Search
Now showing items 11-20 of 35
Mathematical model for a temporal-bounded classifier in security environments
(08/01/2012)
Security is a major concern when web applications are implemented. This has led to the proposal of a variety of specifications and approaches to provide the necessary security for these environments. SQL injection attacks ...
Multi-layer perceptrons to reduce ground reflection effect in real-time locating systems
(01/26/2012)
Nowadays, indoor Real-Time Locating Systems represent one of the most exciting applications based on Wireless Sensor Networks using wireless technologies such as Wi-Fi or ZigBee. Indoor Real-Time Locating Systems based on ...
An Attack Detection Mechanism Based on a Distributed Hierarchical Multi-agent Architecture for Protecting Databases
(2009-07-01)
This paper presents an innovative approach to detect and classify SQL injection attacks. The existing approaches are centralized while this proposal is based on a distributed hierarchical architecture to provide a robust ...
AIDeM: Agent-Based Intrusion Detection Mechanism
(2010-07-02)
The availability of services can be comprimised if a service request sent to the web services server hides some form of attack within its contents. This article presents AIDeM (An Agent-Based Intrusion Detection Mechanism), ...
Application of pedagogical robotics in learning for children with special needs APRoLeCSNe
(08/21/2013)
APRoLeCSNe is a project that presents the approach of pedagogical robotics to support the learning methods for children with special learning needs (CSLN). Pedagogical Robotics focuses on inductive learning and guided ...
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
(10/01/2010)
Security is a major concern when service environments are implemented. This has led to the proposal of a variety of specifications and proposals based on soft computing methods to provide the necessary security for these ...
SiC: An agent based architecture for preventing and detecting attacks to ubiquitous databases
(2009-07-01)
One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC ...
Arquitectura de un Sistema Multiagente para la Clasificación de Consultas con Inyección SQL
(2015-07-01)
En este artículo se presenta una arquitectura multiagente para la clasificación de consultas con inyección SQL en aplicaciones Web. La arquitectura integra la clasificación de consultas SQL, la monitorización de las acciones ...
Detecting DoS Attack in Web Services by Using an Adaptive Multiagent Solution
(07/01/2013)
One of the most frequent techniques of a DoS attack is to exhaust available resources (memory, CPU cycles, and bandwidth) on the host server. A SOAP message can be affected by a DoS attack if the incoming message has been ...
A Multiagent Solution to Adaptively Classify SOAP Message and Protect against DoS Attack
(11/09/2009)
SOAP messages use XML code, which makes them vulnerable to denial of service (DoS) attacks and puts the availability of web services at risk. This article presents an adaptive solution for dealing with DoS attacks in web ...