Search
Now showing items 1-10 of 26
Estilos digitales de estudiantes universitarios en C&T y aplicaciones didácticas de los SmartPhones en el salón de clases.
(07/22/2014)
La actividad universitaria incluye la difusión y la adquisición de datos e informaciones, diseminada en múltiples bases de datos y en las más variadas posibilidades de acceso, gracias a la Internet. La inmersión de los ...
Arquitectura multi-agente adaptativa para la detección de ataques en entornos dinámicos y distribuidos
(11/25/2010)
Las tecnologías de computación distribuidas surgieron dentro de las comunidades académicas y de investigación para satisfacer las necesidades de conexión y colaboración en estos sectores, pero poco a poco han pasado a ...
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
(05/10/2013)
This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are one of the most prevalent threats for modern databases. The proposed architecture is based on a hierarchical and distributed ...
Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach
(06/23/2010)
The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS attacks can be generated for different techniques that take advantage of points vulnerable within Web services. This paper ...
A Security Proposal Based on a Real Time Agent to Protect Web Services Against DoS Attack
(2012-07-02)
This paper describes a novel proposal based on a real time agent to detect and block denial of service attacks within web services environments. The real time agent incorporates a classification mechanism based on a Case-Base ...
SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases
(04/04/2010)
One of the main attacks on databases is the SQL injection attack which causes severe damage both in the commercial aspect and the confidence of users. This paper presents a novel strategy for detecting and preventing SQL ...
Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks
(01/01/2013)
Wireless sensor networks (WSNs) have become much more relevant in recent years, mainly because they can be used in a wide diversity of applications. Real-time locating systems (RTLSs) are one of the most promising applications ...
Temporal bounded reasoning for context-based information fusion in DoS attack detection
(07/26/2010)
Security is one of the main aspects to take into account when designing and developing web services. A meaning number of mechanisms of attack can lead to a web service system crash. As a result, the web service cannot allow ...
Mathematical model for a temporal-bounded classifier in security environments
(08/01/2012)
Security is a major concern when web applications are implemented. This has led to the proposal of a variety of specifications and approaches to provide the necessary security for these environments. SQL injection attacks ...
Multi-layer perceptrons to reduce ground reflection effect in real-time locating systems
(01/26/2012)
Nowadays, indoor Real-Time Locating Systems represent one of the most exciting applications based on Wireless Sensor Networks using wireless technologies such as Wi-Fi or ZigBee. Indoor Real-Time Locating Systems based on ...