Results 1 to 10 of about 53,381 (181)

A Step Towards Generation of DoS/DDoS Attacks Dataset for Docker-Centric Computing [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences, 2022
Docker provides an effective containerized environment for modern computing. However, the security issues present in Docker provide an edge to the attackers thus resulting in various attacks.
Aparna Tomar   +3 more
doaj   +1 more source

High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption

open access: yesEnergies, 2022
In recent years, container-based virtualization technology for edge and cloud computing has advanced dramatically. Virtualization solutions based on Docker Containers provide a more lightweight and efficient virtual environment for Edge and cloud-based ...
Vishnu Kumar Kaliappan   +5 more
doaj   +1 more source

Docker-pi: Docker container deployment in fog computing infrastructures [PDF]

open access: yesInternational Journal of Cloud Computing, 2020
The transition from virtual machine-based infrastructures to container-based ones brings the promise of swift and efficient software deployment in large-scale computing infrastructures. However, in fog computing environments which are often made of very small computers such as Raspberry PIs, deploying even a very simple Docker container may take ...
Ahmed, Arif, Pierre, Guillaume
openaire   +2 more sources

Reflections on an international engagement in the fight against torture

open access: yesTorture, 2022
Contribution to the 30th Anniversary of the Torture Journal by Henrik Døcker. The author describes some of the early beginnings of the RCT and Torture Journal.
Henrik Døcker
doaj   +1 more source

A Blockchain IoT (BIoT) Integrated into Futuristic Networking for Industry [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences, 2022
Blockchain innovation is the most confided in across the board cryptosystem that gives a structure to getting exchanges over networks because of its irreversibility and permanence attributes.
N. Nasurudeen Ahamed, R. Vignesh
doaj   +1 more source

Cancelled Time

open access: yesPerformance Philosophy, 2022
The COVID-19 pandemic has affected contemporary performing arts in several ways, not least in the form of mass cancellations of performances and production processes in many countries around the world in the year 2020.
Georg Döcker
doaj   +1 more source

Analysis of DoS attacks on Docker inter-component stdio copy

open access: yes网络与信息安全学报, 2020
In recent years, Docker has been widely deployed due to its flexibility and high scalability. However, its modular design leads to the DoS attacks on inter-component communication.
ZHOU Tianyu   +3 more
doaj   +3 more sources

DIVDS: Docker Image Vulnerability Diagnostic System

open access: yesIEEE Access, 2020
Since the development of Docker in 2013, container utilization projects have emerged in various fields. Docker has the advantage of being able to quickly share application build environments among developers through container technology, but it does not ...
Soonhong Kwon, Jong-Hyouk Lee
doaj   +1 more source

GO-Docker: A Batch Scheduling System with Docker Containers [PDF]

open access: yes2015 IEEE International Conference on Cluster Computing, 2015
Multi user open source batch scheduling software based on Docker containers with custom scheduler and executor plugin mechanisms.
Sallou, Olivier, Monjeaud, Cyril
openaire   +1 more source

Design of a Cattle-Health-Monitoring System Using Microservices and IoT Devices

open access: yesComputers, 2022
This article proposes a new concept of microservice-based architecture for the future of distributed systems. This architecture is a bridge between Internet-of-Things (IoT) devices and applications that are used to monitor cattle health in real time for ...
Isak Shabani, Tonit Biba, Betim Çiço
doaj   +1 more source

Home - About - Disclaimer - Privacy