Ingeniería en computación e informática: Recent submissions
Now showing items 101-120 of 228
-
A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode
(2009-07-01)This paper presents a distributed hierarchical multiagent architecture for detecting SQL injection attacks against databases. It uses a novel strategy, which is supported by a Case-Based Reasoning mechanism, which provides ... -
Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach
(06/23/2010)The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS attacks can be generated for different techniques that take advantage of points vulnerable within Web services. This paper ... -
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
(10/01/2010)Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ... -
A hybrid agent-based classification mechanism to detect denial of service attacks
(09/03/2009)This paper presents the core component of a solution based on agent technology specifically adapted for the classification of SOAP messages. The messages can carry out attacks that target the applications providing Web ... -
Improving the security level of the FUSION@ multi-agent architecture
(06/06/2012)The use of architectures based on services and multi-agent systems has become an increasingly important part of the solution set used for the development of distributed systems. Nevertheless, these models pose a variety ... -
SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases
(04/04/2010)One of the main attacks on databases is the SQL injection attack which causes severe damage both in the commercial aspect and the confidence of users. This paper presents a novel strategy for detecting and preventing SQL ... -
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
(06/23/2010)One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injection attacks. The agent incorporates a ... -
AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for detecting SQL Injection attacks
(08/23/2010)SQL Injection attacks on web applications have become one of the most important information security concerns over the past few years. This paper presents a hybrid approach based on the Adaptive Intelligent Intrusion ... -
Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks
(01/01/2013)Wireless sensor networks (WSNs) have become much more relevant in recent years, mainly because they can be used in a wide diversity of applications. Real-time locating systems (RTLSs) are one of the most promising applications ... -
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
(05/10/2013)This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are one of the most prevalent threats for modern databases. The proposed architecture is based on a hierarchical and distributed ... -
S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments
(05/01/2011)During the last years the use of Web Service-based applications has notably increased. However, the security has not evolved proportionally, which makes these applications vulnerable and objective of attacks. One of the ... -
Context Cookies
(09/03/2008)In an ambient intelligence world, devices work in order to support people carrying out their everyday life activities in a natural way. Therefore, it is necessary to know the entities in the environment and to consider new ... -
Enabling NFC technology to public services
(1997-07-01)Ambient Intelligent are usually emerged in contexts like health, education, business and so on. However there are not many researches focusing on social aspects as public administrations. In these kinds of contexts, some ... -
From implicit to touching interaction by identification technologies: Towards tagging context
(07/19/2009)Intelligent environments need interactions capable of detecting users and providing them with good-quality contextual information. In this sense we adapt technologies, identifying and locating people for supporting their ... -
Mobile system for medical control of chronic diseases through intelligent devices
(12/12/2012)The ageing of the population is a factor that in the future will increase the percentage of dependent people, given that there is a close relationship between dependence and age. When patients are in a health care environment, ... -
A Systematic Review for Mobile Monitoring Solutions in M-Health
(2016-09)A systematic review allows us to identify, assess, and interpret all possible relevant work associated with a question in particular or the subject of an area. Different authors can use several methodologies to learn about ... -
PIViTa: Taxonomy for Displaying Information in Pervasive and Collaborative Environments
(2009-07-01)In the years ahead, there are increasing demands for ubiquitous and continuous access to information and interactive devices embedded into a physical context are proliferated. Users need support for getting required ... -
Supporting clinical information management by NFC technology
(2009-07-01)Tele-monitorization is a problem with aging people living alone since the vital signs control is complicated for them. In this sense, some initiatives by adapting technologies make easy these controls. In this work we ... -
Mobile Monitoring Framework to Design Parameterized and Personalized m-Health Applications According to the Patient’s Diseases
(10/01/2015)The development of personalized mobile monitoring applications is a complex work. Currently, the most of applications for patients monitoring through mobile devices, is not developed considering the particular characteristics ... -
Efecto del estrés hídrico a distintas temperaturas sobre la germinación de semillas de Bulnesia retama (Gill. ex. Hook.) Griseb. -Zigofiláceas - en San Luis, Argentina
(07/12/2007)Se estudió la germinación de semillas de Bulnesia retama frente a condiciones de estrés hídrico, simulado con PEG6000 a distintas temperaturas, y su recuperación ante el estrés. Las semillas recolectadas en San Luis ...