Show simple item record

dc.contributor.authorPinzón Trejos, Cristian
dc.contributor.authorDe Paz, Juan
dc.contributor.authorNavarro, Martí
dc.contributor.authorJulián, Vicente
dc.contributor.authorTapia, Dante
dc.contributor.authorBajo, Javier
dc.date.accessioned2018-06-06T19:02:13Z
dc.date.available2018-06-06T19:02:13Z
dc.date.issued2012-08-01
dc.identifierhttps://academic.oup.com/jigpal/article-abstract/20/4/712/618986
dc.identifier.issn1367-0751
dc.identifier.urihttp://ridda2.utp.ac.pa/handle/123456789/4794
dc.descriptionSecurity is a major concern when web applications are implemented. This has led to the proposal of a variety of specifications and approaches to provide the necessary security for these environments. SQL injection attacks on web applications have become one of the most important information security concerns over the past few years. The purpose of this article is to present an adaptive and intelligent mechanism that can handle SQL injection attacks taking into account a controlled time response. Our approach is based on a soft real-time classifier agent that incorporates a mixture of experts based on soft computing to choose a specific classification technique depending on the attack and the time available to solve the classification. A case study to evaluate the effectiveness of the approach and the preliminary results obtained with an initial prototype are also presented.en_US
dc.description.abstractSecurity is a major concern when web applications are implemented. This has led to the proposal of a variety of specifications and approaches to provide the necessary security for these environments. SQL injection attacks on web applications have become one of the most important information security concerns over the past few years. The purpose of this article is to present an adaptive and intelligent mechanism that can handle SQL injection attacks taking into account a controlled time response. Our approach is based on a soft real-time classifier agent that incorporates a mixture of experts based on soft computing to choose a specific classification technique depending on the attack and the time available to solve the classification. A case study to evaluate the effectiveness of the approach and the preliminary results obtained with an initial prototype are also presented.en_US
dc.language.isoenen_US
dc.rightsinfo:eu-repo/semantics/openAccessen
dc.titleMathematical model for a temporal-bounded classifier in security environmentsen_US
dc.typeArticleen_US


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record