a system to devise, deliver, and automatically correct assessments performed in a Command Line Interface (CLI) environment. Unique assessments are generated per student when they access the proposed system via Secure SHell (SSH). TestsOverSSH is composed of shell scripts that orchestrate a series of tools and services that come pre-installed in Linux distributions. It can be used to construct multiple-choice or direct answer questions while also requiring students to perform tasks in the environment per se, namely computer programming or CLI manipulation-related assignments. We present examples of the question types in this system, explaining question formats and operating guidelines. Since the assessments are directly performed in the system, logs and command history can be easily retrieved while keeping information within student devices uncollected. We performed evaluations using this system in a real context and obtained student feedback through a custom survey and the System Usability Scale (SUS). Survey results and SUS score suggest that TestsOverSSH is an intuitive evaluation tool, with eased access and usage, making it applicable for e-learning.
APA, Harvard, Vancouver, ISO, and other styles
4

Ramadhan, Rizky, Jonny Latuny, and Samy J. Litiloly. "PERANCANGAN PENGAMANAN SERVER APACHE MENGGUNAKAN FIREWALL IPTABLES DAN FAIL2BAN." Jurnal ISOMETRI 1, no. 1 (May 31, 2022): 9–15. http://dx.doi.org/10.30598/isometri.2022.1.1.9-15.

Full text
Abstract:
Penelitian ini membahas mengenai pemanfaatan firewall dan fail2ban yang dikembangkan menggunakan IpTables guna mengamankan suatu web server dari serangan atau percobaan akses dari pihak-pihak yang tidak berkepentingan. Pemanfaatan firewall dan fail2ban bertujuan agar web server serta aplikasi-aplikasi online yang digunakan aman dari akses pihak-pihak yang tidak berkepentingan serta mencegah pencurian data-data yang sensitive. Implementasi fail2ban dilakukan dengan fokus kepada mengamankan akses koneksi SSH (secure shell) dimana fail2ban digunakan untuk memblok/memfilter IP Address yang melakukan percobaan koneksi secara beruntun (3x) dan yang masuk ke kriteria serangan. Hasilnya adalah daftar IP Address yang diblok aksesnya setelah 3x gagal melakukan koneksi ke layanan SSH (secure shell) pada web server dari detail filtering fail2ban diambil sampel IP Address, domain, negara, dan lain-lain yang memberikan indikasi bahwa system firewall yang diterapkan dapat berfungsi dengan benar.
APA, Harvard, Vancouver, ISO, and other styles
5

Desmira, Desmira, and Romi Wiryadinata. "Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knockking." INSANtek 3, no. 1 (May 31, 2022): 1–5. http://dx.doi.org/10.31294/instk.v3i1.552.

Full text
Abstract:
Banten Tour Mandiri merupakan penyedia layanan Tour dan Travel, kebutuhan dalam penggunaan internet pada perusahaan sangat dibutuhkan agar pelayanan dalam bidang jasa dapat terlaksana dengan nyaman dan efektif. Penelitian ini bertujuan 1.Merancang sistem remote menggunakan port knocking untuk memmantau dan mengawasi akses jaringan internet pada PT. Banten Tour Mandiri. 2. Mengawasi jaringan internet pada lingkungan PT. Banten Tour Mandiri. 3.Memudahkan perusahaan dalam mengelola, mengawasi saat menggunakan jaringan internet yang ada di lingkungan perusahaan. Untuk mengembagkan kesetabilan jaringan internet yang ada, namun ada beberapa hal yang belum diperhatikan dan diimplementasikan, yaitu keamanan dan pengawasan terhadap jaringan internet, maka dibutuhkannya suatu sistem keamanan jaringan yang mempermudah pengamanan dan pengawasan, dengan malakukan Rancang Bangun Kemanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking Di PT. Banten Tour Mandiri. Hasil penelitian ini terlihat administrator berhasil melakukan akses remote terhadap server jaringan internet menggunakan port ssh. Pemantauan dan pengelolaan keamanan jaringan internet dapat dilakukan menggunakan PC yang berbeda yang berada pada lingkukan PT. Banten Tour Mandiri
APA, Harvard, Vancouver, ISO, and other styles
6

Desmira, Desmira, and Romi Wiryadinata. "Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking." Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI) 5, no. 1 (March 3, 2022): 28–33. http://dx.doi.org/10.55338/jikomsi.v5i1.242.

Full text
Abstract:
PT. Banten Tour Mandiri is a tour and travel service provider, the need for internet use in companies is very much needed so that services in the service sector can be carried out comfortably and effectively. This study aims 1. To design a remote system using port knocking to monitor and supervise internet network access at PT. Banten Tour Mandiri. 2. Overseeing the internet network at PT. Banten Tour Mandiri. 3. Make it easier for companies to manage, supervise when using the existing internet network in the corporate environment. To develop the stability of the existing internet network, but there are several things that have not been considered and implemented, namely security and supervision of the internet network, it is necessary to have a network security system that simplifies security and supervision, by performing the Secure Shell (SSH) Port Security Design Port Knocking Method At PT. Banten Tour Mandiri. The results of this study show that the administrator has successfully performed remote access to the internet network server using the SSH port. Monitoring and management of internet network security can be done using a different PC located in the PT. Banten Tour Mandiri
APA, Harvard, Vancouver, ISO, and other styles
7

Zuzcák, Matej, and Petr Bujok. "Using honeynet data and a time series to predict the number of cyber attacks." Computer Science and Information Systems, no. 00 (2021): 40. http://dx.doi.org/10.2298/csis200715040z.

