Containerization is the modern trending concept for net-centric software application deployments other than the traditional virtualization. Among many container vendors …
Capture the flag (CTF) challenges are broadly used for engaging trainees in the technical aspects of cybersecurity, maintaining hands-on lab exercises, and integrating gamification …
M Šimon, L Huraj, N Búčik - Future Internet, 2023 - mdpi.com
In the current era of prevailing information technology, the requirement for high availability and reliability of various types of services is critical. This paper focusses on the comparison …
Microservices have become promising candidates for the deployment of network and vertical functions in the fifth generation of mobile networks. However, microservice platforms …
Serverless Computing is seen as a game changer in operating large-scale applications. While practitioners and researches often use this term, the concept they actually want to …
Over the past two decades, the cloud computing paradigm has gradually attracted more popularity due to its efficient resource usage and simple service access model. Virtualization …
Over the last few years, DevOps methodologies have promoted a more streamlined operationalization of software components in production environments. Infrastructure as …
This research aims to validate the learning theory of constructivism and identify the possible systematic approaches to design, deploy, and evaluate cybersecurity learning environments …
The accelerated production of data in digital format has intensified the need for efficient data analysis and knowledge extraction tools for decision-making. With the increasing use of …