Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,253,114 papers from all fields of science
Search
Sign In
Create Free Account
Resource exhaustion attack
Known as:
Resource exhaustion
Resource exhaustion attacks are computer security exploits that crash, hang, or otherwise interfere with the targeted program or system. They are a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
C++
Crash (computing)
Denial-of-service attack
Exploit (computer security)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities
Theofilos Petsios
,
Jason Zhao
,
A. Keromytis
,
S. Jana
Conference on Computer and Communications…
2017
Corpus ID: 129575
Algorithmic complexity vulnerabilities occur when the worst-case time/space complexity of an application is significantly higher…
Expand
Highly Cited
2014
Highly Cited
2014
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
M. Jan
,
P. Nanda
,
Xiangjian He
,
Zhiyuan Tan
,
R. Liu
IEEE 13th International Conference on Trust…
2014
Corpus ID: 13888481
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify…
Expand
Highly Cited
2011
Highly Cited
2011
Skyfarming an ecological innovation to enhance global food security
J. Germer
,
J. Sauerborn
,
+4 authors
Joachim Müller
Journal für Verbraucherschütz und…
2011
Corpus ID: 46332403
Population growth increases the demand for food and thus leads to expansion of cultivated land and intensification of…
Expand
Highly Cited
2010
Highly Cited
2010
DoS-resistant ID-based password authentication scheme using smart cards
M. Hwang
,
Song-Kong Chong
,
Te-Yu Chen
Journal of Systems and Software
2010
Corpus ID: 26309161
2009
2009
Probabilistic model checking for the quantification of DoS security threats
Stylianos Basagiannis
,
P. Katsaros
,
A. Pombortsis
,
N. Alexiou
Computers & security
2009
Corpus ID: 12222251
2008
2008
Mining Software Aging Patterns by Artificial Neural Networks
H. El-Shishiny
,
S. Deraz
,
O. Badreddin
IAPR International Workshop on Artificial Neural…
2008
Corpus ID: 33021340
This paper investigates the use of Artificial Neural Networks (ANN) to mine and predict patterns in software aging phenomenon. We…
Expand
2006
2006
Socialist Register 2007: coming to terms with nature.
L. Panitch
,
C. Leys
2006
Corpus ID: 152333690
There are signs everywhere that the natural resources that provide the inputs for our material commodity economy are being used…
Expand
Highly Cited
2005
Highly Cited
2005
A comprehensive model for software rejuvenation
K. Vaidyanathan
,
Kishor S. Trivedi
IEEE Transactions on Dependable and Secure…
2005
Corpus ID: 15105513
Recently, the phenomenon of software aging, one in which the state of the software system degrades with time, has been reported…
Expand
Review
2004
Review
2004
Legume versus fertilizer sources of nitrogen: ecological tradeoffs and human needs
T. Crewsa
,
M. B. Peoplesb
2004
Corpus ID: 55907861
During the 20th century, farmers around the world replaced legume rotations and other traditional sources of nitrogen (N…
Expand
Highly Cited
2000
Highly Cited
2000
Dynamic Software Testing of MPI Applications with Umpire
J. Vetter
,
B. Supinski
International Conference on Software Composition
2000
Corpus ID: 1371579
As evidenced by the popularity of MPI (Message Passing Interface), message passing is an effective programming technique for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE