Sciweavers

359 search results - page 38 / 72
» An Architecture for Intrusion Detection Using Autonomous Age...
Sort
View
ARGMAS
2008
Springer
13 years 9 months ago
Argumentation and Artifact for Dialogue Support
Intelligent and autonomous software agents may engage in dialogue and argument with one another, and much recent research has considered protocols, architectures and frameworks for...
Enrico Oliva, Mirko Viroli, Andrea Omicini, Peter ...
SAC
2009
ACM
14 years 2 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 7 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
ICRA
1999
IEEE
183views Robotics» more  ICRA 1999»
13 years 12 months ago
Agent-Based Planning and Control of a Multi-Manipulator Assembly System
This paper presents a distributed planning and control architecture for autonomous Multi-Manipulator Systems (MMS). The control architecture is implemented using an agent-based ap...
Juan C. Fraile, Christiaan J. J. Paredis, Pradeep ...
CJ
2004
93views more  CJ 2004»
13 years 7 months ago
An Architecture for Kernel-Level Verification of Executables at Run Time
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
Luigi Catuogno, Ivan Visconti