Academic literature on the topic 'Resource consumption attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Resource consumption attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Resource consumption attack"
Gao, Minyan, Liton Kumar Biswas, Navid Asadi, and Domenic Forte. "Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource." Cryptography 8, no. 2 (2024): 13. http://dx.doi.org/10.3390/cryptography8020013.
Full textMoataz, H. Khalil, Azab Mohamed, Elsayed Ashraf, Sheta Walaa, Gabr Mahmoud, and S. Elmaghraby Adel. "MAINTAINING CLOUD PERFORMANCE UNDER DDOS ATTACKS." International Journal of Computer Networks & Communications (IJCNC) 11, no. 6 (2019): 1–22. https://doi.org/10.5281/zenodo.3564217.
Full textPadmaja, K., and K. Padmaja. "Radial Basis Kernel Regressive Feature Extraction and Robert Ensembled Brown Boost Classifier for Attack Detection in Cloud Environment." Webology 18, no. 2 (2021): 41–59. http://dx.doi.org/10.14704/web/v18i2/web18306.
Full textKim, Sungbeen, and Dohoon Kim. "Securing the Cyber Resilience of a Blockchain-Based Railroad Non-Stop Customs Clearance System." Sensors 23, no. 6 (2023): 2914. http://dx.doi.org/10.3390/s23062914.
Full textZhang, Yanshuo, Liqiu Li, Hengyu Bao, Xiaohong Qin, Zhiyuan Zhang, and Xiaoyi Duan. "IAESR: IoT-oriented authenticated encryption based on iShadow round function." PeerJ Computer Science 11 (June 11, 2025): e2947. https://doi.org/10.7717/peerj-cs.2947.
Full textShruthi, R., and Z. Khan Prof.Rasheeda. "Preventing X-DoS attack on Cloud using Reputation-Based Technology." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 68–75. https://doi.org/10.5281/zenodo.581759.
Full textGarcia Ribera, Eric, Brian Martinez Alvarez, Charisma Samuel, Philokypros P. Ioulianou, and Vassilios G. Vassilakis. "An Intrusion Detection System for RPL-Based IoT Networks." Electronics 11, no. 23 (2022): 4041. http://dx.doi.org/10.3390/electronics11234041.
Full textWu, Hongyu, Xiaoning Feng, and Jiale Zhang. "Quantum Implementation of the SAND Algorithm and Its Quantum Resource Estimation for Brute-Force Attack." Entropy 26, no. 3 (2024): 216. http://dx.doi.org/10.3390/e26030216.
Full textKannan, Charulatha, Rajendiran Muthusamy, Vimala Srinivasan, Vivek Chidambaram, and Kiruthika Karunakaran. "Machine learning based detection of DDoS attacks in software defined network." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 3 (2023): 1503. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1503-1511.
Full textShi, Haibin, Guang Cheng, Ying Hu, Fuzhou Wang, and Haoxuan Ding. "RT-SAD: Real-Time Sketch-Based Adaptive DDoS Detection for ISP Network." Security and Communication Networks 2021 (July 27, 2021): 1–10. http://dx.doi.org/10.1155/2021/9409473.
Full textBook chapters on the topic "Resource consumption attack"
Jiao, Libin, Yonghua Huo, Ningling Ge, Zhongdi Ge, and Yang Yang. "A Resource Consumption Attack Identification Method Based on Data Fusion." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73562-3_11.
Full textAbdelhaq, Maha, Rosilah Hassan, and Raed Alsaqour. "Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET." In Software Engineering and Computer Systems. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22203-0_38.
Full textWoodhouse, Stephen, and Mostyn Brown. "The Impact of Digitalization." In The Palgrave Handbook of International Energy Economics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-86884-0_30.
Full text"Research on resource consumption attack detection and defend." In Control Engineering and Information Systems. CRC Press, 2015. http://dx.doi.org/10.1201/b17732-138.
Full textJain, Rachna. "Apprising Trust Key Management in IoT Cross-Layer Framework." In Transforming the Internet of Things for Next-Generation Smart Systems. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7541-3.ch002.
Full textZhao, Yi, Ningping Mou, Yunjie Ge, and Qian Wang. "Improving Adversarial Transferability with Ghost Samples." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2023. http://dx.doi.org/10.3233/faia230629.
Full textAmeen, Nabeena, and R. Rajagopal. "Secure Boot and Key Management Protocols for IoT Edge Devices." In Lightweight Cryptographic Algorithms for Secure IoT Devices, 2025th ed. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552302-12.