Full text
Abstract:
A large number of cyber attacks are commonly conducted against home computers, mobile devices, as well as servers providing various services. One such prominently attacked service, or a protocol in this case, is the Secure Shell (SSH) used to gain remote access to manage systems. Besides hu man attackers, botnets are a major source of attacks on SSH servers. Tools such as honeypots allow an effective means of recording and analysing such attacks. However, is it also possible to use them to effectively predict these attacks? The prediction of SSH attacks, specifically the prediction of activity on certain subjects, such as autonomous systems, will be beneficial to system administrators, internet service providers, and CSIRT teams. This article presents multiple methods for using a time series, based on real-world data, to predict these attacks. It focuses on the overall prediction of attacks on the honeynet and the prediction of attacks from specific geographical regions. Multiple approaches are used, such as ARIMA, SARIMA, GARCH, and Bootstrapping. The article presents the viability, precision and usefulness of the individual approaches for various areas of IT security.
APA, Harvard, Vancouver, ISO, and other styles
8

Djayali, Abdul Djalil, Rifaldi Nurdin, and Rachmat Saleh Sukur. "IMPLIKASI R-WALL UNTUK PENDETEKSIAN DAN PENGAMANAN SERANGAN SIBER PADA SERVER." Jurnal Komputer dan Informatika 9, no. 1 (March 10, 2021): 45–55. http://dx.doi.org/10.35508/jicon.v9i1.3606.

Full text
Abstract:
Keamanan berbanding terbalik dengan kenyamanan, semakin nyaman dalam penerapan teknologi maka akan berdampak pada sisi keamanan sistem. Server merupakan salah satu infratruktur yang penting dalam mengelolah data. Mencegah serangan pada Server penting untuk dilakukan. Penerapan firewall dapat meminimalisir serangan yang membahayakan Server. Salah satunya dengan menerapkan aplikasi Intrusion Detection System (IDS) seperti Snort yang memiliki kemampuan untuk mendeteksi serangan yang terjadi pada sistem Server. Pada penelitian ini, penulis melakukan pengembangan sistem yang diberi nama R-Wall. Penerapan R-Wall bertujuan untuk mampu memonitor dan mengamankan server terhadap beberapa metode serangan, antara lain yaitu distribution denial of service (DDoS) ping of death, port scanning, brute force pada layanan file transfer protocol (FTP) dan brute force pada layanan secure shell (SSH). Hasil penerapan ini mampu memberikan notifikasi serangan yang dikirimkan melalui robot Telegram dengan total 247 serangan DDoS ping of death, 8 serangan port scanning, 247 serangan brute force pada layanan FTP dan 208 serangan pada layanan brute force SSH. R-Wall juga mampu melakukan pembatasan akses terhadap penyerang.
APA, Harvard, Vancouver, ISO, and other styles
9

Charke, A. Ben, M. Chabi, and M. Fakir. "Contribution to the Security of the Information System." TELKOMNIKA Indonesian Journal of Electrical Engineering 16, no. 1 (October 1, 2015): 154. http://dx.doi.org/10.11591/tijee.v16i1.1599.

Full text
Abstract:
Security of information systems has become a critical problem of companies. In this paper, the principles of security and the description of some attacks that threatening the information system are given. After Techniques of cryptography, digital signature to ensure the confidentiality, integrity and authentication of data, are described. Some security protocol such as Secure Shell (SSH), Secure Socket Layer (SSL), Internet Protocol SECure (IPSEC), in order to ensure the security of connection resources, are described. Intrusion detection is implemented using free IDS "SNORT" software.
APA, Harvard, Vancouver, ISO, and other styles
10

Qiu, Lingling. "Computer-Aided English Teaching Platform Based on Secure Shell Framework." International Journal of Emerging Technologies in Learning (iJET) 14, no. 16 (August 29, 2019): 143. http://dx.doi.org/10.3991/ijet.v14i16.11149.

Full text
Abstract:
With the aid of information-based teaching platform, the traditional classroom English teaching mode can be improved to provide students with a realistic linguistic environment and enhance their learning interest. As a result, the web-based computer aided English teaching has become the mainstream in college English education. Based on the browser/server (B/S) structure, this paper designs a computer-aided English teaching platform of the model–view–controller (MVC) architectural pattern. The programming was carried out using the MySQL database, and the functions of the computer-aided English teaching platform were realized securely and stably by the popular Secure Shell (SSH) framework. The system test results show that the proposed platform supports the open teaching of college English, solves the lack of interaction in traditional classroom teaching, and arouses the students’ learning interest. The research further promotes the reform of college English teaching, and enriches the theories and practices on computer-aided English teaching.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "SSH SHELL"

1

Flucke, Thomas J. "IDENTIFICATION OF USERS VIA SSH TIMING ATTACK." DigitalCommons@CalPoly, 2020. https://digitalcommons.calpoly.edu/theses/2208.

