SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

[1]  Cristian Pinzón,et al.  Classification Agent-Based Techniques for Detecting Intrusions in Databases , 2008, HAIS.

[2]  Beatrice Gralton,et al.  Washington DC - USA , 2008 .

[3]  Javier Bajo,et al.  GerAmi: Improving Healthcare Delivery in Geriatric Residences , 2008, IEEE Intelligent Systems.

[4]  Javier Bajo,et al.  Intelligent environment for monitoring Alzheimer patients, agent technology for health care , 2008, Decis. Support Syst..

[5]  J. Bajo,et al.  Hybrid multi-agent architecture as a real-time problem-solving model , 2008, Expert Syst. Appl..

[6]  Kenji Kono,et al.  Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[7]  Ling Liu,et al.  Preserving data privacy in outsourcing data aggregation services , 2007, TOIT.

[8]  James L. Crowley,et al.  An Architecture for Ubiquitous Applications , 2007 .

[9]  Jeff Reeve,et al.  Ubiquitous security for ubiquitous computing , 2007, Inf. Secur. Tech. Rep..

[10]  Franciszek Seredynski,et al.  Recurrent neural networks towards detection of SQL attacks , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.

[11]  Ravi Jain,et al.  D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..

[12]  Wang Jun,et al.  Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-Agent System , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.

[13]  Andrew S. Tanenbaum,et al.  RFID malware: Design principles and examples , 2006, Pervasive Mob. Comput..

[14]  Andrew S. Tanenbaum,et al.  RFID malware: truth vs. myth , 2006, IEEE Security & Privacy.

[15]  Andrew S. Tanenbaum,et al.  Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[16]  Frank S. Rietta Application layer intrusion detection for SQL injection , 2006, ACM-SE 44.

[17]  Angélica González Arrieta,et al.  A Shopping Mall Multiagent System: Ambient Intelligence in Practice. , 2006 .

[18]  Alessandro Orso,et al.  A Classification of SQL Injection Attacks and Countermeasures , 2006, ISSSE.

[19]  Alessandro Orso,et al.  AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks , 2005, ASE.

[20]  Bruce W. Weide,et al.  Using parse tree validation to prevent SQL injection attacks , 2005, SEM '05.

[21]  John Heasman,et al.  The Database Hacker's Handbook: Defending Database Servers , 2005 .

[22]  Giovanni Vigna,et al.  A Learning-Based Approach to the Detection of SQL Attacks , 2005, DIMVA.

[23]  R.A. McClure,et al.  SQL DOM: compile time checking of dynamic SQL statements , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..

[24]  S. Rai,et al.  Safe query objects: statically typed objects as remotely executable queries , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..

[25]  Andrew H. Sung,et al.  Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..

[26]  Elisa Bertino,et al.  Database security - concepts, approaches, and challenges , 2005, IEEE Transactions on Dependable and Secure Computing.

[27]  Ueli Maurer The role of cryptography in database security , 2004, SIGMOD '04.

[28]  Angelos D. Keromytis,et al.  SQLrand: Preventing SQL Injection Attacks , 2004, ACNS.

[29]  Arputharaj Kannan,et al.  Quickprop Neural Network Short-Term Forecasting Framework for a Database Intrusion Prediction System , 2004, ICAISC.

[30]  Premkumar T. Devanbu,et al.  JDBC checker: a static analysis tool for SQL/JDBC applications , 2004, Proceedings. 26th International Conference on Software Engineering.

[31]  Zhendong Su,et al.  An Analysis Framework for Security in Web Applications , 2004 .

[32]  Juan M. Corchado,et al.  A Reasoning Model for CBR_BDI Agents Using an Adaptable Fuzzy Inference System , 2003, CAEPIA.

[33]  Christopher Krügel,et al.  Anomaly detection of web-based attacks , 2003, CCS '03.

[34]  Shih-Kun Huang,et al.  Web application security assessment by fault injection and behavior monitoring , 2003, WWW '03.

[35]  Barbara Messing,et al.  An Introduction to MultiAgent Systems , 2002, Künstliche Intell..

[36]  Nicolas Lhuillier,et al.  FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS , 2003 .

[37]  Aske Simon Christensen,et al.  Precise Analysis of String Expressions , 2003, SAS.

[38]  Bhavani M. Thuraisingham,et al.  Data mining, national security, privacy and civil liberties , 2002, SKDD.

[39]  Ramakrishnan Srikant,et al.  Hippocratic Databases , 2002, VLDB.

[40]  Chris Anley,et al.  Advanced SQL Injection In SQL Server Applications , 2002 .

[41]  A. Meystel,et al.  Intelligent Systems , 2001 .

[42]  Agostino Poggi,et al.  LEAP: A FIPA Platform for Handheld and Mobile Devices , 2001, ATAL.

[43]  M. Calisti,et al.  FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS , 2000 .

[44]  Agostino Poggi,et al.  Jade - a fipa-compliant agent framework , 1999 .

[45]  Nicholas R. Jennings,et al.  Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.

[46]  Agnar Aamodt,et al.  Case-Based Reasoning: Foundational Issues, Methodological Variations, and System Approaches , 1994, AI Commun..

[47]  Michael E. Bratman,et al.  Intention, Plans, and Practical Reason , 1991 .

[48]  Amy L. Lansky,et al.  Reactive Reasoning and Planning , 1987, AAAI.

[49]  C. Andrus Protecting the Crown Jewels. , 1979 .