Investigación: Recent submissions
Now showing items 221-240 of 499
-
Estilos digitales de estudiantes universitarios en C&T y aplicaciones didácticas de los SmartPhones en el salón de clases.
(07/22/2014)La actividad universitaria incluye la difusión y la adquisición de datos e informaciones, diseminada en múltiples bases de datos y en las más variadas posibilidades de acceso, gracias a la Internet. La inmersión de los ... -
Mathematical model for a temporal-bounded classifier in security environments
(08/01/2012)Security is a major concern when web applications are implemented. This has led to the proposal of a variety of specifications and approaches to provide the necessary security for these environments. SQL injection attacks ... -
Irrigation system through intelligent agents implemented with arduino technology
(2018-07-05)The water has become in recent years a valuable and increasingly scarce. Its proper use in agriculture has demanded incorporate new technologies, mainly in the area of ICT. In this paper we present a smart irrigation system ... -
Management Ubiquitous of Messages and Documents Organizational through Intelligent Agents
(2009-07-01)In the context of artificial intelligence, the multiagent systems are an alternative solution to address complex problems and distributed. PAINALLI is an multi-agent architecture for managing messages and documents ... -
A Multiagent Solution to Adaptively Classify SOAP Message and Protect against DoS Attack
(11/09/2009)SOAP messages use XML code, which makes them vulnerable to denial of service (DoS) attacks and puts the availability of web services at risk. This article presents an adaptive solution for dealing with DoS attacks in web ... -
Classification Agent-Based Techniques for Detecting Intrusions in Databases
(09/24/2008)This paper presents an agent specially designed for the prevention and detection of SQL injection at the database layer of an application. The agent incorporates a Case-based reasoning mechanism whose main characteristic ... -
A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode
(2009-07-01)This paper presents a distributed hierarchical multiagent architecture for detecting SQL injection attacks against databases. It uses a novel strategy, which is supported by a Case-Based Reasoning mechanism, which provides ... -
Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach
(06/23/2010)The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS attacks can be generated for different techniques that take advantage of points vulnerable within Web services. This paper ... -
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
(10/01/2010)Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ... -
A hybrid agent-based classification mechanism to detect denial of service attacks
(09/03/2009)This paper presents the core component of a solution based on agent technology specifically adapted for the classification of SOAP messages. The messages can carry out attacks that target the applications providing Web ... -
Improving the security level of the FUSION@ multi-agent architecture
(06/06/2012)The use of architectures based on services and multi-agent systems has become an increasingly important part of the solution set used for the development of distributed systems. Nevertheless, these models pose a variety ... -
SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases
(04/04/2010)One of the main attacks on databases is the SQL injection attack which causes severe damage both in the commercial aspect and the confidence of users. This paper presents a novel strategy for detecting and preventing SQL ... -
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
(06/23/2010)One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injection attacks. The agent incorporates a ... -
AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for detecting SQL Injection attacks
(08/23/2010)SQL Injection attacks on web applications have become one of the most important information security concerns over the past few years. This paper presents a hybrid approach based on the Adaptive Intelligent Intrusion ... -
Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks
(01/01/2013)Wireless sensor networks (WSNs) have become much more relevant in recent years, mainly because they can be used in a wide diversity of applications. Real-time locating systems (RTLSs) are one of the most promising applications ... -
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
(05/10/2013)This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are one of the most prevalent threats for modern databases. The proposed architecture is based on a hierarchical and distributed ... -
S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments
(05/01/2011)During the last years the use of Web Service-based applications has notably increased. However, the security has not evolved proportionally, which makes these applications vulnerable and objective of attacks. One of the ... -
Context Cookies
(09/03/2008)In an ambient intelligence world, devices work in order to support people carrying out their everyday life activities in a natural way. Therefore, it is necessary to know the entities in the environment and to consider new ... -
Enabling NFC technology to public services
(1997-07-01)Ambient Intelligent are usually emerged in contexts like health, education, business and so on. However there are not many researches focusing on social aspects as public administrations. In these kinds of contexts, some ... -
From implicit to touching interaction by identification technologies: Towards tagging context
(07/19/2009)Intelligent environments need interactions capable of detecting users and providing them with good-quality contextual information. In this sense we adapt technologies, identifying and locating people for supporting their ...