• Non ci sono risultati.

[3] T. Ylonen, C. Lonvick, “The Secure Shell (SSH) Authentication Protocol”, RFC 4252, IETF, Jan. 2006.

N/A
N/A
Protected

Academic year: 2021

Condividi "[3] T. Ylonen, C. Lonvick, “The Secure Shell (SSH) Authentication Protocol”, RFC 4252, IETF, Jan. 2006."

Copied!
2
0
0

Testo completo

(1)

Bibliografia

[1] T. Ylonen and C. Lonvick, “The Secure Shell (SSH) Protocol Architecture”, RFC 4251, IETF, Jan. 2006.

[2] T. Ylonen and C. Lonvick, “The Secure Shell (SSH) Transport Layer Protocol”, RFC 4253, IETF, Jan. 2006.

[3] T. Ylonen, C. Lonvick, “The Secure Shell (SSH) Authentication Protocol”, RFC 4252, IETF, Jan. 2006.

[4] T. Ylonen and C. Lonvick, “The Secure Shell (SSH) Connection Protocol”, RFC 4254, IETF, Jan. 2006.

[5] A. Webb, “Statistical Pattern Recognition”, 2nd Edition, Wiley, 2002, ISBN 0- 470-84514-7.

[6] R. O. Duda, P. E. Hart, D.G. Stork, “Pattern classification (2

nd

Edition)”, Wiley- Interscience, New York, 1999.

[7] C.J.C. Burges , “A tutorial on Support Vector Machines for Pattern Recognition”, Boston, 1998.

[8] F. Gringoli, “sshgate”, http://sourceforge.net/projects/sshgate [9] M. Dusi, A. Este, F. Gringoli, L. Salgarelli, “Using GMM and SVM- based Techniques for the Classification of SSH-Encrypted Traffic”, IEEE 44th International Conference on Communication (ICC'09), Dresda (Germany), 14-18 Jun. 2009.

[10] OpenSSH, http://www.openssh.org [11] Tcp Statistic and Analysis Tool (TSTAT), http://tstat.tlc.polito.it [12] Pattern Classification Program (PCP), http://pcp.sourceforge.net/

[13] A Library for Support Vector Machines (LIBSVM), http://www.csie.ntu.edu.tw/~cjlin/libsvm/

99

(2)

100

Riferimenti

Documenti correlati

Una buona parte degli uccelli appartenenti a queste due famiglie (in totale 41 esemplari) provengono dalle spedizioni del Beccari negli anni 1871-1875 in Nuova Guinea e Papuasia,

 Write your answers in the special answer booklet.  In your calculations, please write only the essential steps in the answer booklet.  Always give the appropriate units

Example V.1. Figure 3 illustrates an example of a portfolio graph, obtained by extending the portfolio in Figure 1. For concreteness and simplicity, sensitivity labels are

quarziti (Verrucano) e calcari dolomitici cristallini di età Triassica-Liassica. Questi sono intensamente termometamorfosati ed intrusi da dicchi aplitici collegati al monzogranito

Observed and expected upper limits are calculated using the numbers of observed and expected events, the estimated number of background events (see Table III ), the luminosity of

Section: Selected Issues in Multilingualism room Chair: Section: Competence in Intercultural Communication room Chair: Section: Varia room Chair: 13:30 – 14:00

Assessment of recent social attitudes in Japan: a latent class item response theory model for web survey data.. Miki Nakai, and

[r]