Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Telnet

 
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Steve Vinoski has been busy trying to convince the world at large that RPC is " fundamentally flawed ". I think it is interesting… Expand
Is this relevant?
2010
2010
Man-In-The-Middle (MITM) attack is one of the primary techniques employed in computer based hacking. MITM attack can successfully… Expand
  • figure I
  • figure 6
  • figure 5
Is this relevant?
2008
2008
In its Top-20 Security Risks report for 2007, the SANS Institute called brute-force password guessing attacks against SSH, FTP… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • table 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this paper we present new modeling and analysis technique for characterizing the steady state performance of a TCP flow. We… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Intruders on the Internet often prefer to launch network intrusions indirectly, i.e., using a chain of hosts on the Internet as… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2000
2000
ERIC CLEARINGHOUSE ON LANGUAGES AND LINGUISTICS • CENTER FOR APPLIED LINGUISTICS • 4646 40TH ST NW • WASHINGTON DC 20016-1859… Expand
Is this relevant?
1998
1998
An improved override and hold-down mechanism for use with a reflex camera of the type incorporating a four bar linkage for… Expand
  • table 2.1
  • figure 2-1
  • table 2.2
  • figure 2-2
  • figure 2-4
Is this relevant?
Highly Cited
1997
Highly Cited
1997
A MUD (Multi-User Dungeon or, sometimes, Multi-User Dimension) is a network-accessible, multi-participant, user-extensible… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
1997
1997
Electronic mail has become the unexciting and mundane electronic communication medium we love to hate. It wasn’t always that way… Expand
Is this relevant?
Highly Cited
1994
Highly Cited
1994
We analyze 2.5 million TCP connections that occurred during 14 wide-area traffic traces. The traces were gathered at five “stub… Expand
  • table 2
  • table 1
  • table 3
  • table 4
  • table 5
Is this relevant?