Results 21 to 30 of about 199,972 (293)
Research on Persistent Storage-Oriented Mimic Defense Technology in Container Clouds [PDF]
Persistent storage security threats in the container cloud directly affect the creation and operation of the container. Traditional defense methods cannot detect an attack based on unknown vulnerabilities in time and establish corresponding defense ...
Daoqing LIU, Hongchao HU, Shumin HUO
doaj +1 more source
Risk Assessment for Maritime Container Transportation Security
Container shipping is the backbone of the global supply chain, and its security is directly linked to the global economy. Disruptions in container transportation could have severe consequences, such as an increase in transport and insurance costs and ...
Ferhan Oral, Serim Paker
doaj +1 more source
PluralisMAC: a generic multi-MAC framework for heterogeneous, multiservice wireless networks, applied to smart containers [PDF]
Developing energy-efficient MAC protocols for lightweight wireless systems has been a challenging task for decades because of the specific requirements of various applications and the varying environments in which wireless systems are deployed.
De Mil, Pieter +4 more
core +2 more sources
A software approach to defeating side channels in last-level caches
We present a software approach to mitigate access-driven side-channel attacks that leverage last-level caches (LLCs) shared across cores to leak information between security domains (e.g., tenants in a cloud).
Arcangeli A. +6 more
core +1 more source
U-SCAD: An Unsupervised Method of System Call-Driven Anomaly Detection for Containerized Edge Clouds
Container technology is currently one of the mainstream technologies in the field of cloud computing, yet its adoption in resource-constrained, latency-sensitive edge environments introduces unique security challenges.
Jiawei Ye +4 more
doaj +1 more source
Container Technologies for ARM Architecture: A Comprehensive Survey of the State-of-the-Art
Container technology is becoming increasingly popular as an alternative to traditional virtual machines because it provides a faster, lighter, and more portable runtime environment for the applications.
Shahidullah Kaiser +3 more
doaj +1 more source
Bring Your Own Device (BYOD) is a growing trend among enterprises, aiming to improve workers' mobility and productivity via their smartphones. The threats and dangers posed by the smartphones to the enterprise are also ever-growing. Such dangers can be mitigated by running the enterprise software inside a "secure container" on the smartphone.
Kanonov, Uri, Wool, Avishai
openaire +2 more sources
Applications containers security model
It has been established the purpose of container environments for the development, delivery and operation of various types of the software applications. The web and mobile applications have the most widespread use. This is due to the container media’s emphasis on quick loading and installation.
openaire +3 more sources
Assessment of crisis readiness to move a patient from the airport with suspected Ebola [PDF]
The aim of this article is to verify the readiness of patient transport from the airport with symptoms for Ebola disease by the rescue services of the Integrated Rescue System of the Czech Republic.
Blahová, Marta, Hromada, Martin
core +1 more source
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski +59 more
wiley +1 more source

