Results 21 to 30 of about 199,972 (293)

Research on Persistent Storage-Oriented Mimic Defense Technology in Container Clouds [PDF]

open access: yesJisuanji gongcheng
Persistent storage security threats in the container cloud directly affect the creation and operation of the container. Traditional defense methods cannot detect an attack based on unknown vulnerabilities in time and establish corresponding defense ...
Daoqing LIU, Hongchao HU, Shumin HUO
doaj   +1 more source

Risk Assessment for Maritime Container Transportation Security

open access: yesJournal of Eta Maritime Science, 2023
Container shipping is the backbone of the global supply chain, and its security is directly linked to the global economy. Disruptions in container transportation could have severe consequences, such as an increase in transport and insurance costs and ...
Ferhan Oral, Serim Paker
doaj   +1 more source

PluralisMAC: a generic multi-MAC framework for heterogeneous, multiservice wireless networks, applied to smart containers [PDF]

open access: yes, 2012
Developing energy-efficient MAC protocols for lightweight wireless systems has been a challenging task for decades because of the specific requirements of various applications and the varying environments in which wireless systems are deployed.
De Mil, Pieter   +4 more
core   +2 more sources

A software approach to defeating side channels in last-level caches

open access: yes, 2016
We present a software approach to mitigate access-driven side-channel attacks that leverage last-level caches (LLCs) shared across cores to leak information between security domains (e.g., tenants in a cloud).
Arcangeli A.   +6 more
core   +1 more source

U-SCAD: An Unsupervised Method of System Call-Driven Anomaly Detection for Containerized Edge Clouds

open access: yesFuture Internet
Container technology is currently one of the mainstream technologies in the field of cloud computing, yet its adoption in resource-constrained, latency-sensitive edge environments introduces unique security challenges.
Jiawei Ye   +4 more
doaj   +1 more source

Container Technologies for ARM Architecture: A Comprehensive Survey of the State-of-the-Art

open access: yesIEEE Access, 2022
Container technology is becoming increasingly popular as an alternative to traditional virtual machines because it provides a faster, lighter, and more portable runtime environment for the applications.
Shahidullah Kaiser   +3 more
doaj   +1 more source

Secure Containers in Android

open access: yesProceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
Bring Your Own Device (BYOD) is a growing trend among enterprises, aiming to improve workers' mobility and productivity via their smartphones. The threats and dangers posed by the smartphones to the enterprise are also ever-growing. Such dangers can be mitigated by running the enterprise software inside a "secure container" on the smartphone.
Kanonov, Uri, Wool, Avishai
openaire   +2 more sources

Applications containers security model

open access: yesCollection "Information Technology and Security", 2020
It has been established the purpose of container environments for the development, delivery and operation of various types of the software applications. The web and mobile applications have the most widespread use. This is due to the container media’s emphasis on quick loading and installation.
openaire   +3 more sources

Assessment of crisis readiness to move a patient from the airport with suspected Ebola [PDF]

open access: yes, 2019
The aim of this article is to verify the readiness of patient transport from the airport with symptoms for Ebola disease by the rescue services of the Integrated Rescue System of the Czech Republic.
Blahová, Marta, Hromada, Martin
core   +1 more source

The HIT Network for Children and Adolescents With CNS Tumors Facilitates Improvements of Diagnostic Assessments, Multimodal Treatments, Individual Counseling, and Research in Germany, Austria, and Switzerland

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski   +59 more
wiley   +1 more source

Home - About - Disclaimer - Privacy