Full text
Abstract:
Secure Shell, a tool to securely access and run programs on a remote machine, is an important tool for both system administrators and developers alike. The technology landscape is becoming increasingly distributed and reliant on tools such as Secure Shell to protect information as a user works on a system remotely. While Secure Shell accounts for the abuses the security of older tools such as telnet overlook, it still has fundamental vulnerabilities which leak information about both the user and their activities through timing attacks. The OpenSSH client, the implementation included in all Linux, Mac, and Windows computers, sends each keystroke entered to the server as soon as it becomes available. As a result, an attacker can observe the network patterns to know when a user presses a key and draw conclusions based on that information such as what a user is typing or who they are. In this thesis, we demonstrate that such an attack allows a malicious observer to identify a user with a concerning level of accuracy without having direct access to either the client or server systems. Using machine learning classifiers, we identify individual users in a crowd based solely on the size and timing of packets traveling across the network. We find that our classifiers were able to identify users with 20\% accuracy using as little as one hour of network traffic. Two of them promise to scale well to the number of users.
APA, Harvard, Vancouver, ISO, and other styles
2

Engkvist, Tobias. "Remote Netlab." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28248.

Full text
Abstract:
Detta projekt har haft som fokus att skapa ett system där användare med hjälp av SSH ska kunna logga in på en server och utföra konfigurationer på switchar och routrar med olika krav såsom att enbart en användare får vara inloggad i systemet åt gången. För att uppnå målen och kraven så användes ett par olika skript med språk såsom shell, bash, perl och expect. Resultatet visar en färdig produkt och att detta projekt var genomförbart. Lösningsförslaget finns presenterat i form av ett flödesschema och sedan vanlig text. Slutligen presenteras och diskuteras även andra alternativa lösningar.
The projects main focus have been to create a system mainly for the users that study network technology on a more advanced level. In order for the students to start to configure the switches and routers they need to access a server with the SSH protocol which was one of the requirements. Another requirement was that only one user should be able to configure at same time (so two users should NOT be able to configure the switches and routers at the same time). The scripting languages that was used was bash, shell, perl and expect in order to achieve these goals and requirement. The result shows a finished product and that this project was feasable. The solution is presented as a flowchart as an overview and some regular text that explains the scripts in more depth. There are of course a ton of other ways to solve this problem and a few of them are presented and discussed in the later chapters.
APA, Harvard, Vancouver, ISO, and other styles
3

Prasetijo, Agung Budi. "Application-level proxy firewalls." Thesis, Queensland University of Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huebner, U., Grunewald, Heide, Huettmann, and Trapp. "Mitteilungen des URZ 2/1998." Universitätsbibliothek Chemnitz, 1998. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199800152.

Full text
Abstract:
Perspektiven im Netzbereich C.A.N. - Chemnitzer AbsolventenNetz Grafische Benutzeroberfl¨achen im Netz (VNC) PGP 5.x und GNUPG Neuigkeiten bei der Secure Shell (SSH) Vim 5.x Richtlinien zur Sicherheit im Campusnetz Ein Jahr Einsatz von Windows NT im URZ
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Jun. "Nonlinear transient analysis of isotropic and composite shell structures under dynamic loading by SPH method." Phd thesis, Université de Technologie de Compiègne, 2014. http://tel.archives-ouvertes.fr/tel-00997702.

Full text
Abstract:
The objective of this thesis is the development and the extension of the SPH method for the analysis of isotropic and multilayered composite shell structures, undergoing dynamic loading. Major defects of the classical SPH method such as the lack of consistency, the tensile instability are solved by "Corrective Smoothed Particle Method", the use of the Total Lagrangian Formulation and artificial viscosity. Mindlin-Reissner Theory is employed for the modeling of thick shells, by using only one layer of particles in the mid-plane. The strong form of the governing equations for shell structures are discretized directly by the modified SPH method and solved using the central difference time integration scheme. An extension of the method has been introduced for the modeling of low-velocity impact of shells by rigid impactors. The contact force is calculated based on the Hertzian contact law. A last extension of the SPH method concerns the integration of Tsai-Wu failure criterion for the modeling of progressive degradation of multilayered structures.
APA, Harvard, Vancouver, ISO, and other styles
6

Caleyron, Fabien. "Simulation numérique par la méthode SPH de fuites de fluide consécutives à la déchirure d'un réservoir sous impact." Phd thesis, INSA de Lyon, 2011. http://tel.archives-ouvertes.fr/tel-00711040.

