Login / Signup

A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior.

William YurcikChao Liu
Published in: CCGRID (2005)
Keyphrases
  • identity theft
  • malicious activities
  • personal information
  • high performance computing
  • personal data
  • database
  • web documents
  • data storage