Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Victor Prokhorenko"'
Autor:
Victor Prokhorenko, M. Ali Babar
Publikováno v:
IEEE Access, Vol 8, Pp 28078-28095 (2020)
An increasing number of large-scale distributed systems are being built by incorporating Cloud, Fog, and Edge computing. There is an important need of understanding how to ensure the resilience of systems built using Cloud, Fog, and Edge computing. T
Externí odkaz:
https://doaj.org/article/c94d5a5d131142a9a0ab25ba40e643f8
Publikováno v:
IEEE Internet of Things Journal. 10:9423-9437
Runtime software patching aims to minimize or eliminate service downtime, user interruptions and potential data losses while deploying a patch. Due to modern software systems' high variance and heterogeneity, no universal solutions are available or p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::168c5516e232a86bd931713cc35381d5
http://arxiv.org/abs/2203.12132
http://arxiv.org/abs/2203.12132
A Hybrid cloud is an integration of resources between private and public clouds. It enables users to horizontally scale their on-premises infrastructure up to public clouds in order to improve performance and cut up-front investment cost. This model
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3afb86bfc9ad95b00f98088ca50cd77c
Publikováno v:
Applied Mathematics and Computation. 285:59-78
Due to growing user demand, web application development is becoming increasingly complicated. Multiple programming languages along with the complex multi-tier architecture commonly involved in web application development contribute to the probability
Protecting Web applications is increasingly important due to their high popularity and wide adoption. Therefore, a multitude of protection techniques emerged in effort to secure Web applications, specifically considering valuable and private data com
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1845d298f9dfa7aabaac23662c899199
https://hdl.handle.net/11541.2/121525
https://hdl.handle.net/11541.2/121525
The growing popularity of web applications makes them an attractive target for malicious users. Large amounts of private data commonly processed and stored by web applications are a valuable asset for attackers, resulting in more sophisticated web-or
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3460d1f9c230375ada593e335b2d5aa1
https://hdl.handle.net/11541.2/116904
https://hdl.handle.net/11541.2/116904