Results 111 to 120 of about 15,875 (148)

Distributed Denial of Wallet Attack on Serverless Pay-as-you-go Model

2022 30th Telecommunications Forum (TELFOR), 2022
The serverless pay-as-you-go model in the cloud enables payment of services during execution and resources used at the smallest, most granular level, as was the initial idea when setting the foundations and concepts of the pay-as-you-go model in the ...
Dimitar Mileski, Hristina Mihajloska
openaire   +2 more sources

Detecting Denial of Wallet Attacks in Serverless Computing: A Neural ODE-LTC Approach

2025 IEEE International Conference on Joint Cloud Computing (JCC)
The serverless Function-as-a-Service (FaaS) paradigm offers a fine granularity for the pay-per-use billing model, where users are charged based on the actual function execution time and do not have to pay for idle resources. Thereby, FaaS in a serverless
Deepanjan Mitra   +2 more
openaire   +2 more sources

High-Fidelity Simulated Dataset for Enhanced Detection of Denial of Wallet Attacks (DOW) in Serverless Architecture

2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS)
Serverless architectures are becoming super popular with demanding growth and better functionality. This architecture is a fantastic option for building and launching applications in the cloud. Why Serverless?
Chanakshi Joshi   +5 more
openaire   +2 more sources

PrivFlow: Secure and Privacy Preserving Serverless Workflows on Cloud

IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, 2023
The recent advancement of serverless computing in the widespread deployment of applications prompts the need to protect serverless workflows against cloud vulnerabilities and threats.
Surabhi Garg   +4 more
semanticscholar   +1 more source

Exploring the Attack Surface of Blockchain: A Comprehensive Survey

IEEE Communications Surveys and Tutorials, 2020
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the attack surface to 1) the Blockchain cryptographic constructs, 2) the
Muhammad Saad   +6 more
semanticscholar   +1 more source

A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing

Transactions on Emerging Telecommunications Technologies, 2020
With the advancement of blockchain technology, and the proliferation of Internet of things (IoT)‐driven devices, the blockchain‐IoT applications is changing the perception and working infrastructure of smart networks.
Prabhat Kumar   +3 more
semanticscholar   +1 more source

The Smart Performance Analysis of Cyber Security Issues in Crypto Currency Using Blockchain

International Conferences on Contemporary Computing and Informatics, 2023
Crypto currency is subject to persistent and dynamic cyber security risks. As with all types of online assets, digital wallets, exchanges and even individual user accounts are often subject to both malicious attacks and other vulnerabilities.
J. Logeshwaran   +3 more
semanticscholar   +1 more source

Securing Serverless Environments: A Blockchain-Based Approach for Licensing and Payment Verification

2025 International Conference on Next Generation Information System Engineering (NGISE)
Cracked software that exploits serverless computing resources has become a significant security concern for cloud providers, leading to cost inflation and heightened security risks.
Kriti Sharma   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy