1. Ylönen, T.: SSH-secure login connections over the Internet. In: Proceedings of the 6th USENIX Security Symposium (1996)
2. Dusi, M., Gringoli, F., Salgarelli, L.: A preliminary look at the privacy of SSH tunnels. In: Proceedings of the 17th International Conference on Computer Communications and Networks, August 2008
3. Owens, J., Mathews, J.: A study of passwords and methods in brute-force SSH attacks. In: USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), (2008)
4. Raikar, M.M., Meena, S.M.: SSH brute force attack mitigation in internet of things (IoT) network: an edge device security measure. In: 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) (2021)
5. Wanjau, S.K., Wambugu, G.M., Gabriel, N.K.: SSH-brute force attack detection model based on deep learning. Int. J. Comput. Appl. Technol. Res. 10, 42–50 (2021)