Kubernetes as a standard container orchestrator-a bibliometric analysis
C Carrión - Journal of Grid Computing, 2022 - Springer
Container orchestration systems simplify the deployment and maintenance of container-
based applications, but develo** efficient and well-defined orchestration systems is a …
based applications, but develo** efficient and well-defined orchestration systems is a …
Container performance and vulnerability management for container security using docker engine
Containers have evolved to support microservice architecture as a low‐cost alternative to
virtual machines. Containers are increasingly prevalent in the virtualization landscape …
virtual machines. Containers are increasingly prevalent in the virtualization landscape …
Multi‐Cloud Integration Security Framework Using Honeypots
This rapidly changing digital world is always sensitive to improving security and resilience to
protect the inhabitants of this ecosystem in terms of data, processes, repositories …
protect the inhabitants of this ecosystem in terms of data, processes, repositories …
[PDF][PDF] Query optimization framework for graph database in cloud dew environment
The query optimizer uses cost-based optimization to create an execution plan with the least
cost, which also consumes the least amount of resources. The challenge of query …
cost, which also consumes the least amount of resources. The challenge of query …
Triple-Entry Accounting (TEA) and Blockchain Implementation in Accounting and Finance-A Survey
Accounting practices are based on their underlying accounting principles, and currently, the
Double-Entry Accounting (DEA) is used in both manual and computer-based Accounting …
Double-Entry Accounting (DEA) is used in both manual and computer-based Accounting …
Analysis of Network Security in IoT-based Cloud Computing Using Machine Learning
H Naeem - International Journal for Electronic Crime Investigation, 2023 - ijeci.lgu.edu.pk
Network security in IoT-based cloud computing can benefit greatly from the application of
machine learning techniques. IoT devices introduce unique security challenges with their …
machine learning techniques. IoT devices introduce unique security challenges with their …
[PDF][PDF] Cost Effective About IoT-Based Accordingly to Weather Monitoring System Development and Improve Averageof Crops
T Iftikhar, S Zubair, M waseem Iqbal… - Jilin Daxue Xuebao …, 2023 - researchgate.net
Measurement of climate situations is critical for adapting to excessive weather modifications
and global warming, which happened due to intense climate situations. In this, we have …
and global warming, which happened due to intense climate situations. In this, we have …
Survey Paper: Optimization and Monitoring of Kubernetes Cluster using Various Approaches
This research compares different methods for optimizing and monitoring Kubernetes
clusters. Three referenced journals are analyzed:" Kubernetes cluster optimization using …
clusters. Three referenced journals are analyzed:" Kubernetes cluster optimization using …
Optimizing Virtualization for Client-Based Workloads in Cloud Computing
MI Sarwar - International Journal for Electronic Crime Investigation, 2023 - ijeci.lgu.edu.pk
Cloud computing has transformed the IT field by offering adaptable and versatile resources
to cater to the increasing demands of businesses and organizations. Virtualization …
to cater to the increasing demands of businesses and organizations. Virtualization …
Malware Attacks Detection in Network Security using Deep Learning Approaches
H Naeem, A Batool - International Journal for Electronic Crime …, 2023 - ijeci.lgu.edu.pk
This abstract provides an overview of the study on the use of deep learning approaches,
specifically Recurrent Neural Networks (RNNs) and Long Short-Term Memory Networks …
specifically Recurrent Neural Networks (RNNs) and Long Short-Term Memory Networks …