Microservice vulnerability analysis: A literature review with empirical insights
Microservice architectures are revolutionizing both small businesses and large corporations,
igniting a new era of innovation with their exceptional advantages in maintainability …
igniting a new era of innovation with their exceptional advantages in maintainability …
Chatnvd: Advancing cybersecurity vulnerability assessment with large language models
The increasing frequency and sophistication of cybersecurity vulnerabilities in software
systems underscore the urgent need for robust and effective methods of vulnerability …
systems underscore the urgent need for robust and effective methods of vulnerability …
[HTML][HTML] A novel transient strategy: transient electronics based on energetic materials
Y Wang, Z Ma, W He, Y Zhang, P Liu - Defence Technology, 2024 - Elsevier
Transient electronics is a versatile tool that finds applications in various fields, including
medical biology, environmental protection, and data information security. In the context of …
medical biology, environmental protection, and data information security. In the context of …
Smart HPA: A Resource-Efficient Horizontal Pod Auto-scaler for Microservice Architectures
Microservice architectures have gained prominence in both academia and industry, offering
enhanced agility, reusability, and scalability. To simplify scaling operations in microservice …
enhanced agility, reusability, and scalability. To simplify scaling operations in microservice …
A survey on immersive cyber situational awareness systems
Cyber situational awareness systems are increasingly used for creating cyber common
operating pictures for cybersecurity analysis and education. However, these systems face …
operating pictures for cybersecurity analysis and education. However, these systems face …
Machine Learning Driven Smishing Detection Framework for Mobile Security
The increasing reliance on smartphones for communication, financial transactions, and
personal data management has made them prime targets for cyberattacks, particularly …
personal data management has made them prime targets for cyberattacks, particularly …
Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning
This paper addresses a significant gap in Autonomous Cyber Operations (ACO) literature:
the absence of effective edge-blocking ACO strategies in dynamic, real-world networks. It …
the absence of effective edge-blocking ACO strategies in dynamic, real-world networks. It …
[PDF][PDF] Comparative analysis of machine learning models for PDF malware detection: Evaluating different training and testing criteria
The proliferation of maliciously coded documents as file transfers increase has led to a rise
in sophisticated attacks. Portable Document Format (PDF) files have emerged as a major …
in sophisticated attacks. Portable Document Format (PDF) files have emerged as a major …
Hardening Active Directory Graphs via Evolutionary Diversity Optimization based Policies
Active Directory (AD) is the default security management system for Windows domain
networks. An AD environment can be described as a cyber-attack graph, with nodes …
networks. An AD environment can be described as a cyber-attack graph, with nodes …
Towards Resource-Efficient Reactive and Proactive Auto-Scaling for Microservice Architectures
Microservice architectures have become increasingly popular in both academia and
industry, providing enhanced agility, elasticity, and maintainability in software development …
industry, providing enhanced agility, elasticity, and maintainability in software development …