Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,589,854 papers from all fields of science
Search
Sign In
Create Free Account
Resource exhaustion attack
Known as:
Resource exhaustion
Resource exhaustion attacks are computer security exploits that crash, hang, or otherwise interfere with the targeted program or system. They are a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
C++
Crash (computing)
Denial-of-service attack
Exploit (computer security)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
M. Jan
,
P. Nanda
,
Xiangjian He
,
Zhiyuan Tan
,
R. Liu
IEEE 13th International Conference on Trust…
2014
Corpus ID: 13888481
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify…
Expand
2014
2014
Ensuring the Performance of Apache HTTP Server Affected by Aging
Jing Zhao
,
Kishor S. Trivedi
,
Michael Grottke
,
Javier Alonso
,
Yanbin Wang
IEEE Transactions on Dependable and Secure…
2014
Corpus ID: 13977210
Failures due to software aging are typically caused by resource exhaustion, which is often preceded by progressive software…
Expand
2011
2011
Formal modelling and automatic detection of resource exhaustion attacks
B. Groza
,
M. Minea
ACM Asia Conference on Computer and…
2011
Corpus ID: 14633066
Many common protocols: TCP, IPSec, etc., are vulnerable to denial of service attacks, where adversaries maliciously consume…
Expand
2011
2011
Security on the Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response
Yu-Yi Chen
,
Meng-Lin Tsai
,
J. Jan
Fifth International Conference on Genetic and…
2011
Corpus ID: 7027925
Highly Cited
2010
Highly Cited
2010
DoS-resistant ID-based password authentication scheme using smart cards
M. Hwang
,
Song-Kong Chong
,
Te-Yu Chen
Journal of Systems and Software
2010
Corpus ID: 26309161
2009
2009
Playing Games with Internal Attackers Repeatedly
I. Kantzavelou
,
S. Katsikas
International Conference on Systems, Signals, and…
2009
Corpus ID: 15105544
Insiders might threaten organizations' systems any time. By interacting with a system, an insider plays games with the security…
Expand
2008
2008
Mining Software Aging Patterns by Artificial Neural Networks
H. El-Shishiny
,
S. Deraz
,
O. Badreddin
IAPR International Workshop on Artificial Neural…
2008
Corpus ID: 33021340
This paper investigates the use of Artificial Neural Networks (ANN) to mine and predict patterns in software aging phenomenon. We…
Expand
Highly Cited
2007
Highly Cited
2007
Forecasting of the Consumption of Metals up to 2050
K. Halada
,
Masanori Shimada
,
Kiyoshi Ijima
2007
Corpus ID: 59388748
Forecasting are made regarding the consumption up to 2050 of following metals: Fe, Al, Cu, Mn, Zn, Cr, Pb, Ni, Si, Sn, rare…
Expand
2006
2006
Socialist Register 2007: coming to terms with nature.
L. Panitch
,
C. Leys
2006
Corpus ID: 152333690
There are signs everywhere that the natural resources that provide the inputs for our material commodity economy are being used…
Expand
Highly Cited
2000
Highly Cited
2000
Dynamic Software Testing of MPI Applications with Umpire
J. Vetter
,
B. Supinski
International Conference on Software Composition
2000
Corpus ID: 1371579
As evidenced by the popularity of MPI (Message Passing Interface), message passing is an effective programming technique for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE