Search
Now showing items 1-5 of 5
Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks
(01/01/2013)
Wireless sensor networks (WSNs) have become much more relevant in recent years, mainly because they can be used in a wide diversity of applications. Real-time locating systems (RTLSs) are one of the most promising applications ...
Temporal bounded reasoning for context-based information fusion in DoS attack detection
(07/26/2010)
Security is one of the main aspects to take into account when designing and developing web services. A meaning number of mechanisms of attack can lead to a web service system crash. As a result, the web service cannot allow ...
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
(06/23/2010)
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injection attacks. The agent incorporates a ...
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Querie
(2010-07-02)
SQL injections consist in inserting keywords and special symbols in the parameters of SQL queries to gain illegitimate access to a database. They are usually identified by analyzing the input parameters and removing the ...
An Adaptive Mechanism to Protect Databases against SQL Injection
(2015-07-01)
The purpose of this article is to present an adaptive and intelligent mechanism that can handle SQL injection attacks. This proposal focuses on integrating a case-based reasoning (CBR) mechanism with a neural network. The ...