Ingeniería en computación e informática: Recent submissions
Now showing items 81-100 of 228
-
Temporal bounded reasoning for context-based information fusion in DoS attack detection
(07/26/2010)Security is one of the main aspects to take into account when designing and developing web services. A meaning number of mechanisms of attack can lead to a web service system crash. As a result, the web service cannot allow ... -
Detecting DoS Attack in Web Services by Using an Adaptive Multiagent Solution
(07/01/2013)One of the most frequent techniques of a DoS attack is to exhaust available resources (memory, CPU cycles, and bandwidth) on the host server. A SOAP message can be affected by a DoS attack if the incoming message has been ... -
Application of pedagogical robotics in learning for children with special needs APRoLeCSNe
(08/21/2013)APRoLeCSNe is a project that presents the approach of pedagogical robotics to support the learning methods for children with special learning needs (CSLN). Pedagogical Robotics focuses on inductive learning and guided ... -
Automatización de bajo costo utilizada en la producción agrícola en invernaderos y huertos caseros
(07/29/2015)Actualmente existen en el mercado productos comerciales para la automatización de invernaderos y huertos. Sin embargo, dichas tecnologías son costosas y son utilizadas en estructuras para la producción agrícola a gran ... -
An Attack Detection Mechanism Based on a Distributed Hierarchical Multi-agent Architecture for Protecting Databases
(2009-07-01)This paper presents an innovative approach to detect and classify SQL injection attacks. The existing approaches are centralized while this proposal is based on a distributed hierarchical architecture to provide a robust ... -
SiC: An agent based architecture for preventing and detecting attacks to ubiquitous databases
(2009-07-01)One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC ... -
Unsupervised Visualization of SQL Attacks by Means of the SCMAS Architecture
(2010-07-02)This paper presents an improvement of the SCMAS architecture aimed at securing SQL-run databases. The main goal of such architecture is the detection and prevention of SQL injection attacks. The improvement consists in the ... -
A Security Proposal Based on a Real Time Agent to Protect Web Services Against DoS Attack
(2012-07-02)This paper describes a novel proposal based on a real time agent to detect and block denial of service attacks within web services environments. The real time agent incorporates a classification mechanism based on a Case-Base ... -
Arquitectura multi-agente adaptativa para la detección de ataques en entornos dinámicos y distribuidos
(11/25/2010)Las tecnologías de computación distribuidas surgieron dentro de las comunidades académicas y de investigación para satisfacer las necesidades de conexión y colaboración en estos sectores, pero poco a poco han pasado a ... -
Multi-layer perceptrons to reduce ground reflection effect in real-time locating systems
(01/26/2012)Nowadays, indoor Real-Time Locating Systems represent one of the most exciting applications based on Wireless Sensor Networks using wireless technologies such as Wi-Fi or ZigBee. Indoor Real-Time Locating Systems based on ... -
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages
(2009-07-01)A SOAP message can be affected by a DoS attack if the incoming message has been either created or modified maliciously. The specifications of existing security standards do not focus on this type of attack. This article ... -
AIDeM: Agent-Based Intrusion Detection Mechanism
(2010-07-02)The availability of services can be comprimised if a service request sent to the web services server hides some form of attack within its contents. This article presents AIDeM (An Agent-Based Intrusion Detection Mechanism), ... -
Applying a service-oriented approach for developing a distributed multi-agent system for healthcare
(01/01/2010)This paper presents a service-oriented architecture that allows a more efficient distribution of resources and functionalities. The architecture has been used to develop a multi-agent system aimed at enhancing the assistance ... -
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Querie
(2010-07-02)SQL injections consist in inserting keywords and special symbols in the parameters of SQL queries to gain illegitimate access to a database. They are usually identified by analyzing the input parameters and removing the ... -
Estilos digitales de estudiantes universitarios en C&T y aplicaciones didácticas de los SmartPhones en el salón de clases.
(07/22/2014)La actividad universitaria incluye la difusión y la adquisición de datos e informaciones, diseminada en múltiples bases de datos y en las más variadas posibilidades de acceso, gracias a la Internet. La inmersión de los ... -
Mathematical model for a temporal-bounded classifier in security environments
(08/01/2012)Security is a major concern when web applications are implemented. This has led to the proposal of a variety of specifications and approaches to provide the necessary security for these environments. SQL injection attacks ... -
Irrigation system through intelligent agents implemented with arduino technology
(2018-07-05)The water has become in recent years a valuable and increasingly scarce. Its proper use in agriculture has demanded incorporate new technologies, mainly in the area of ICT. In this paper we present a smart irrigation system ... -
Management Ubiquitous of Messages and Documents Organizational through Intelligent Agents
(2009-07-01)In the context of artificial intelligence, the multiagent systems are an alternative solution to address complex problems and distributed. PAINALLI is an multi-agent architecture for managing messages and documents ... -
A Multiagent Solution to Adaptively Classify SOAP Message and Protect against DoS Attack
(11/09/2009)SOAP messages use XML code, which makes them vulnerable to denial of service (DoS) attacks and puts the availability of web services at risk. This article presents an adaptive solution for dealing with DoS attacks in web ... -
Classification Agent-Based Techniques for Detecting Intrusions in Databases
(09/24/2008)This paper presents an agent specially designed for the prevention and detection of SQL injection at the database layer of an application. The agent incorporates a Case-based reasoning mechanism whose main characteristic ...