1 articletagged with “availability”
LLM resource exhaustion attacks including sponge examples, context window flooding, recursive prompt loops, and token amplification that degrade or disable AI systems.