[HTML][HTML] Denial of wallet—defining a looming threat to serverless computing

D Kelly, FG Glavin, E Barrett - Journal of Information Security and …, 2021 - Elsevier
Serverless computing is the latest paradigm in cloud computing, offering a framework for the
development of event driven, pay-as-you-go functions in a highly scalable environment …

Model-based adaptive dos attack mitigation

C Barna, M Shtern, M Smit, V Tzerpos… - 2012 7th International …, 2012 - ieeexplore.ieee.org
Denial of Service (DoS) attacks overwhelm online services, preventing legitimate users from
accessing a service, often with impact on revenue or consumer trust. Approaches exist to …

Executive dashboard systems for emergency management

A Zagorecki, J Ristvej, LK Comfort… - … -Scientific letters of …, 2012 - komunikacie.uniza.sk
The executive dashboard systems are a mainstream business intelligence technology. The
main idea behind the executive dashboard systems is to deliver information about status of …

[PDF][PDF] Detection of DDoS Attacks using Concepts of Machine Learning

A Narote, V Zutshi, A Potdar, R Vichare - International Journal for …, 2022 - academia.edu
Distributed Denial-of-Service (DDoS) assaults are the terrorizing preliminaries on the
Internet that exhaust the organization transmission capacity. Analysts have presented …

[PDF][PDF] Denial of Wallet: Analysis of a Looming Threat and Novel Solution for Mitigation using Image Classification

D Kelly, E Barrett, F Glavin - 2023 - aran.library.nuigalway.ie
Serverless Computing is a powerful cloud-based architecture for the creation of applications.
It boasts incredible scalability by running processes on a vast network of edge nodes. It …

Mitigating dos attacks using performance model-driven adaptive algorithms

C Barna, M Shtern, M Smit, V Tzerpos… - ACM Transactions on …, 2014 - dl.acm.org
Denial of Service (DoS) attacks overwhelm online services, preventing legitimate users from
accessing a service, often with impact on revenue or consumer trust. Approaches exist to …

Regional dimensions of knowledge processes in the sectors of transport and logistics and ICT in the Zilina region

T Corejova, M Rostasova, A Chrenkova… - … -Scientific letters of the …, 2013 - ceeol.com
The paper presents the results of the APVV project-Regional dimensions of knowledge
economy, which was solved in the Department of Communications, Faculty of Operation and …

Detecting high and low intensity distributed denial of service (DDoS) attacks

A Koay - 2019 - openaccess.wgtn.ac.nz
High and low-intensity attacks are two common Distributed Denial of Service (DDoS) attacks
that disrupt Internet users and their daily operations. Detecting these attacks is important to …

Model-driven Elasticity and {DoS} Attack Mitigation in Cloud Environments

C Barna, M Shtern, M Smit, H Ghanbari… - … on Autonomic Computing …, 2014 - usenix.org
Workloads for web applications can change rapidly. When the change is an increase in
customers, a common adaptive approach to maintain SLAs is elasticity, the on-demand …

Lutte contre les botnets: analyse et stratégie

É Freyssinet - 2015 - theses.hal.science
Les botnets, ou réseaux d'ordinateurs infectés par un code malveillant et connectés à un
système de commande et de contrôle, constituent le premier outil de la délinquance sur …