Resource exhaustion attack

Known as: Resource exhaustion 
Resource exhaustion attacks are computer security exploits that crash, hang, or otherwise interfere with the targeted program or system. They are a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The paper presents a new efficient algorithm for computing worst case execution time (WCET) of systems modelled as timed automata… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2015
2015
Software systems are often engineered and tested for functionality under normal rather than worst-case conditions. This makes the… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2011
2011
Many common protocols: TCP, IPSec, etc., are vulnerable to denial of service attacks, where adversaries maliciously consume… (More)
Is this relevant?
2007
2007
The importance of security has been recognized in ad hoc networks for many years. Consequently many secure routing methods have… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Several recent studies have reported & examined the phenomenon that long-running software systems show an increasing failure rate… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Infiniband is becoming an important interconnect technology in high performance computing. Efforts in large scale Infiniband… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2004
2004
– Over the past few years, denial of service (DoS) attacks have become more of a threat than ever. DoS attacks are aimed at… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
A number of recent studies have reported the phenomenon of “software aging”, characterized by progressive performance degradation… (More)
  • figure 1
  • figure 2
  • table 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
As evidenced by the popularity of MPI (Message Passing Interface), message passing is an effective programming technique for… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Software systems are known to suffer from outages due to transient errors. Recently, the phenomenon of ”software aging” [5, 10… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?