Results 1 to 10 of about 15,856 (129)

An intelligent federated learning boosted cyberattack detection system for Denial-Of-Wallet attack using advanced heuristic search with multimodal approaches [PDF]

open access: yesScientific Reports
In the modern digital era, owing to technological progressions, the diversification and intensity of cyber-attacks have attained an extraordinary level.
Elvir Akhmetshin   +6 more
doaj   +5 more sources

Heuristically enhanced multi-head attention based recurrent neural network for denial of wallet attacks detection on serverless computing environment [PDF]

open access: yesScientific Reports
Denial of Wallet (DoW) attacks are a cyber threat designed to utilize and deplete an organization’s financial resources by generating excessive prices or charges in their cloud computing (CC) and serverless computing platforms.
Sarah A. Alzakari   +7 more
doaj   +5 more sources

Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications [PDF]

open access: yesScientific Reports
Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments.
Amal K. Alkhalifa   +7 more
doaj   +4 more sources

Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing

open access: yesIEEE Access
A Denial of Wallet (DoW) attack is a cyberattack designed to drain financial resources by causing excessive charges or costs on a serverless computing or cloud platform.
P. Renukadevi   +4 more
doaj   +3 more sources

Denial of wallet—Defining a looming threat to serverless computing [PDF]

open access: yesJournal of Information Security and Applications, 2021
Serverless computing is the latest paradigm in cloud computing, offering a framework for the development of event driven, pay-as-you-go functions in a highly scalable environment. While these traits offer a powerful new development paradigm, they have also given rise to a new form of cyber-attack known as Denial of Wallet (forced financial exhaustion).
Daniel Kelly   +2 more
openaire   +3 more sources

DoWTS – Denial-of-Wallet Test Simulator: Synthetic data generation for preemptive defence

open access: yesJournal of Intelligent Information Systems, 2022
AbstractThe intentional targeting of components in a cloud based application, in order to artificially inflate usage bills, is an issue application owners have faced for many years. This has occurred under many guises, such as: Economic Denial of Sustainability (EDoS), Click Fraud and even secondary effects of Denial of Service (DoS) attacks.
Daniel Kelly   +2 more
openaire   +2 more sources

Security Attacks on E-Voting System Using Blockchain

open access: yesIraqi Journal for Computer Science and Mathematics, 2023
Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In this paper, some attacks were made on a proposed electronic election model based on blockchain technology, where the impact of each ...
Saba Abdulbaqi Salman   +2 more
doaj   +2 more sources

Cybersecurity Test Bed for Smart Contracts

open access: yesCryptography, 2023
Blockchain, smart contracts, and related concepts have emerged in recent years as a promising technology for cryptocurrency, NFTs, and other areas. However, there are still many security issues that must be addressed as these technologies evolve.
Casimer DeCusatis   +5 more
doaj   +2 more sources

Generation of a dataset for DoW attack detection in serverless architectures [PDF]

open access: yesData in Brief
Denial of Wallet (DoW) attacks refers to a type of cyberattack that aims to exploit and exhaust the financial resources of an organization by triggering excessive costs or charges within their cloud or serverless computing environment.
José Manuel Ortega Candel   +2 more
doaj   +2 more sources

Companies’ Crypto wallets Identification for Auditing Purposes

open access: yesУчёт. Анализ. Аудит, 2023
The article examines the problem of identifying the crypto wallet of an audited organization, which is becoming increasingly important and relevant as crypto economy develops.
A. V. Tetyushin
doaj   +2 more sources

Home - About - Disclaimer - Privacy