Results 11 to 20 of about 15,875 (148)
DoWNet—classification of Denial-of-Wallet attacks on serverless application traffic
Abstract Serverless computing is an ever-growing programming paradigm being adopted by developers all over the world. Its highly scalable, automatic load balancing, and pay for what you use design is a powerful tool that can also greatly reduce operational costs.
Daniel Kelly +2 more
openaire +2 more sources
A Comprehensive Review of Denial of Wallet Attacks in Serverless Architectures
The Denial of Wallet (DoW) attack poses a unique and growing threat to serverless architectures that rely on Function-as-a-Service (FaaS) models, exploiting the cost structure of pay-as-you-go billing to financially burden application owners. Unlike traditional Denial of Service (DoS) attacks, which aim to exhaust resources and disrupt service ...
Mark Dorsett +3 more
openaire +3 more sources
Content-Centric Networking (CCN) aims to meet the demand for content access and distribution by securing content rather than connections. However, content cached in CCN routers is vulnerable to malicious attacks and unauthorized access.
R. Shashidhara +2 more
doaj +2 more sources
Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless Computing
Serverless computing, or Function-as-a-Service, is gaining continuous popularity due to its pay-as-you-go billing model, flexibility, and low costs.
Junxian Shen +5 more
semanticscholar +1 more source
An actor-model based bottom-up simulation - An experiment on Indian demonetisation initiative [PDF]
The dominance of cash-based transactions and relentless growth of a shadow economy triggered a fiscal intervention by the Indian government wherein 86% of the total cash in circulation was pulled out in a sudden announcement on November 8, 2016.
Barat, Souvik +3 more
core +2 more sources
A Comprehensive Review of Denial of Service Attacks in Blockchain Ecosystem and Open Challenges
With the proliferation of the blockchain technology ecosystems such as mining pools, crypto exchanges, full Bitcoin nodes, wallets, and pool protocol servers in recent years, the denial of service (DoS) attack vector has become more prevalent, and the ...
Rajasekhar Chaganti +7 more
semanticscholar +1 more source
Anonymity in Bitcoin and Bitmessage [PDF]
This report describes two projects created by the author which are based on ideas which originate from the Bitcoin community. The first, bmd, is a re-implementation of the Bitmessage protocol in go.
Krawisz, Daniel Gregory
core +1 more source
Binge flying: Behavioural addiction and climate change [PDF]
Recent popular press suggests that ‘binge flying’ constitutes a new site of behavioural addiction. We theoretically appraise and empirically support this proposition through interviews with consumers in Norway and the United Kingdom conducted in 2009 ...
Barr +50 more
core +1 more source
A method for effective use of enterprise modelling techniques in complex dynamic decision making [PDF]
Effective organisational decision-making requires information pertaining to various organisational aspects, precise analysis capabilities, and a systematic method to capture and interpret the required information.
A Beckermann +11 more
core +3 more sources
Serverless Computing is a powerful cloud-based architecture for the creation of applications. It boasts incredible scalability by running processes on a vast network of edge nodes. It decreases the time to deployment, as the developer no longer needs to programme a traditional server-side back-end, only having to focus on the application’s business ...
openaire +2 more sources