Full text
Abstract:
Le récent développement des menaces terroristes renforce l'effort de recherche du CEA et d'EDF pour la protection des citoyens et des installations. De nombreux scénarios doivent être envisagés comme, par exemple, la chute d'un avion de ligne sur une structure de génie civil. La dispersion du carburant dans la structure, son embrasement sous forme de boule de feu et les effets thermiques associés sont des éléments essentiels du problème. L'utilisation de modèles numériques est indispensable car des expériences seraient difficiles à mettre en œuvre, coûteuses et dangereuses. Le problème type que l'on cherche à modéliser est donc l'impact d'un réservoir rempli de fluide, sa déchirure et la dispersion de son contenu. C'est un problème complexe qui fait intervenir une structure mince avec un comportement fortement non-linéaire allant jusqu'à rupture, un fluide dont la surface libre peut varier drastiquement et des interactions fluide-structure non permanentes. L'utilisation des méthodes numériques traditionnelles pour résoudre ce problème semble difficile, essentiellement parce qu'elles reposent sur un maillage. Cela complique la gestion des grandes déformations, la modélisation des interfaces variables et l'introduction de discontinuités telles que les fissures. Afin de s'affranchir de ces problèmes, la méthode sans maillage SPH (\og Smoothed Particle Hydrodynamics \fg) a été utilisée pour modéliser le fluide et la structure. Ce travail, inscrit dans la continuité de recherches précédentes, a permis d'étendre un modèle de coque SPH à la modélisation des ruptures. Un algorithme de gestion des interactions fluide-structure a également été adapté à la topologie particulière des coques. Afin de réduire les coûts de calcul importants liés à ce modèle, un couplage avec la méthode des éléments finis a également été élaboré. Il permet de n'utiliser les SPH que dans les zones d'intérêt où la rupture est attendue. Finalement, des essais réalisés par l'ONERA sont étudiés pour valider la méthode. Ces travaux ont permis de doter le logiciel de dynamique rapide Europlexus d'un outil original et efficace pour la simulation des impacts de structures minces en interaction avec un fluide. Un calcul démonstratif montre enfin la pertinence de l'approche et sa mise en œuvre dans un cadre industriel.
APA, Harvard, Vancouver, ISO, and other styles
7

Nassif, Laurent. "Use of evaporative fractional crystallization in the pretreatment process of multi-salt single shell tank Hanford nuclear wastes." Thesis, Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/22706.

Full text
Abstract:
The purpose of the work described in this thesis was to explore the use of fractional crystallization as a technology that can be used to separate medium-curie waste from the Hanford Site tank farms into a high-curie waste stream, which can be sent to a Waste Treatment and Immobilization Plant (WTP), and a low-curie waste stream, which can be sent to Bulk Vitrification. The successful semi-batch crystallization of sodium salts from two single shell tank simulant solutions (SST Early Feed, SST Late Feed) demonstrated that the recovered crystalline product met the purity requirement for exclusion of cesium, sodium recovery in the crystalline product and the requirement on the sulfate-to-sodium molar ratio in the stream to be diverted to the WTP. In this thesis, experimental apparatus, procedures and results are given on scaled-down experiments of SST Early Feed for hot-cell adaptation along with operating parameters and crystallization mechanism studies on early feed multi-solute crystallization. Moreover, guidance is given regarding future steps towards adapting the technology to multi-salt crystallization kinetic parameter estimates and modeling. Crystallization, Evaporative Fractional Crystallization, Nuclear Waste Pretreatment, Cesium Removal, Hanford, SST Early and Late feed, Multi-solute, Multi-salts, Simulant Testing
APA, Harvard, Vancouver, ISO, and other styles
8

Murphy, Michael W., and Michael E. Barkenhagen. "The Sunset Supply Base long term COTS supportability, implementing affordable methods and processes." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1154.

Full text
Abstract:
Approved for public release; distribution in unlimited.
This thesis represents a cross Systems Command (NAVSEA/NAVAIR) developed product. The product - the Sunset Supply Base (SSB) system - provides a complete system for addressing the risks and supportability issues involved with Commercial Off the Shelf (COTS) products in Navy combat and support systems. The SSB system was implemented on three Navy combat weapon systems at various phases of the product development life cycle. The main body provides to the Program Management Offices (PMO) and other decision makers, a high level summary of performance expectations. Appendix A - The Sunset Supply Base Architecture - identifies at a high level of abstraction a collaborative architecture providing a roadmap for design and development of the SSB system. Appendix B - The Systems Engineering Development and Implementation (SEDI) plan - is a prescriptive or "How to" manual describing activities that have been used to successfully implement the SSB system. Appendix C - Business Case Analysis (BCA) - presents the data collected as a result of SEDI plan implementation then addresses the business/programmatic attributes showing the viability and value proposition possible through the SSB system. Appendix D - The Marketing Plan for the SSB system - defines methods and practices necessary to establish the SSB system as the alternative of choice.
Chemical Engineer, United States Navy
Systems Engineer, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
9

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles
10

KUMAR, MAHESH. "PRIVACY PRESERVATION USING AES ALGORITHM IN HADOOP ENVIRONMENT." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14894.

Full text
Abstract:
Many government agencies and businesses are focusing on security issues because of cybercrime. If we talk about Facebook which maintains large data for every user account but provides little privacy since privacy is very essential factor nowadays. Security helps in gain of the user’s interest and increase the growth of business. Privacy-Preservation is an important feature for any individual since his personal data should not be accessible to unauthorized people. In recent years, data mining has been viewed as a threat to privacy because wide range of data is spread in digital form by many companies. The data is stored in digital form in the computer. So some privacy should be preserved during data collection and data mining. Nowadays there are so many attackers attacking our data. That’s why privacy is so important factor that reduces the chances of attacks and increase the security. In this project, we proposed a method for processing the data file in encrypted form that is unreadable by unauthorized user and reduces the encryption and decryption time as compared to AES. This research also shows the results that have been practically proved by the implementation of existing algorithm and proposed algorithm. In proposed algorithm, we can execute the dataset that can be of size greater than computer RAM which cannot be done in AES. To give an approach for HDFS environment, useful for the improvement of HDFS Hadoop while dealing with big data, Privacy- Preservation should be our main concern. This Means, in HDFS the data is in plain form, which can be accessed and misused by anyone. So data should be in encrypted form to provide the privacy because even if a small piece of information is leaked by attacker, then it becomes difficult to handle data of TBs. So this approach for HDFS environment can be used to preserve the privacy. Here I have also compared the results with different kinds of parameters. The approach used here breaks the file into blocks and then block level encryption is used. The main objective here is to reduce the time of encryption and preserve the privacy to increase the security in HDFS environment.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "SSH SHELL"

