28 research outputs found

    Exact Conditional and Unconditional Cram\`er-Rao Bounds for Near Field Localization

    Full text link
    This paper considers the Cram\`er-Rao lower Bound (CRB) for the source localization problem in the near field. More specifically, we use the exact expression of the delay parameter for the CRB derivation and show how this exact CRB can be significantly different from the one given in the literature and based on an approximate time delay expression (usually considered in the Fresnel region). This CRB derivation is then generalized by considering the exact expression of the received power profile (i.e., variable gain case) which, to our best knowledge, has been ignored in the literature. Finally, we exploit the CRB expression to introduce the new concept of Near Field Localization (NFL) region for a target localization performance associated to the application at hand. We illustrate the usefulness of the proposed CRB derivation and its developments as well as the NFL region concept through numerical simulations in different scenarios

    Etat de renouvellement spatial et application sur un reseau cylindrique

    No full text
    CNRS T Bordereau / INIST-CNRS - Institut de l'Information Scientifique et TechniqueSIGLEFRFranc

    Improving Web Application Firewalls to detect advanced SQL injection attacks

    No full text
    International audienceInjections flaws which include SQL injection are the most prevalent security threats affecting Web applications[1]. To mitigate these attacks, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions. Nevertheless, attackers can bypass WAF's rules by using sophisticated SQL injection techniques. In this paper, we introduce a novel approach to dissect the HTTP traffic and inspect complex SQL injection attacks. Our model is a hybrid Injection Prevention System (HIPS) which uses both a machine learning classifier and a pattern matching inspection engine based on reduced sets of security rules. Our Web Application Firewall architecture aims to optimize detection performances by using a prediction module that excludes legitimate requests from the inspection process

    Hybrid Approach to Detect SQLi Attacks and Evasion Techniques

    No full text
    International audience—Injections flaws which include SQL injection are the most prevalent security threats affecting Web applications[1]. To mitigate these attacks, Web Application Firewalls (WAFs) apply security rules in order to both inspect HTTP data streams and detect malicious HTTP transactions. Nevertheless, attackers can bypass WAF's rules by using sophisticated SQL injection techniques. In this paper, we introduce a novel approach to dissect the HTTP traffic and inspect complex SQL injection attacks. Our model is a hybrid Injection Prevention System (HIPS) which uses both a machine learning classifier and a pattern matching inspection engine based on reduced sets of security rules

    Exact Cramer Rao Bound for near field source localization

    No full text
    International audienc
    corecore