SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases
暂无分享,去创建一个
Javier Bajo | Juan M. Corchado | Cristian Pinzón | Ajith Abraham | Yanira de Paz | A. Abraham | J. Bajo | J. Corchado | Cristian Pinzón | Javier Bajo
[1] Cristian Pinzón,et al. Classification Agent-Based Techniques for Detecting Intrusions in Databases , 2008, HAIS.
[2] Beatrice Gralton,et al. Washington DC - USA , 2008 .
[3] Javier Bajo,et al. GerAmi: Improving Healthcare Delivery in Geriatric Residences , 2008, IEEE Intelligent Systems.
[4] Javier Bajo,et al. Intelligent environment for monitoring Alzheimer patients, agent technology for health care , 2008, Decis. Support Syst..
[5] J. Bajo,et al. Hybrid multi-agent architecture as a real-time problem-solving model , 2008, Expert Syst. Appl..
[6] Kenji Kono,et al. Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[7] Ling Liu,et al. Preserving data privacy in outsourcing data aggregation services , 2007, TOIT.
[8] James L. Crowley,et al. An Architecture for Ubiquitous Applications , 2007 .
[9] Jeff Reeve,et al. Ubiquitous security for ubiquitous computing , 2007, Inf. Secur. Tech. Rep..
[10] Franciszek Seredynski,et al. Recurrent neural networks towards detection of SQL attacks , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.
[11] Ravi Jain,et al. D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..
[12] Wang Jun,et al. Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-Agent System , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.
[13] Andrew S. Tanenbaum,et al. RFID malware: Design principles and examples , 2006, Pervasive Mob. Comput..
[14] Andrew S. Tanenbaum,et al. RFID malware: truth vs. myth , 2006, IEEE Security & Privacy.
[15] Andrew S. Tanenbaum,et al. Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[16] Frank S. Rietta. Application layer intrusion detection for SQL injection , 2006, ACM-SE 44.
[17] Angélica González Arrieta,et al. A Shopping Mall Multiagent System: Ambient Intelligence in Practice. , 2006 .
[18] Alessandro Orso,et al. A Classification of SQL Injection Attacks and Countermeasures , 2006, ISSSE.
[19] Alessandro Orso,et al. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks , 2005, ASE.
[20] Bruce W. Weide,et al. Using parse tree validation to prevent SQL injection attacks , 2005, SEM '05.
[21] John Heasman,et al. The Database Hacker's Handbook: Defending Database Servers , 2005 .
[22] Giovanni Vigna,et al. A Learning-Based Approach to the Detection of SQL Attacks , 2005, DIMVA.
[23] R.A. McClure,et al. SQL DOM: compile time checking of dynamic SQL statements , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[24] S. Rai,et al. Safe query objects: statically typed objects as remotely executable queries , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[25] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[26] Elisa Bertino,et al. Database security - concepts, approaches, and challenges , 2005, IEEE Transactions on Dependable and Secure Computing.
[27] Ueli Maurer. The role of cryptography in database security , 2004, SIGMOD '04.
[28] Angelos D. Keromytis,et al. SQLrand: Preventing SQL Injection Attacks , 2004, ACNS.
[29] Arputharaj Kannan,et al. Quickprop Neural Network Short-Term Forecasting Framework for a Database Intrusion Prediction System , 2004, ICAISC.
[30] Premkumar T. Devanbu,et al. JDBC checker: a static analysis tool for SQL/JDBC applications , 2004, Proceedings. 26th International Conference on Software Engineering.
[31] Zhendong Su,et al. An Analysis Framework for Security in Web Applications , 2004 .
[32] Juan M. Corchado,et al. A Reasoning Model for CBR_BDI Agents Using an Adaptable Fuzzy Inference System , 2003, CAEPIA.
[33] Christopher Krügel,et al. Anomaly detection of web-based attacks , 2003, CCS '03.
[34] Shih-Kun Huang,et al. Web application security assessment by fault injection and behavior monitoring , 2003, WWW '03.
[35] Barbara Messing,et al. An Introduction to MultiAgent Systems , 2002, Künstliche Intell..
[36] Nicolas Lhuillier,et al. FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS , 2003 .
[37] Aske Simon Christensen,et al. Precise Analysis of String Expressions , 2003, SAS.
[38] Bhavani M. Thuraisingham,et al. Data mining, national security, privacy and civil liberties , 2002, SKDD.
[39] Ramakrishnan Srikant,et al. Hippocratic Databases , 2002, VLDB.
[40] Chris Anley,et al. Advanced SQL Injection In SQL Server Applications , 2002 .
[41] A. Meystel,et al. Intelligent Systems , 2001 .
[42] Agostino Poggi,et al. LEAP: A FIPA Platform for Handheld and Mobile Devices , 2001, ATAL.
[43] M. Calisti,et al. FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS , 2000 .
[44] Agostino Poggi,et al. Jade - a fipa-compliant agent framework , 1999 .
[45] Nicholas R. Jennings,et al. Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.
[46] Agnar Aamodt,et al. Case-Based Reasoning: Foundational Issues, Methodological Variations, and System Approaches , 1994, AI Commun..
[47] Michael E. Bratman,et al. Intention, Plans, and Practical Reason , 1991 .
[48] Amy L. Lansky,et al. Reactive Reasoning and Planning , 1987, AAAI.
[49] C. Andrus. Protecting the Crown Jewels. , 1979 .