Now showing items 11-16 of 16
Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks
Wireless sensor networks (WSNs) have become much more relevant in recent years, mainly because they can be used in a wide diversity of applications. Real-time locating systems (RTLSs) are one of the most promising applications ...
Temporal bounded reasoning for context-based information fusion in DoS attack detection
Security is one of the main aspects to take into account when designing and developing web services. A meaning number of mechanisms of attack can lead to a web service system crash. As a result, the web service cannot allow ...
A Multiagent Solution to Adaptively Classify SOAP Message and Protect against DoS Attack
SOAP messages use XML code, which makes them vulnerable to denial of service (DoS) attacks and puts the availability of web services at risk. This article presents an adaptive solution for dealing with DoS attacks in web ...
An Adaptive Mechanism to Protect Databases against SQL Injection
The purpose of this article is to present an adaptive and intelligent mechanism that can handle SQL injection attacks. This proposal focuses on integrating a case-based reasoning (CBR) mechanism with a neural network. The ...
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages
A SOAP message can be affected by a DoS attack if the incoming message has been either created or modified maliciously. The specifications of existing security standards do not focus on this type of attack. This article ...
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Querie
SQL injections consist in inserting keywords and special symbols in the parameters of SQL queries to gain illegitimate access to a database. They are usually identified by analyzing the input parameters and removing the ...