Login / Signup
A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior.
William Yurcik
Chao Liu
Published in:
CCGRID (2005)
Keyphrases
</>
identity theft
malicious activities
personal information
high performance computing
personal data
database
web documents
data storage