Buscar
Mostrando ítems 1-10 de 6693
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages
(2009-07-01)
A SOAP message can be affected by a DoS attack if the incoming message has been either created or modified maliciously. The specifications of existing security standards do not focus on this type of attack. This article ...
Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system ...
Joint attacks and accrual in argumentation frameworks
(College Publications, 2021-07)
While modelling arguments, it is often useful to represent joint attacks, i.e., cases where multiple arguments jointly attack another (note that this is different from the case where multiple arguments attack another in ...
An approach to mitigate denial of service attacks in ieee 802.11 networks
(2014)
Wireless networks are widely deployed and have many uses, for example in critical embedded systems. The applications of this kind of network meets the common needs of most embedded systems and addressing the particularities ...
Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach
(06/23/2010)
The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS attacks can be generated for different techniques that take advantage of points vulnerable within Web services. This paper ...
Solving Stackelberg Security Games For Multiple Defenders and Multiple Attackers
(2015)
In the last years, there has been a substantial effort in the application of Stackelberg game-theoretic approaches in the security arena, in which security agencies implement patrols
and checkpoints to protect targets ...
A hybrid agent-based classification mechanism to detect denial of service attacks
(09/03/2009)
This paper presents the core component of a solution based on agent technology specifically adapted for the classification of SOAP messages. The messages can carry out attacks that target the applications providing Web ...
Unsupervised Visualization of SQL Attacks by Means of the SCMAS Architecture
(2010-07-02)
This paper presents an improvement of the SCMAS architecture aimed at securing SQL-run databases. The main goal of such architecture is the detection and prevention of SQL injection attacks. The improvement consists in the ...
Distribution and attack of pineapple mealybug to macauba palm Acrocomia aculeata
(Springer, 2021-02-11)
The mealybug Dysmicoccus brevipes (Hemiptera: Pseudococcidae) is an important pest of several agricultural crops and can transmit viruses, and reduce growth and production, and lead to plant mortality. Macauba palm is an ...