the internet of things (IoT) is a vast network of diverse devices that has expanded into various aspects of our daily lives. However, its growth comes with increased security challenges, particularly in developing eff...
详细信息
the articulate utilization of docker container assets in Cloud computing is one strategic pivotal aspect of the underlying rationale for customers to conjecture on their ventures. It can be standardized under the orga...
详细信息
ISBN:
(纸本)9798350396690
the articulate utilization of docker container assets in Cloud computing is one strategic pivotal aspect of the underlying rationale for customers to conjecture on their ventures. It can be standardized under the organization's viewpoints toward its purposes and objectives, given the facilities provided by a cloud service provider. IaaS (Infrastructure-as-a-Service) topology offers many opportunities, including serverless capability in a docker container through software abstraction, and magnifying customization. Techniques such as intensifying the quality of streamlined services, and uplifts productivity, become sufficient evidence of underlying equal responsibilities between provider and customer, which need to be evaluated its risks periodically to improve the resilience of containerized objects. this study contributes alternate insight concerning risk assessment methodology in a docker container environment to mitigate the risk rating and propose risk treatment recommendations for cloud providers and customers. To grasp unified security perception in analyzing assets, threats, and vulnerabilities, harnessing several methods and international standards such as the Analytical Hierarchy process, Partial Dependency, ISO 27K Family, MITRE ATT&CK, EBIOS Risk Manager, and NIST 800-30. the experiment uses a real-world threat group from MITRE ATT&CK called TeamTNT.
Proof-of-Work (PoW) quickly became one of the most well-known algorithms as the consensus-building method powering the blockchain. However, consensus-building algorithms based on PoW have the issue of wasting a substa...
详细信息
Special equipment safety is an important part of the public safety system, which is related to the healthy development of the economy and society and the well-being of people's lives. In recent years, withthe rap...
详细信息
作者:
Solainayagi, P.
Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
Climate change, cyberattacks, and renewable energy integration threaten the contemporary electrical system. this paper proposes integrating decentralized energy production, the internet of things (IoT), microgrids, an...
详细信息
this article studies the influence of the internet and big data on social governance research and practice. Withthe continuous development and application of big data technology, big data can also be developed and ut...
详细信息
At present, internettechnology is profoundly affecting various domestic industries, not only promoting industry innovation, but also changing various fields of economy and society. Educational services are no excepti...
详细信息
this paper presents a comprehensive review of emerging technologies in V2X communication and Vehicular Edge computing (VEC) for sustainable internet of Vehicles (IoV) in the 6G era. the paper employs the PRISMA method...
详细信息
Due to the growing number of internet users, Web applications face increasing challenges in providing constant availability, resilience to software failures, and rapid responses to user requests. therefore, performanc...
详细信息
ISBN:
(纸本)9798400716218
Due to the growing number of internet users, Web applications face increasing challenges in providing constant availability, resilience to software failures, and rapid responses to user requests. therefore, performance testing of web applications and monitoring them during high traffic are essential activities to evaluate the behavior of a system and ensure user satisfaction even during periods of high demand. However, the effectiveness of performance tests depends on the modeled user behavior in the tests. the closer the scenarios modeled in performance tests correspond to actual user behavior, the more valuable are the insights into the quality of the system that result from the performance tests performed. this paper presents a novel approach to traffic generation that leverages the concepts of workload patterns from cloud computing to model different scenarios of user interaction with a web application. the traffic generation can be used to test the performance and observe the behavior of web applications under real conditions of specific user interaction scenarios. the concepts are demonstrated in a proof-of-concept implementation and evaluated in a case study. the results of the case study show that the concepts do work as intended and the generated traffic follows the selected workload pattern. As a result, the resource usage of the case study system behaves differently in each scenario of user interaction withthe web application.
Withthe advancement of mobile device technology, network communication has become more common and convenient. However, due to the limitations of mobile terminals in terms of processing power and storage space, the pe...
详细信息
暂无评论