Investigación: Envíos recientes
Mostrando ítems 201-220 de 498
-
Multi-sensor system using plastic optical fibers for intrinsically safe level measurements
(10/04/2004)A system for measuring liquid level in multiple tanks using optical fiber technology has been developed. Oil field service industry or any sector requiring liquid level measurements in flammable atmospheres can be benefited ... -
Arquitectura de un Sistema Multiagente para la Clasificación de Consultas con Inyección SQL
(2015-07-01)En este artículo se presenta una arquitectura multiagente para la clasificación de consultas con inyección SQL en aplicaciones Web. La arquitectura integra la clasificación de consultas SQL, la monitorización de las acciones ... -
An Adaptive Mechanism to Protect Databases against SQL Injection
(2015-07-01)The purpose of this article is to present an adaptive and intelligent mechanism that can handle SQL injection attacks. This proposal focuses on integrating a case-based reasoning (CBR) mechanism with a neural network. The ... -
A Solution CBR Agent-Based to Classify SOAP Message within SOA Environments
(06/10/2010)This paper presents the core component of a solution based on agent technology specifically adapted for the classification of SOA messages. These messages can carry out attacks that target the applications providing Web ... -
Improving the Language Active Learning with Multiagent Systems
(09/23/2009)Nowadays, there is a growing need for providing novel solutions to facilitate active learning in dependency environments. This paper present a multiagent architecture that incorporates agents specifically designed to provide ... -
Temporal bounded reasoning for context-based information fusion in DoS attack detection
(07/26/2010)Security is one of the main aspects to take into account when designing and developing web services. A meaning number of mechanisms of attack can lead to a web service system crash. As a result, the web service cannot allow ... -
Detecting DoS Attack in Web Services by Using an Adaptive Multiagent Solution
(07/01/2013)One of the most frequent techniques of a DoS attack is to exhaust available resources (memory, CPU cycles, and bandwidth) on the host server. A SOAP message can be affected by a DoS attack if the incoming message has been ... -
Application of pedagogical robotics in learning for children with special needs APRoLeCSNe
(08/21/2013)APRoLeCSNe is a project that presents the approach of pedagogical robotics to support the learning methods for children with special learning needs (CSLN). Pedagogical Robotics focuses on inductive learning and guided ... -
Automatización de bajo costo utilizada en la producción agrícola en invernaderos y huertos caseros
(07/29/2015)Actualmente existen en el mercado productos comerciales para la automatización de invernaderos y huertos. Sin embargo, dichas tecnologías son costosas y son utilizadas en estructuras para la producción agrícola a gran ... -
An Attack Detection Mechanism Based on a Distributed Hierarchical Multi-agent Architecture for Protecting Databases
(2009-07-01)This paper presents an innovative approach to detect and classify SQL injection attacks. The existing approaches are centralized while this proposal is based on a distributed hierarchical architecture to provide a robust ... -
SiC: An agent based architecture for preventing and detecting attacks to ubiquitous databases
(2009-07-01)One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC ... -
Unsupervised Visualization of SQL Attacks by Means of the SCMAS Architecture
(2010-07-02)This paper presents an improvement of the SCMAS architecture aimed at securing SQL-run databases. The main goal of such architecture is the detection and prevention of SQL injection attacks. The improvement consists in the ... -
A Security Proposal Based on a Real Time Agent to Protect Web Services Against DoS Attack
(2012-07-02)This paper describes a novel proposal based on a real time agent to detect and block denial of service attacks within web services environments. The real time agent incorporates a classification mechanism based on a Case-Base ... -
Arquitectura multi-agente adaptativa para la detección de ataques en entornos dinámicos y distribuidos
(11/25/2010)Las tecnologías de computación distribuidas surgieron dentro de las comunidades académicas y de investigación para satisfacer las necesidades de conexión y colaboración en estos sectores, pero poco a poco han pasado a ... -
Multi-layer perceptrons to reduce ground reflection effect in real-time locating systems
(01/26/2012)Nowadays, indoor Real-Time Locating Systems represent one of the most exciting applications based on Wireless Sensor Networks using wireless technologies such as Wi-Fi or ZigBee. Indoor Real-Time Locating Systems based on ... -
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages
(2009-07-01)A SOAP message can be affected by a DoS attack if the incoming message has been either created or modified maliciously. The specifications of existing security standards do not focus on this type of attack. This article ... -
AIDeM: Agent-Based Intrusion Detection Mechanism
(2010-07-02)The availability of services can be comprimised if a service request sent to the web services server hides some form of attack within its contents. This article presents AIDeM (An Agent-Based Intrusion Detection Mechanism), ... -
Applying a service-oriented approach for developing a distributed multi-agent system for healthcare
(01/01/2010)This paper presents a service-oriented architecture that allows a more efficient distribution of resources and functionalities. The architecture has been used to develop a multi-agent system aimed at enhancing the assistance ... -
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Querie
(2010-07-02)SQL injections consist in inserting keywords and special symbols in the parameters of SQL queries to gain illegitimate access to a database. They are usually identified by analyzing the input parameters and removing the ... -
Estilos digitales de estudiantes universitarios en C&T y aplicaciones didácticas de los SmartPhones en el salón de clases.
(07/22/2014)La actividad universitaria incluye la difusión y la adquisición de datos e informaciones, diseminada en múltiples bases de datos y en las más variadas posibilidades de acceso, gracias a la Internet. La inmersión de los ...