Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey
B Liang, MA Gregory, S Li - Journal of Network and Computer Applications, 2022 - Elsevier
Traffic over mobile cellular networks has significantly increased over the past decade, and
with the introduction of 5G there is a growing focus on throughput capacity, reliability, and …
with the introduction of 5G there is a growing focus on throughput capacity, reliability, and …
Container security: precaution levels, mitigation strategies, and research perspectives
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …
during the past two decades. Using conventional techniques, software developers write …
Container security: Issues, challenges, and the road ahead
Containers emerged as a lightweight alternative to virtual machines (VMs) that offer better
microservice architecture support. The value of the container market is expected to reach 2.7 …
microservice architecture support. The value of the container market is expected to reach 2.7 …
Edge computing perspectives: Architectures, technologies, and open security issues
Edge and Fog Computing will be increasingly pervasive in the years to come due to the
benefits they bring in many specific use-case scenarios over traditional Cloud Computing …
benefits they bring in many specific use-case scenarios over traditional Cloud Computing …
A measurement study on linux container security: Attacks and countermeasures
X Lin, L Lei, Y Wang, J Jing, K Sun… - Proceedings of the 34th …, 2018 - dl.acm.org
Linux container mechanism has attracted a lot of attention and is increasingly utilized to
deploy industry applications. Though it is a consensus that the container mechanism is not …
deploy industry applications. Though it is a consensus that the container mechanism is not …
On the security of containers: Threat modeling, attack analysis, and mitigation strategies
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
Canadian Association of Radiologists white paper on ethical and legal issues related to artificial intelligence in radiology
Canadian Association of Radiologists … - Canadian …, 2019 - journals.sagepub.com
Artificial intelligence (AI) software that analyzes medical images is becoming increasingly
prevalent. Unlike earlier generations of AI software, which relied on expert knowledge to …
prevalent. Unlike earlier generations of AI software, which relied on expert knowledge to …
A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …
intrusion detection and blockchain applications against cyber attacks. This work aims to …
[HTML][HTML] Security in Cloud-Native Services: A Survey
T Theodoropoulos, L Rosa, C Benzaid, P Gray… - … of Cybersecurity and …, 2023 - mdpi.com
Cloud-native services face unique cybersecurity challenges due to their distributed
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …
Container technologies for arm architecture: A comprehensive survey of the state-of-the-art
Container technology is becoming increasingly popular as an alternative to traditional virtual
machines because it provides a faster, lighter, and more portable runtime environment for …
machines because it provides a faster, lighter, and more portable runtime environment for …