Analyzing the Attack Pattern of Brute Force Attack on SSH Port

A Subhan, YN Kunang, IZ Yadi - … International Conference on …, 2023 - ieeexplore.ieee.org
Cyberattacks are one of the threats in the world of technology. Various kinds of cyberattacks
can be a threat to information security. One example of a cyberattack is a brute force attack …

Identification of Human Movement Through a Novel Machine Learning Approach

N Fahad, A Sen, SS Jisha, S Ahmad… - 2023 Innovations in …, 2023 - ieeexplore.ieee.org
This study aims to identify human movement activities using machine learning, focusing on a
novel ensemble approach. The objectives are twofold: to apply a new machine learning …

Evaluating the Role of Secure Shell (SSH) in Securing Wireless Networks

SK Jangid, R Saini, R Kumar… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Cozy Shell (SSH) is an essential device for securing wireless networks. SSH is a cozy
protocol that provides relaxed authentication, records confidentiality, and integrity for Wi-Fi …

Enhancing Security and Privacy in Cloud–Based Healthcare Data Through Machine Learning

A Shukla, HS Pokhariya, J Michaelson… - … for Innovations in …, 2023 - ieeexplore.ieee.org
It is becoming more and more important for healthcare providers to protect the integrity and
security of sensitive medical data as they use cloud computing for data processing and …