Now 20 visitors
Today:158 Yesterday:1040
Total: 27932 199S 93P 40R
2024-11-27, Week 48
Journal Homepage
Call for Paper
Author HomePage
Paper Procedure
Paper Submission
Registration Invoice
Welcome Message
Statistics & History
Committee
Paper Archives
Outstanding Papers
Conference Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
FAQ
Member Login
Scheduler Login
Seminar
Archives Login
Sponsors


















IEEE/ICACT20220314 Question.6
Questioner: songpon.tee@mahidol.edu    2022-02-17 ¿ÀÀü 1:00:59
IEEE/ICACT20220314 Answer.6
Answer by Auhor nay.min@student.mahidol.ac.th   2022-02-17 ¿ÀÀü 1:00:59
Thank you for your presentation. Just curious, since SSH brute-force attack was included in many previous dataset, why did you decide not to include it in your dataset? Hello, thank you for asking. SSH brute-force is not omitted in our dataset as well. Actually, it went under Network Logon Bruteforce Subcategory. We attacked multiple protocols such as SSH and Telent.

Select Voice