Full textShahid, Hafsa, Humaira Ashraf, N. Z. Jhanjhi, and Qurat-ul Ain Zam Zam. "Reshaping Cybersecurity of Wireless Sensor Networks Using Energy-Optimized Approach Against Wormhole Attack." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-5415-5.ch004.
Full textAl-Na'amneh, Qais, Walid Dhifallah, Rahaf Hazaymih, et al. "DIS Flooding Attack Impact in RPL-Based 6LowPAN Network." In Advances in Computational Intelligence and Robotics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-7540-2.ch004.
Full textTalukder, Mohammad Badruddoza, Musfiqur Rahoman Khan, and Sanjeev Kumar. "Socioeconomic Gaps and Foster Inclusive Growth." In Advances in Hospitality, Tourism, and the Services Industry. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-5405-6.ch003.
Full textConference papers on the topic "Resource consumption attack"
Lazri, Kahina, Sylvie Laniepce, Haiming Zheng, and Jalel Ben-Othman. "AMAD: Resource Consumption Profile-Aware Attack Detection in IaaS Cloud." In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC). IEEE, 2014. http://dx.doi.org/10.1109/ucc.2014.48.
Full textRustogi, Rishabh, Abhishek Agarwal, Ayush Prasad, and Samant Saurabh. "Machine Learning Based Web-Traffic Analysis for Detection of Fraudulent Resource Consumption Attack in Cloud." In WI '19: IEEE/WIC/ACM International Conference on Web Intelligence. ACM, 2019. http://dx.doi.org/10.1145/3350546.3352567.
Full textSilva, Antônia Mayara de A. da, Michel Sales Bonfim, Arthur de Castro Callado, and Enyo José T. Gonçalves. "Detection and Mitigation of Attacks at the Edge of IoT Networks Using Deep Learning and P4." In Simpósio Brasileiro de Sistemas de Informação. Sociedade Brasileira de Computação, 2025. https://doi.org/10.5753/sbsi.2025.246599.
Full textTsiatsikas, Zisis, Georgios Kambourakis, and Dimitris Geneiatakis. "Exposing resource consumption attacks in internet multimedia services." In 2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). IEEE, 2014. http://dx.doi.org/10.1109/isspit.2014.7446237.
Full textDeepan Kumar, Sadhasivam, Vishnu Ramesh Kumar R, Boopathi M, R. Manojkumar, Gobinath R, and Vignesh M. "FPGA Implementation of HLS Crypto Accelerators for Embedded Security in Autonomous Vehicles." In Advances in Design, Materials, Manufacturing and Surface Engineering for Mobility (ADMMS’25). SAE International, 2025. https://doi.org/10.4271/2025-28-0205.
Full textWu, Mingtao, and Young B. Moon. "Intrusion Detection of Cyber-Physical Attacks in Manufacturing Systems: A Review." In ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-10135.
Full textPontes, Marcos F., Rodrigo C. Pedrosa, Pedro H. Lopes, and Eduardo J. Luz. "Evaluating Federated Learning with Homomorphic Encryption for Medical Named Entity Recognition Using Compact BERT Models." In Simpósio Brasileiro de Tecnologia da Informação e da Linguagem Humana. Sociedade Brasileira de Computação, 2024. https://doi.org/10.5753/stil.2024.245381.
Full textBezerra, Vitor Hugo, Victor G. Turrisi da Costa, Sylvio Barbon Junior, Rodrigo Sanches Miani, and Bruno Bogaz Zarpelão. "One-class Classification to Detect Botnets in IoT devices." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/sbseg.2018.4242.
Full textK, Selvamani, Anbuchelian S, Kanimozhi S, Elakkiya R, Bose S, and Kannan A. "A hybrid framework of intrusion detection system for resource consumption based attacks in wireless ad-hoc networks." In 2012 International Conference on Systems and Informatics (ICSAI). IEEE, 2012. http://dx.doi.org/10.1109/icsai.2012.6223291.
Full textMoncea, Mădălina, Lăcrămioara Drăcea, and Răzvan-Cătălin Dobrea. "Overview on the Impact of Consumer Behavior Decisions on the Tourism Industry in Romania." In 9th BASIQ International Conference on New Trends in Sustainable Business and Consumption. Editura ASE, 2023. http://dx.doi.org/10.24818/basiq/2023/09/072.
Full textReports on the topic "Resource consumption attack"
Ekström, Thomas. Kunskapsöversikt: Lärdomar från Ukraina med relevans för svensk infrastruktur. Swedish Defence University, 2024. https://doi.org/10.62061/xjyn5209.
Full text