1

Barret, Daniel J. SSH Secure Shell: Ein umfassendes Handbuch. Beijing: O’Reilly Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Byrnes, Robert G. SSH, The Secure Shell: The Definitive Guide. Edited by Mike Loukides. 2nd ed. Beijing: O'Reilly Media, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Loukides, Mike, ed. SSH, The Secure Shell: The Definitive Guide. Beijing: O’Reilly Media, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Implementing SSH: Strategies for optimizing the Secure Shell. Indianapolis, Ind: Wiley, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Dale. Next Generation SSH2 Implementation. San Diego: Elsevier Science, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

On command: Writing a Unix-like shell for MS-DOS. 2nd ed. Redwood City, CA: M & T Books, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Next generation SSH2 implementation: Securing data in motion. Burlington, MA: Syngress Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Berṿald, Bet ha-sefer la-ʻavodah sotsyalit ʻa sh Paʼul. Teḥume ʻinyan u-meḥḳar shel ḥevre ha-segel. Yerushalayim: ha-Universiṭah ha-ʻIvrit bi-Yerushalayim, Bet ha-sefer la-ʻavodah sotsyalit ʻal shem Paʼul Berṿald, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bar-Yitsḥaḳ, Ḥayah. Koḥo shel sipur: Sefer ha-yovel le-A.S.ʻA.Y. [Ḥefah]: Arkhiyon ha-sipur ha-ʻamami be-Yiśraʼel ʻa. sh. Dov Noi, ha-Faḳulṭah le-madaʻe ha-ruaḥ, Universiṭat Ḥefah, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bet ha-sefer la-ʻavodah sotsyalit ʻa. sh. Paʼul Berṿald. Teḥume ʻinyan aḳademi shel ḥavre segel Bet ha-sefer la-ʻavodah sotsyalit. Yerushalayim: ha-Universiṭah ha-ʻIvrit bi-Yerushalayim, Bet ha-sefer la-ʻavodah sotsyalit ʻa. sh. Paʼul Berṿald, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SSH SHELL"

1

Schwenk, Jörg. "Secure Shell (SSH)." In Sicherheit und Kryptographie im Internet, 305–15. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29260-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schwenk, Jörg. "Secure Shell (SSH)." In Guide to Internet Cryptography, 329–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19439-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

La Lau, Robert. "Secure Shell (SSH)." In Practical Internet Server Configuration, 159–74. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6960-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jordan, Vladimir, and Igor Shmakov. "Method for Intermetallide Spatial 3D-Distribution Recognition in the Cubic Ni@Al “Core-shell” Nanoparticle Based on Computer MD-Simulation of SHS." In Communications in Computer and Information Science, 101–20. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94141-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kambourakis, Georgios, Angelos Rouskas, and Stefanos Gritzalis. "Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections." In Handbook of Research on Wireless Security, 666–80. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch041.

Full text
Abstract:
Security is always an important factor in wireless connections. As with all other existing radio technologies, the Bluetooth standard is often cited to suffer from various vulnerabilities and security inefficiencies while attempting to optimize the trade-off between performance and complementary services including security. On the other hand, security protocols like IP secure (IPsec) and secure shell (SSH) provide strong, flexible, low cost, and easy to implement solutions for exchanging data over insecure communication links. However, the employment of such robust security mechanisms in wireless realms enjoins additional research efforts due to several limitations of the radio-based connections, for example, link bandwidth and unreliability. This chapter will evaluate several Bluetooth personal area network (PAN) parameters, including absolute transfer times, link capacity, throughput, and goodput. Experiments shall employ both Bluetooth native security mechanisms, as well as the two aforementioned protocols. Through a plethora of scenarios utilizing both laptops and palmtops, we offer a comprehensive in-depth comparative analysis of each of the aforementioned security mechanisms when deployed over Bluetooth communication links.
APA, Harvard, Vancouver, ISO, and other styles
6

"Networking Fundamentals." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 106–18. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch004.

Full text
Abstract:
This chapter introduces to basics of computer networking and associated widely used essential networking communication protocols. The chapter provides the comparison of OSI and TCP model along with details of internet layer protocols including internet protocol (IP), IP addressing schemes, internet control messaging protocol (ICMP), etc. Next, the chapter discusses transport layer protocols transmission control protocol (TCP) and user datagram protocol (UDP) in detail. Application layer protocols including dynamic host control protocol (DHCP), secure shell (SSH), file transfer protocol (FTP), trivial FTP (TFTP), simple network management protocol (SNMP), hyper text transfer protocol secure (HTTPS), network time protocol (NTP), domain name system (DNS), and simple mail transfer protocol (SMTP) are also explained in this chapter. One just cannot attack a networking protocol without knowing how it works. Having a solid introduction about computer networking and network protocols is fundamental in the ethical hacking world. This chapter quickly revisits all essential concepts related to computer networking.
APA, Harvard, Vancouver, ISO, and other styles
7

Dzinun, Hazlini, Nurul Amila Diyanah Kamarul Bharin, Norsyazwani Binti Md Nizam, Hui Ean Lim, Ahmad Danish Haikal Bin Sha’ari, and Muhammad Amjad Bin Noor Azlan. "Mollusk Shell Waste as Composite Photocatalyst for Methylene Blue Removal." In Photocatalysts - New Perspectives [Working Title]. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.109857.

