{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T06:40:24Z","timestamp":1734936024465,"version":"3.32.0"},"reference-count":29,"publisher":"Informa UK Limited","issue":"1","funder":[{"name":"no fund"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2025,1,2]]},"DOI":"10.1080\/19393555.2024.2357317","type":"journal-article","created":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T19:32:46Z","timestamp":1716492766000},"page":"50-62","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["SSHAA: A Python Package Index for visualizing features of SSH attacks with text mining in classification"],"prefix":"10.1080","volume":"34","author":[{"given":"Yuki","family":"Nakamura","sequence":"first","affiliation":[{"name":"Faculty of Data Science, Musashino University, Tokyo, Japan"}]},{"given":"Tsukasa","family":"Fukuda","sequence":"additional","affiliation":[]},{"given":"Xuanzhou","family":"Yang","sequence":"additional","affiliation":[{"name":"Faculty of Data Science, Musashino University, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1826-742X","authenticated-orcid":false,"given":"Yoshiyasu","family":"Takefuji","sequence":"additional","affiliation":[{"name":"Faculty of Data Science, Musashino University, Tokyo, Japan"}]}],"member":"301","published-online":{"date-parts":[[2024,5,23]]},"reference":[{"key":"e_1_3_2_2_1","unstructured":"Abhishek P. (2020). Linux runs on all of the top 500 supercomputers again! https:\/\/itsfoss.com\/linux-runs-top-supercomputers\/"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3247222"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21248206"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3104148"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph192315618"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3222488"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23115298"},{"key":"e_1_3_2_9_1","unstructured":"BBC. (2021). New Zealand stock exchange halted by cyber-attack. https:\/\/www.bbc.com\/news\/53918580"},{"key":"e_1_3_2_10_1","unstructured":"Canon. (2020). The reality of DDoS attacks is becoming more sophisticated and evolving. https:\/\/eset-info.canon-its.jp\/malware_info\/special\/detail\/200618.html."},{"key":"e_1_3_2_11_1","unstructured":"CyberSecurity. (2021). Damage cases caused by cyber-attacks (crimes) and malware. https:\/\/cybersecurity-jp.com\/column\/14634"},{"key":"e_1_3_2_12_1","unstructured":"denyhosts. (2022). denyhosts https:\/\/github.com\/denyhosts\/denyhosts"},{"key":"e_1_3_2_13_1","unstructured":"fail2ban. (2022). fail2ban. https:\/\/github.com\/fail2ban\/fail2ban"},{"key":"e_1_3_2_14_1","unstructured":"Google. (2022). google-authenticator\u2013libpam. https:\/\/github.com\/google\/google-authenticator-libpam"},{"key":"e_1_3_2_15_1","unstructured":"Hayato A. (2021). What is a DDoS attack? Explanation of the purpose and types of attacks actual examples and countermeasures. https:\/\/business.ntt-east.co.jp\/content\/cloudsolution\/column-185.html#section-02"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23042028"},{"key":"e_1_3_2_17_1","unstructured":"Nick G. (2021). Best cloud hosting providers for 2021. https:\/\/hostingtribunal.com\/best\/cloud-hosting-providers\/"},{"key":"e_1_3_2_18_1","unstructured":"Nik H. (2021). How many websites are there in theWorld?. https:\/\/siteefy.com\/how-many-websites-are-there\/"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23136067"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-021-00263-0"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2022.108771"},{"key":"e_1_3_2_23_1","unstructured":"Shizuka K. (2021). Total number of ransomware attacks declines but damage per attack rises due to maliciousness. https:\/\/cloud.watch.impress.co.jp\/docs\/news\/1240532.html"},{"key":"e_1_3_2_24_1","unstructured":"Solnichkin A. (2019). Geolocating SSH hackers in real-time. https:\/\/medium.com\/schkn\/geolocating-SSH-hackers-in-real-time-108cbc3b5665"},{"key":"e_1_3_2_25_1","unstructured":"Stephanie H. (2021). Hamilton youth arrested in alleged $46 million crypto theft following joint probe with FBI. https:\/\/financialpost.com\/fp-finance\/cr yptocurrency\/hamilton-youth-arrested-in-alleged-46-million-crypto-theft-following-joint-probe-with-fbi."},{"key":"e_1_3_2_26_1","unstructured":"Steven J. (2015). Can the internet exist without Linux? https:\/\/www.zdnet.com\/article\/can-the-internet-exist-without-linux\/"},{"key":"e_1_3_2_27_1","unstructured":"Tatu Y. (2017). Security management -Five SSH Facts. https:\/\/www.asisonline.org\/security-management-magazine\/articles\/2017\/03\/five-SSH-facts\/"},{"key":"e_1_3_2_28_1","unstructured":"Techplus. (2021). 91% of the top 1000 sites use HTTPS as their default protocol. https:\/\/news.mynavi.jp\/techplus\/article\/20210205-1689131\/"},{"key":"e_1_3_2_29_1","unstructured":"Veracode. (2022). Protection against spoofing attack. IP DNS & ARP. https:\/\/www.veracode.com\/security\/spoofing-attack"},{"key":"e_1_3_2_30_1","unstructured":"Wappalyzer. (2022). Web services. https:\/\/www.wappalyzer.com\/technologies\/web-servers\\"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23062974"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2024.2357317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T06:14:40Z","timestamp":1734934480000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2024.2357317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,23]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,2]]}},"alternative-id":["10.1080\/19393555.2024.2357317"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2024.2357317","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2024,5,23]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-05-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}