Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey

B Liang, MA Gregory, S Li - Journal of Network and Computer Applications, 2022 - Elsevier
Traffic over mobile cellular networks has significantly increased over the past decade, and
with the introduction of 5G there is a growing focus on throughput capacity, reliability, and …

Container security: precaution levels, mitigation strategies, and research perspectives

DP VS, SC Sethuraman, MK Khan - Computers & Security, 2023 - Elsevier
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …

Container security: Issues, challenges, and the road ahead

S Sultan, I Ahmad, T Dimitriou - IEEE access, 2019 - ieeexplore.ieee.org
Containers emerged as a lightweight alternative to virtual machines (VMs) that offer better
microservice architecture support. The value of the container market is expected to reach 2.7 …

Edge computing perspectives: Architectures, technologies, and open security issues

M Caprolu, R Di Pietro, F Lombardi… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Edge and Fog Computing will be increasingly pervasive in the years to come due to the
benefits they bring in many specific use-case scenarios over traditional Cloud Computing …

A measurement study on linux container security: Attacks and countermeasures

X Lin, L Lei, Y Wang, J Jing, K Sun… - Proceedings of the 34th …, 2018 - dl.acm.org
Linux container mechanism has attracted a lot of attention and is increasingly utilized to
deploy industry applications. Though it is a consensus that the container mechanism is not …

On the security of containers: Threat modeling, attack analysis, and mitigation strategies

AY Wong, EG Chekole, M Ochoa, J Zhou - Computers & Security, 2023 - Elsevier
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …

Canadian Association of Radiologists white paper on ethical and legal issues related to artificial intelligence in radiology

Canadian Association of Radiologists … - Canadian …, 2019 - journals.sagepub.com
Artificial intelligence (AI) software that analyzes medical images is becoming increasingly
prevalent. Unlike earlier generations of AI software, which relied on expert knowledge to …

A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions

O Alkadi, N Moustafa, B Turnbull - IEEE Access, 2020 - ieeexplore.ieee.org
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …

[HTML][HTML] Security in Cloud-Native Services: A Survey

T Theodoropoulos, L Rosa, C Benzaid, P Gray… - … of Cybersecurity and …, 2023 - mdpi.com
Cloud-native services face unique cybersecurity challenges due to their distributed
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …

Container technologies for arm architecture: A comprehensive survey of the state-of-the-art

S Kaiser, MS Haq, AŞ Tosun, T Korkmaz - IEEE Access, 2022 - ieeexplore.ieee.org
Container technology is becoming increasingly popular as an alternative to traditional virtual
machines because it provides a faster, lighter, and more portable runtime environment for …