Divds: Docker image vulnerability diagnostic system

S Kwon, JH Lee - IEEE access, 2020 - ieeexplore.ieee.org
Since the development of Docker in 2013, container utilization projects have emerged in
various fields. Docker has the advantage of being able to quickly share application build …

Framework to secure docker containers

MK Abhishek, DR Rao - 2021 Fifth World Conference on Smart …, 2021 - ieeexplore.ieee.org
Docker is one the key component for application deployment using CI/CD pipelines.
Wherever containers are going ot be used, Docker engine is always the first choice but on …

Testing as a service (taas) a systematic literature map

G Girardon, V Costa, R Machado… - Proceedings of the 35th …, 2020 - dl.acm.org
Background: The knowledge and application of tools to automate testing is essential to
ensure software reliability and therefore its quality. Due to the increasing demand for quality …

[PDF][PDF] Resource Based Automatic Calibration System (RBACS) Using Kubernetes Framework.

T Alyas, N Tabassum, MW Iqbal… - … Automation & Soft …, 2023 - researchgate.net
Kubernetes, a container orchestrator for cloud-deployed applications, allows the application
provider to scale automatically to match the fluctuating intensity of processing demand …

Reinforced wavsep: a benchmarking platform for web application vulnerability scanners

L Urbano, G Perrone… - … Conference on Electrical …, 2022 - ieeexplore.ieee.org
Web applications do represent one of the main targets of cyber attacks. Detection systems
such as Web Application Firewalls (WAFs) can help detect web application attacks and …

Performance modeling and suitability assessment of data center based on fog computing in smart systems

P Wang, X Chen, Z Sun - IEEE Access, 2018 - ieeexplore.ieee.org
In human-centered smart systems, traditional cloud computing has been well adopted for
several years for supporting IoT applications of smart systems, however, the requirements of …

Implementation of web server security against denial of service (DoS) attacks

M Idhom, R Alit, A Fauzi - IOP Conference Series: Materials …, 2021 - iopscience.iop.org
Abstract Denial of Service (DoS) is one of the top cyber-attacks that grows exponentially
attacking every company, agency, and organization with a percentage of 43%. This type of …

Security assurance in DevOps methodologies and related environments

G Siewruk, W Mazurczyk, A Karpiński - International Journal of Electronics …, 2019 - infona.pl
The biggest software development companies conduct daily more than hundreds
deployments which influence currently operating IT (Information Technology) systems. This …

Fuzzing framework for iec 60870-5-104 protocol

P Ilgner, R Fujdiak - Proceedings of the 5th International Conference on …, 2022 - dl.acm.org
The importance of SCADA systems within the power grid is currently increasing due to the
increased complexity of the grid. Thus, these systems may contain various security …

Security Analysis and Architecture of a Blazor-Based Web Application

FC Iacobuț, RA Calomfirescu, C Dan… - 2024 16th …, 2024 - ieeexplore.ieee.org
As technology advances, the ingenuity of security attacks and vulnerability exploits
increases. These attacks target mainly web applications and strive to access and obtain user …