Author of the publication

idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining.

, , , , , and . Inf. Sci., (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Proposal Based on a Real Time Agent to Protect Web Services Against DoS Attack., , , and . SOCO, volume 73 of Advances in Intelligent and Soft Computing, page 1-8. Springer, (2010)Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks., , , , , and . Knowl. Inf. Syst., 34 (1): 193-217 (2013)Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks., , , , , and . Appl. Soft Comput., 11 (7): 4384-4398 (2011)Mitigation of the Ground Reflection Effect in Real-Time Locating Systems., , , and . DCAI, volume 91 of Advances in Intelligent and Soft Computing, page 311-318. Springer, (2011)Multiagent System for Semantic Categorization of Places Mean the Use of Distributed Surveillance Cameras., and . DCAI (Special Sessions), volume 801 of Advances in Intelligent Systems and Computing, page 457-464. Springer, (2018)Temporal bounded reasoning for context-based information fusion in DoS attack detection., , , , , and . FUSION, page 1-8. IEEE, (2010)AIDeM: Agent-Based Intrusion Detection Mechanism., , and . PAAMS (Special Sessions and Workshops), volume 71 of Advances in Intelligent and Soft Computing, page 347-354. Springer, (2010)S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments., , , and . Expert Syst. Appl., 38 (5): 5486-5499 (2011)A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode., , and . DCAI, volume 50 of Advances in Soft Computing, page 180-188. Springer, (2008)Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach., , , and . HAIS (1), volume 6076 of Lecture Notes in Computer Science, page 229-236. Springer, (2010)