Kubernetes as a standard container orchestrator-a bibliometric analysis

C Carrión - Journal of Grid Computing, 2022 - Springer
Container orchestration systems simplify the deployment and maintenance of container-
based applications, but develo** efficient and well-defined orchestration systems is a …

Container performance and vulnerability management for container security using docker engine

T Alyas, S Ali, HU Khan, A Samad… - Security and …, 2022 - Wiley Online Library
Containers have evolved to support microservice architecture as a low‐cost alternative to
virtual machines. Containers are increasingly prevalent in the virtualization landscape …

Multi‐Cloud Integration Security Framework Using Honeypots

T Alyas, K Alissa, M Alqahtani, T Faiz… - Mobile Information …, 2022 - Wiley Online Library
This rapidly changing digital world is always sensitive to improving security and resilience to
protect the inhabitants of this ecosystem in terms of data, processes, repositories …

[PDF][PDF] Query optimization framework for graph database in cloud dew environment

T Alyas, A Alzahrani, Y Alsaawy, K Alissa… - … , Materials & Continua, 2023 - researchgate.net
The query optimizer uses cost-based optimization to create an execution plan with the least
cost, which also consumes the least amount of resources. The challenge of query …

Triple-Entry Accounting (TEA) and Blockchain Implementation in Accounting and Finance-A Survey

R Joseph, R Sharma, MI Sarwar, I Khan… - … for Technology and …, 2023 - ieeexplore.ieee.org
Accounting practices are based on their underlying accounting principles, and currently, the
Double-Entry Accounting (DEA) is used in both manual and computer-based Accounting …

Analysis of Network Security in IoT-based Cloud Computing Using Machine Learning

H Naeem - International Journal for Electronic Crime Investigation, 2023 - ijeci.lgu.edu.pk
Network security in IoT-based cloud computing can benefit greatly from the application of
machine learning techniques. IoT devices introduce unique security challenges with their …

[PDF][PDF] Cost Effective About IoT-Based Accordingly to Weather Monitoring System Development and Improve Averageof Crops

T Iftikhar, S Zubair, M waseem Iqbal… - Jilin Daxue Xuebao …, 2023 - researchgate.net
Measurement of climate situations is critical for adapting to excessive weather modifications
and global warming, which happened due to intense climate situations. In this, we have …

Survey Paper: Optimization and Monitoring of Kubernetes Cluster using Various Approaches

RS Hadikusuma, KO Bachri - Sinkron: jurnal dan penelitian …, 2023 - jurnal.polgan.ac.id
This research compares different methods for optimizing and monitoring Kubernetes
clusters. Three referenced journals are analyzed:" Kubernetes cluster optimization using …

Optimizing Virtualization for Client-Based Workloads in Cloud Computing

MI Sarwar - International Journal for Electronic Crime Investigation, 2023 - ijeci.lgu.edu.pk
Cloud computing has transformed the IT field by offering adaptable and versatile resources
to cater to the increasing demands of businesses and organizations. Virtualization …

Malware Attacks Detection in Network Security using Deep Learning Approaches

H Naeem, A Batool - International Journal for Electronic Crime …, 2023 - ijeci.lgu.edu.pk
This abstract provides an overview of the study on the use of deep learning approaches,
specifically Recurrent Neural Networks (RNNs) and Long Short-Term Memory Networks …