Now 573 visitors
Today:1490 Yesterday:1497
Total: 2581 401S 106P 78R
2025-12-24, Week 52
Member Login
Welcome Message
Statistics
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration / Invoice
Paper Archives
Outstanding Papers
Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors
























IEEE/ICACT20220314 Question.6
Questioner: songpon.tee@mahidol.edu    2022-02-17 ¿ÀÀü 1:00:59
IEEE/ICACT20220314 Answer.6
Answer by Auhor nay.min@student.mahidol.ac.th   2022-02-17 ¿ÀÀü 1:00:59
Thank you for your presentation. Just curious, since SSH brute-force attack was included in many previous dataset, why did you decide not to include it in your dataset? Hello, thank you for asking. SSH brute-force is not omitted in our dataset as well. Actually, it went under Network Logon Bruteforce Subcategory. We attacked multiple protocols such as SSH and Telent.

Select Voice