[PDF][PDF] A step towards generation of DoS/DDoS attacks dataset for docker-centric computing

A Tomar, P Mishra, R Bisht… - International Journal of …, 2022 - academia.edu
Docker provides an effective containerized environment for modern computing. However,
the security issues present in Docker provide an edge to the attackers thus resulting in …

An anonymous authentication mechanism based on zero-knowledge proof for power system

S Liu, G Zhang, J Jiang, X Zhou… - … and Information Systems …, 2023 - spiedigitallibrary.org
With the application of new technologies such as Internet of Things and big data in smart
grid industry, new power systems based on new energy sources have emerged in response …