Search
Now showing items 1-10 of 22
Arquitectura multi-agente adaptativa para la detección de ataques en entornos dinámicos y distribuidos
(11/25/2010)
Las tecnologías de computación distribuidas surgieron dentro de las comunidades académicas y de investigación para satisfacer las necesidades de conexión y colaboración en estos sectores, pero poco a poco han pasado a ...
Towards Ubiquitous Mobile Monitoring for Health-Care and Ambient Assisted Living
(01/01/2010)
In this paper, we present a framework that enables patient mobile monitoring by using biometric devices (e.g., glucometers, blood pressure meters) to send data to a mobile phone via technologies such as WiFi, NFC or ...
Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach
(06/23/2010)
The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS attacks can be generated for different techniques that take advantage of points vulnerable within Web services. This paper ...
Systematic review and comparison of modeling ETL processes in data warehouse
(08/23/2010)
Abstract:
In a Data Warehouse (DW), ETL processes (Extraction, Transformation, Load) are responsible for extracting, transforming and loading data from the data sources into the DW. A good design of these processes in the ...
SCMAS: A distributed hierarchical multi-agent architecture for blocking attacks to databases
(04/04/2010)
One of the main attacks on databases is the SQL injection attack which causes severe damage both in the commercial aspect and the confidence of users. This paper presents a novel strategy for detecting and preventing SQL ...
Temporal bounded reasoning for context-based information fusion in DoS attack detection
(07/26/2010)
Security is one of the main aspects to take into account when designing and developing web services. A meaning number of mechanisms of attack can lead to a web service system crash. As a result, the web service cannot allow ...
AIDeM: Agent-Based Intrusion Detection Mechanism
(2010-07-02)
The availability of services can be comprimised if a service request sent to the web services server hides some form of attack within its contents. This article presents AIDeM (An Agent-Based Intrusion Detection Mechanism), ...
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
(10/01/2010)
Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ...
Synthesis of optical filters using microring resonators with ultra-large FSR
(12/06/2010)
We propose a novel synthesis method for designing flexible, tunable non-periodic filters. It is based on a building block which is presented by first time for these purposes, being the poles position tuned by means of a ...
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
(06/23/2010)
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injection attacks. The agent incorporates a ...