Full text
Abstract:
Mollusk shell is abundant in particular areas and frequently deposited in landfills, contributing to environmental pollution. However, mollusk shell waste has been proven as an absorbent that has a high possibility of acting as a photocatalyst when integrated with metal support in composite form due to the synergistic effect. Therefore, in this study, mussel and cockle shells as agricultural wastes were selected to be innovated as support for photocatalysts. The solid-state dispersion (SSD) method was used to prepare a composite photocatalyst where mussel and cockle were integrated with titanium dioxide (TiO2) nanoparticles at a ratio of 9:1. In total, 100% of mussel and cockle were used as control samples. The prepared composite photocatalyst was evaluated with methylene blue (MB) removal in the suspension system. The result reveals that mussel/TiO2 and cockle/TiO2 composite photocatalyst show 25.92 and 24.08% for MB removal within 2 hours. It is due to the prepared composite photocatalyst particle sizes, where mussel/TiO2 and cockle/TiO2 were 259 and 268 nm, respectively. It is interesting to note that the prepared composite photocatalyst particle size should be in nanosize, where it can enhance the photocatalytic performance. Overall, agricultural waste should be utilized to ensure a clean environment for future generations.
APA, Harvard, Vancouver, ISO, and other styles
8

Pulkkis, Göran, Kaj J. Grahn, and Peik Åström. "Network Security Software." In Current Security Management & Ethical Issues of Information Technology, 1–41. IGI Global, 2003. http://dx.doi.org/10.4018/978-1-93177-743-8.ch001.

Full text
Abstract:
This chapter is a topical overview of network security software and related skills needed by network users, IT professionals, and network security specialists. Covered topics are protection against viruses and other malicious programs, firewall software, cryptographic software standards like IPSec and TLS/SSL, cryptographic network applications like Virtual Private Networks, secure Web, secure email, Secure Electronic Transaction, Secure Shell, secure network management, secure DNS and smartcard applications, as well as security administration software like intrusion detectors, port scanners, password crackers and management of network security software management. Tools and API’s for security software development are presented. A four-level network security software skill taxonomy is proposed and implications of this taxonomy on network security education is outlined. University and polytechnic level network security education is surveyed and the need for inclusion of network security software development skills in such education is pointed out.
APA, Harvard, Vancouver, ISO, and other styles
9

Pollayi, Hemaraju, Prathyusha Bandaru, and Praveena Rao. "Machine Learning-Based Approach for Modelling Soil-Structure Interaction Effects on Reinforced Concrete Structures Subjected to Earthquake Excitations." In Handbook of Research on Applied Artificial Intelligence and Robotics for Government Processes, 310–44. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5624-8.ch014.

Full text
Abstract:
In the chapter, the authors develop a machine learning (ML)-based model that has the potential to make rapid predictions for seismic responses with SSI effects and determine the seismic performance levels. The authors select several input parameters for training, validation, and testing of the present model. The present high speed and accurate data generation methods can be incorporated as a tool for safe seismic assessment and design of sustainable earthquake resistant structures. Finally, the authors will test the soil-pile model experimentally on a shake table (with strain gauges and accelerometers) when subjected to harmonic load with varying frequencies in the range 3Hz to 12Hz and base acceleration ranging from 0.05g to 0.3g. The present approach shall provide substantial information for design of piles and the response of piles subjected to earthquake excitations.
APA, Harvard, Vancouver, ISO, and other styles
10

Chalaev, Djamalutdin, and Nina Silnyagina. "DEVELOPMENT OF HIGH EFFICIENT SHELL-AND-TUBE HEAT EXCHANGERS BASED ON PROFILED TUBES." In Integration of traditional and innovation processes of development of modern science. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-021-6-42.

