Results 11 to 20 of about 15,875 (148)

DoWNet—classification of Denial-of-Wallet attacks on serverless application traffic

open access: yesJournal of Cybersecurity
Abstract Serverless computing is an ever-growing programming paradigm being adopted by developers all over the world. Its highly scalable, automatic load balancing, and pay for what you use design is a powerful tool that can also greatly reduce operational costs.
Daniel Kelly   +2 more
openaire   +2 more sources

A Comprehensive Review of Denial of Wallet Attacks in Serverless Architectures

open access: yesarXiv.org
The Denial of Wallet (DoW) attack poses a unique and growing threat to serverless architectures that rely on Function-as-a-Service (FaaS) models, exploiting the cost structure of pay-as-you-go billing to financially burden application owners. Unlike traditional Denial of Service (DoS) attacks, which aim to exhaust resources and disrupt service ...
Mark Dorsett   +3 more
openaire   +3 more sources

NextGen Authentication: A Secure Blockchain-Based Protocol for Content-Centric Networks With Soulbound Tokens

open access: yesIEEE Access
Content-Centric Networking (CCN) aims to meet the demand for content access and distribution by securing content rather than connections. However, content cached in CCN routers is vulnerable to malicious attacks and unauthorized access.
R. Shashidhara   +2 more
doaj   +2 more sources

Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless Computing

open access: yesConference on Computer and Communications Security, 2022
Serverless computing, or Function-as-a-Service, is gaining continuous popularity due to its pay-as-you-go billing model, flexibility, and low costs.
Junxian Shen   +5 more
semanticscholar   +1 more source

An actor-model based bottom-up simulation - An experiment on Indian demonetisation initiative [PDF]

open access: yes, 2018
The dominance of cash-based transactions and relentless growth of a shadow economy triggered a fiscal intervention by the Indian government wherein 86% of the total cash in circulation was pulled out in a sudden announcement on November 8, 2016.
Barat, Souvik   +3 more
core   +2 more sources

A Comprehensive Review of Denial of Service Attacks in Blockchain Ecosystem and Open Challenges

open access: yesIEEE Access, 2022
With the proliferation of the blockchain technology ecosystems such as mining pools, crypto exchanges, full Bitcoin nodes, wallets, and pool protocol servers in recent years, the denial of service (DoS) attack vector has become more prevalent, and the ...
Rajasekhar Chaganti   +7 more
semanticscholar   +1 more source

Anonymity in Bitcoin and Bitmessage [PDF]

open access: yes, 2018
This report describes two projects created by the author which are based on ideas which originate from the Bitcoin community. The first, bmd, is a re-implementation of the Bitmessage protocol in go.
Krawisz, Daniel Gregory
core   +1 more source

Binge flying: Behavioural addiction and climate change [PDF]

open access: yes, 2011
Recent popular press suggests that ‘binge flying’ constitutes a new site of behavioural addiction. We theoretically appraise and empirically support this proposition through interviews with consumers in Norway and the United Kingdom conducted in 2009 ...
Barr   +50 more
core   +1 more source

A method for effective use of enterprise modelling techniques in complex dynamic decision making [PDF]

open access: yes, 2017
Effective organisational decision-making requires information pertaining to various organisational aspects, precise analysis capabilities, and a systematic method to capture and interpret the required information.
A Beckermann   +11 more
core   +3 more sources

Denial of Wallet: Analysis of a looming threat and novel solution for mitigation using image classification

open access: yes, 2023
Serverless Computing is a powerful cloud-based architecture for the creation of applications. It boasts incredible scalability by running processes on a vast network of edge nodes. It decreases the time to deployment, as the developer no longer needs to programme a traditional server-side back-end, only having to focus on the application’s business ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy