Container security: precaution levels, mitigation strategies, and research perspectives

DP VS, SC Sethuraman, MK Khan - Computers & Security, 2023 - Elsevier
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …

Performance evaluation of docker-based apache and nginx web server

W Kithulwatta, KPN Jayasena, B Kumara… - 2022 3rd …, 2022 - ieeexplore.ieee.org
Containerization is the modern trending concept for net-centric software application
deployments other than the traditional virtualization. Among many container vendors …

PocketCTF: A fully featured approach for hosting portable attack and defense cybersecurity exercises

S Karagiannis, C Ntantogian, E Magkos, LL Ribeiro… - Information, 2021 - mdpi.com
Capture the flag (CTF) challenges are broadly used for engaging trainees in the technical
aspects of cybersecurity, maintaining hands-on lab exercises, and integrating gamification …

A Comparative Analysis of High Availability for Linux Container Infrastructures

M Šimon, L Huraj, N Búčik - Future Internet, 2023 - mdpi.com
In the current era of prevailing information technology, the requirement for high availability
and reliability of various types of services is critical. This paper focusses on the comparison …

A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M

LF Gonzalez, I Vidal, F Valera, R Martin, D Artalejo - Future Internet, 2023 - mdpi.com
Microservices have become promising candidates for the deployment of network and
vertical functions in the fifth generation of mobile networks. However, microservice platforms …

[图书][B] A Simulation Framework for Function as a Service

J Manner - 2024 - books.google.com
Serverless Computing is seen as a game changer in operating large-scale applications.
While practitioners and researches often use this term, the concept they actually want to …

Experimental Assessment of Containers Running on Top of Virtual Machines

H Aqasizade, E Ataie, M Bastam - arXiv preprint arXiv:2401.07539, 2024 - arxiv.org
Over the past two decades, the cloud computing paradigm has gradually attracted more
popularity due to its efficient resource usage and simple service access model. Virtualization …

IEM: A Unified Lifecycle Orchestrator for Multilingual IaC Deployments

J Diaz-de-Arcaya, E Osaba, G Benguria… - Companion of the 2023 …, 2023 - dl.acm.org
Over the last few years, DevOps methodologies have promoted a more streamlined
operationalization of software components in production environments. Infrastructure as …

[PDF][PDF] Systematic Design, Deployment and Evaluation of Gamified Cybersecurity Learning Environments

S Karagiannis - 2022 - researchgate.net
This research aims to validate the learning theory of constructivism and identify the possible
systematic approaches to design, deploy, and evaluate cybersecurity learning environments …

A Cloud-Based Platform for Encrypted Data Mining as a Service

S Reyes-Palacios, M Morales-Sandoval… - 2023 Mexican …, 2023 - ieeexplore.ieee.org
The accelerated production of data in digital format has intensified the need for efficient data
analysis and knowledge extraction tools for decision-making. With the increasing use of …