Pattern-and Similarity-Based Realtime Risk Monitoring of SSH Brute Force Attacks with Bloom Filters

G Fahrnberger - 2024 36th Conference of Open Innovations …, 2024 - ieeexplore.ieee.org
This study explores the vulnerability of Internet-exposed services and the prevalence of
Brute Force Attacks (BFAs) as an intrusion method. It highlights the significance of anti …

Strategic Planning for Polytechnic Information Systems with an Enterprise Architecture Planning Approach

R Meilano, D Stiawan, RF Malik - Journal of Physics …, 2021 - iopscience.iop.org
Higher education institutions in implementing information systems need strategic planning,
especially for Polytechnics in Indonesia. It is intended that the application of the information …