Results 71 to 80 of about 1,217,812 (237)

Security Hardening and Compliance Assessment of Kubernetes Control Plane and Workloads

open access: yesJournal of Cybersecurity and Privacy
Containerized applications are pivotal to contemporary cloud-native architectures, yet they present novel security challenges. Kubernetes, a prevalent open-source platform for container orchestration, provides robust automation but lacks inherent ...
Zlatan Morić   +2 more
doaj   +1 more source

A Controlled Comparative Evaluation of Infrastructure as Code Tools: Deployment Performance and Maintainability Across Terraform, Pulumi, and AWS CloudFormation

open access: yesApplied Sciences
Infrastructure as Code (IaC) underpins automated cloud provisioning in modern DevOps environments; however, controlled comparative evaluations of leading IaC tools under identical conditions remain limited.
Damir Regvart   +2 more
doaj   +1 more source

Infinity Algebras and the Homology of Graph Complexes

open access: yes, 1996
An A-infinity algebra is a generalization of a associative algebra, and an L-infinity algebra is a generalization of a Lie algebra. In this paper, we show that an L-infinity algebra with an invariant inner product determines a cycle in the homology of ...
Penkava, Michael
core   +1 more source

Evaluating the Operational Impact of Automated Endpoint Compliance and Security Monitoring in Linux Environments

open access: yesJournal of Cybersecurity and Privacy
Ensuring ongoing endpoint security compliance across diverse, hybrid IT infrastructures poses a continual operational challenge, especially in enterprise Linux systems, where manual verification methods are difficult to scale and prone to inconsistency ...
Zlatan Morić   +2 more
doaj   +1 more source

Free algebra structure: categorical algebras [PDF]

open access: yesBulletin of the Australian Mathematical Society, 1970
One of the more important concepts in the study of universal algebras is that of a free algebra. It is our purpose in this communication to describe the structure of the free algebra Kk() of k generators (k a positive integer) determined by a categorical algebra, and to indicate how this information encompasses results in such diverse areas as the ...
openaire   +2 more sources

Network Position in Global Trade Systems and Cyberattack Risk: Evidence from Country-Level Trade Networks, 2010–2020

open access: yesSystems
Cyberattacks increasingly generate systemic economic and geopolitical effects in an era of dense global interdependence. While prior research emphasises geopolitical rivalry, institutional capacity, and technological sophistication as determinants of ...
Zlatan Morić   +2 more
doaj   +1 more source

Construction of Weakly Self-Dual Normal Bases and Its Aplication in Orthogonal Transform Encoding Cyclic Codes

open access: yesEPJ Web of Conferences, 2014
In 1986 Fumy proposed a simplified approach to calculate inverse discrete Fourier transform (IDFT) using normal bases and its dual in encoding cyclic codes in the spectral domain.
Irwansyah   +4 more
doaj   +1 more source

Deformations of Batalin-Vilkovisky algebras

open access: yes, 1998
We show that a graded commutative algebra A with any square zero odd differential operator is a natural generalization of a Batalin-Vilkovisky algebra. While such an operator of order 2 defines a Gerstenhaber (Lie) algebra structure on A, an operator of ...
Kravchenko, Olga
core   +1 more source

Multi-order fractional nonlinear evolution equations system

open access: yesPartial Differential Equations in Applied Mathematics
In this paper, the existence and uniqueness of a solution to a multi-order fractional nonlinear evolution equations system are studied by applying Banach’s Fixed Point Theorem and some properties of solution operators associated with the system.
Bambang Hendriya Guswanto   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy