One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
: A Burg technique is employed to model the long wavelength localization and imaging problem. A Burg method is used as a high resolution and stable technique. The idea of in-line h...
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
This paper proposes an on-line error detecting method for a manually annotated corpus using min-max modular (M3 ) neural networks. The basic idea of the method is to use guaranteed...