Full text
Abstract:
The use of advanced heat transfer surfaces (corrugated tubes of various modifications) is an effective way to intensify the heat transfer and improve the hydraulic characteristics of tubular heat exchangers. The methods for evaluating the use of such surfaces as working elements in tubular heat exchangers have not been developed so far. The thermal and hydrodynamic processes occurring in the tubes with the developed surfaces were studied to evaluate the efficiency of heat exchange therein. Thin-walled corrugated flexible stainless steel tubes of various modifications were used in experimental studies. The researches were carried out on a laboratory stand, which was designed as a heat exchanger type "tube in tube" with a corrugated inner tube. The stand was equipped with sensors to measure the thermal hydraulic flow conditions. The comparative analysis of operation modes of the heat exchanger with a corrugated inner tube of various modifications and the heat exchanger with a smooth inner tube was performed according to the obtained data. Materials and methods. A convective component of the heat transfer coefficient of corrugated tube increased significantly at identical flow conditions comparing with a smooth tube. Increasing the heat transfer coefficient was in the range of 2.0 to 2.6, and increased with increasing Reynolds number. The increase in heat transfer of specified range outstripped the gain of hydraulic resistance caused by increase of the flow. Results and discussion. CFD model in the software ANSYS CFX 14.5 was adapted to estimate the effect of the tube geometry on the intensity of the heat transfer process. A two-dimensional axially symmetric computer model was used for the calculation. The model is based on Reynolds equation (Navier-Stokes equations for turbulent flow), the continuity equation and the energy equation supplemented by the conditions of uniqueness. SST-turbulence model was used for the solution of the equations. The problem was solved in the conjugate formulation, which allowed assessing the efficiency of heat exchange, depending on various parameters (coolant temperature, coolant velocity, pressure). The criteria dependences were obtained Nu = f (Re, Pr). Conclusions. The use a corrugated tube as a working element in tubular heat exchangers can improve the heat transfer coefficient of 2.0 - 2.6 times, with an increase in hydraulic resistance in the heat exchanger of 2 times (compared with the use of smooth tubes). The criteria dependences obtained on the basis of experimental studies and mathematical modeling allow developing a methodology for engineering calculations for the design of new efficient heat exchangers with corrugated tubes.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SSH SHELL"

1

Iyappan, P., K. S. Arvind, N. Geetha, and S. Vanitha. "Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol." In 2009 Second International Conference on Emerging Trends in Engineering & Technology. IEEE, 2009. http://dx.doi.org/10.1109/icetet.2009.180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bergsma, Florian, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, and Douglas Stebila. "Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol." In CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2660267.2660286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Megalingam, Rajesh Kannan, Santosh Tantravahi, Hemanth Sai Surya Kumar Tammana, Nagasai Thokala, Hari Sudarshan Rahul Puram, and Naveen Samudrala. "Robot Operating System Integrated robot control through Secure Shell(SSH)." In 2019 3rd International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE). IEEE, 2019. http://dx.doi.org/10.1109/rdcape47089.2019.8979113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vinayakumar, R., K. P. Soman, and Prabaharan Poornachandran. "Evaluating shallow and deep networks for secure shell (ssh)traffic analysis." In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8125851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vinayakumar, R., K. P. Soman, and Prabaharan Poornachandran. "Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks." In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2017. http://dx.doi.org/10.1109/icacci.2017.8126143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Malik, Najmus Saqib, David Ko, and Harry H. Cheng. "A Secure Migration Protocol for Mobile Agent Systems." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87613.

Full text
Abstract:
This paper describes a secure migration process of mobile agents between agencies. Mobile-C is an IEEE Foundation for Intelligent Physical Agents (FIPA) standard compliant multi-agent platform for supporting C/C++ mobile and stationary agents. This secure migration process is inspired from Secure Shell (SSH). Before migration, both agencies authenticate each other using public key authentication. After successful authentication, an encrypted mobile agent is transferred and its integrity is verified. Mobile-C is specially designed for mechatronic and factory automation systems where, for correct system operations, agencies must accept mobile agents from trusted agencies. For this reason, the emphasis is on strong authentication of both agencies involved in migration process. Security aspects of other popular mobile agent systems are described briefly. A comparison study with SSH protocol is performed and future work is elaborated.
APA, Harvard, Vancouver, ISO, and other styles
7

Di Lillo, Patrizio, Luca Gaetani, Lorenzo Germoni, and Alessandro Masia. "A Comparative Creep and Creep Fatigue Analysis of an Austenitic Steam Superheater." In ASME 2014 Symposium on Elevated Temperature Application of Materials for Fossil, Nuclear, and Petrochemical Industries. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/etam2014-1020.

Full text
Abstract:
A steam superheater is a component which operates at elevated temperature in the creep regime. The component is normally not working in cycling conditions. Due to operation failures, the component has been subjected to several unplanned start-ups and shutdown. The SSH has reported a very high level of damage of the tubesheet to shell junction in field (high deformation and weld cracks). Several investigations have been performed to analyze the effect of temperature, pressure and external loads on the equipment with finite element techniques and different creep and creep-fatigue evaluation approaches: ASME III subsection NH, simplified inelastic analysis and a full creep model have been used. A comparison of the results is reported in this paper. Paper published with permission.
APA, Harvard, Vancouver, ISO, and other styles
8

Zarate, Luz, Shejun Fan, Pak Leung, Scott Schroth, Cristina Zwissler, Ruth Perry, Keith Kurrus, and Carey Nolan. "Hurricane Ida Passage Over Gulf of Mexico Oil and Gas Offshore Facilities." In Offshore Technology Conference. OTC, 2022. http://dx.doi.org/10.4043/31757-ms.

