Skip to search formSkip to main contentSkip to account menu

Resource exhaustion attack

Known as: Resource exhaustion 
Resource exhaustion attacks are computer security exploits that crash, hang, or otherwise interfere with the targeted program or system. They are a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Algorithmic complexity vulnerabilities occur when the worst-case time/space complexity of an application is significantly higher… 
Highly Cited
2014
Highly Cited
2014
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify… 
Highly Cited
2011
Highly Cited
2011
Population growth increases the demand for food and thus leads to expansion of cultivated land and intensification of… 
2008
2008
This paper investigates the use of Artificial Neural Networks (ANN) to mine and predict patterns in software aging phenomenon. We… 
2006
2006
There are signs everywhere that the natural resources that provide the inputs for our material commodity economy are being used… 
Highly Cited
2005
Highly Cited
2005
Recently, the phenomenon of software aging, one in which the state of the software system degrades with time, has been reported… 
Review
2004
Review
2004
During the 20th century, farmers around the world replaced legume rotations and other traditional sources of nitrogen (N… 
Highly Cited
2000
Highly Cited
2000
As evidenced by the popularity of MPI (Message Passing Interface), message passing is an effective programming technique for…