Container security: precaution levels, mitigation strategies, and research perspectives

DP VS, SC Sethuraman, MK Khan - Computers & Security, 2023 - Elsevier
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …

A Systematic Literature Review on Maintenance of Software Containers

R Malhotra, A Bansal, M Kessentini - ACM Computing Surveys, 2024 - dl.acm.org
Nowadays, cloud computing is gaining tremendous attention to deliver information via the
internet. Virtualization plays a major role in cloud computing as it deploys multiple virtual …

AI-Driven Container Security Approaches for 5G and Beyond: A Survey

IT Aktolga, ES Kuru, Y Sever, P Angin - arXiv preprint arXiv:2302.13865, 2023 - arxiv.org
The rising use of microservices based software deployment on the cloud leverages
containerized software extensively. The security of applications running inside containers as …

Adaptive CNN-Based Image Compression Model for Improved Remote Desktop Experience

H Wang, K Deng, Y Duan, M Yin, Y Wang… - … Conference on Neural …, 2023 - Springer
This paper addresses the optimization of desktop image presentation in remote desktop
scenarios. Remote desktop tools, essential for work efficiency, often employ image …

Efficient IoT Malware Detection Using Convolution Neural Network and View-Invariant Block

A Nasim, H Zhao, MH Javed… - 2023 18th International …, 2023 - ieeexplore.ieee.org
The numerous malware concerns in IoT devices, including manipulation through open-
source platforms, require swift identification due to their potential for intrusion and data ex …