Full text
Abstract:
Abstract Hurricane Ida made landfall in Port Fourchon, Louisiana, as a Category 4 hurricane on August 29th, 2021, traveling over some offshore oil and gas facilities on its path. Shell Exploration and Production's offshore oil and gas installations in the Gulf of Mexico (GoM) have the most comprehensive suite of metocean instrumentation in the region, including wave and wind systems that captured the passage of hurricane Ida. This paper analyzes the wind and wave conditions measured by some Shell facilities located along the path of hurricane Ida. The number of LiDAR wind profilers and their spatial distribution with respect to Ida makes Shell the only operator in the Gulf of Mexico able to provide a detailed vertical wind profile at multiple locations throughout the extreme wind event. These observations, combined with satellite products such as Sea Surface Height (SSH) and Sea Surface Temperature (SST), help understand the hurricane track and intensity. Three Shell Tension Leg Platforms (TLPs) and one Semi-Submersible offshore Louisiana, measured wave data, with an overall maximum wave height of 21 m and a maximum significant wave height of 13 m. Two Shell TLPs and one Semi-Submersible measured wind profiles with maximum wind speeds of 46.82 ms−1 (91 knots, 104 mph), 43.52 ms−1 (84 knots, 97 mph), and 39.95 ms−1 (77 knots, 89 mph). Out of those three Platforms, the two sites that captured the strongest wind speeds were located right on Ida's path, where it was possible to record the wind direction shift as Hurricane Ida passed over the, and the third site was east of the track.
APA, Harvard, Vancouver, ISO, and other styles
9

Zarate, Luz, Shejun Fan, Pak Leung, Scott Schroth, Cristina Zwissler, Ruth Perry, Keith Kurrus, and Carey Nolan. "Hurricane Ida Passage Over Gulf of Mexico Oil and Gas Offshore Facilities." In Offshore Technology Conference. OTC, 2022. http://dx.doi.org/10.4043/31757-ms.

Full text
Abstract:
Abstract Hurricane Ida made landfall in Port Fourchon, Louisiana, as a Category 4 hurricane on August 29th, 2021, traveling over some offshore oil and gas facilities on its path. Shell Exploration and Production's offshore oil and gas installations in the Gulf of Mexico (GoM) have the most comprehensive suite of metocean instrumentation in the region, including wave and wind systems that captured the passage of hurricane Ida. This paper analyzes the wind and wave conditions measured by some Shell facilities located along the path of hurricane Ida. The number of LiDAR wind profilers and their spatial distribution with respect to Ida makes Shell the only operator in the Gulf of Mexico able to provide a detailed vertical wind profile at multiple locations throughout the extreme wind event. These observations, combined with satellite products such as Sea Surface Height (SSH) and Sea Surface Temperature (SST), help understand the hurricane track and intensity. Three Shell Tension Leg Platforms (TLPs) and one Semi-Submersible offshore Louisiana, measured wave data, with an overall maximum wave height of 21 m and a maximum significant wave height of 13 m. Two Shell TLPs and one Semi-Submersible measured wind profiles with maximum wind speeds of 46.82 ms−1 (91 knots, 104 mph), 43.52 ms−1 (84 knots, 97 mph), and 39.95 ms−1 (77 knots, 89 mph). Out of those three Platforms, the two sites that captured the strongest wind speeds were located right on Ida's path, where it was possible to record the wind direction shift as Hurricane Ida passed over the, and the third site was east of the track.
APA, Harvard, Vancouver, ISO, and other styles
10

A.A., Grishina, Toropova T. N., and Sapjanik V. V. "GEOLOGICAL STRUCTURE OF THE THE WESTERN PART OF THE YENISEI-KHATANGA REGIONAL TROUGH AND OIL AND GAS BEARING PROSPECTS OF THE CRETACEOUS SEDIMENTS (FOR EXAMPLE PODPIMSKI SSK)." In All-Russian Youth Scientific Conference with the Participation of Foreign Scientists Trofimuk Readings - 2021. Novosibirsk State University, 2021. http://dx.doi.org/10.25205/978-5-4437-1251-2-15-17.

Full text
Abstract:
This article is devoted to the study of the geological structure of shallow-water Cretaceous sediments of the Podpimsky SSK in the area of the junction of the Rassokhinsky megashaft and the Agapsky trough. The analysis of complex geological and geophysical information made it possible to detail the geological structure of the Podpimsky SSC, map the zones of distribution of improved reservoirs and identify promising objects in the shallow shelf zone of the Podpimsky SSC, including non-anticlinal ones.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SSH SHELL"

1

Ylonen, T. The Secure Shell (SSH) Protocol Architecture. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ylonen, T. The Secure Shell (SSH) Authentication Protocol. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ylonen, T. The Secure Shell (SSH) Connection Protocol. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Velvindron, L. Deprecating RC4 in Secure Shell (SSH). RFC Editor, April 2020. http://dx.doi.org/10.17487/rfc8758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lehtinen, S. The Secure Shell (SSH) Protocol Assigned Numbers. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4250.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ylonen, T. The Secure Shell (SSH) Transport Layer Protocol. Edited by C. Lonvick. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tatham, S., and D. Tucker. IUTF8 Terminal Mode in Secure Shell (SSH). RFC Editor, April 2017. http://dx.doi.org/10.17487/rfc8160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Galbraith, J., and P. Remaker. The Secure Shell (SSH) Session Channel Break Extension. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bellare, M., T. Kohno, and C. Namprempre. The Secure Shell (SSH) Transport Layer Encryption Modes. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Galbraith, J., and R. Thayer. The Secure Shell (SSH) Public Key File Format. RFC Editor, November 2006. http://dx.doi.org/10.17487/rfc4716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography