docker安全论文.zip

上传者: xiaoxiaoguaixiashi_ | 上传时间: 2021-02-08 19:08:53 | 文件大小: 70.17MB | 文件类型: ZIP
2017-2020年来容器安全相关的论文收集,包括顶会论文、硕/博论文等。

文件下载

资源详情

[{"title":"( 55 个子文件 70.17MB ) docker安全论文.zip","children":[{"title":"精读论文","children":[{"title":"专家团队论文","children":[{"title":"A study on the security implications of information leakages.pdf <span style='color:#111;'> 2.32MB </span>","children":null,"spread":false}],"spread":true},{"title":".DS_Store <span style='color:#111;'> 6.00KB </span>","children":null,"spread":false},{"title":"最新-CCF论文","children":[{"title":"ContainerLeaks Emerging Security Threats of.pdf <span style='color:#111;'> 1.27MB </span>","children":null,"spread":false},{"title":"SPEAKER Split-Phase Execution of Application Containers.pdf <span style='color:#111;'> 406.73KB </span>","children":null,"spread":false},{"title":"Physical Disentanglement in a Container-Based.pdf <span style='color:#111;'> 697.27KB </span>","children":null,"spread":false},{"title":"Docker-sec A Fully Automated Container Security.pdf <span style='color:#111;'> 254.75KB </span>","children":null,"spread":false},{"title":"A Container-based DoS Attack-Resilient Control.pdf <span style='color:#111;'> 2.52MB </span>","children":null,"spread":false},{"title":"Iron Isolating Network-based CPU.pdf <span style='color:#111;'> 925.81KB </span>","children":null,"spread":false},{"title":"On the Relation Between Outdated Docker Containers, Severity Vulnerabilities, and Bugs.pdf <span style='color:#111;'> 517.04KB </span>","children":null,"spread":false},{"title":"Security Namespace Making Linux Security.pdf <span style='color:#111;'> 490.64KB </span>","children":null,"spread":false}],"spread":true},{"title":"Lic-Sec an enhanced AppArmor Docker security profile.pdf <span style='color:#111;'> 997.23KB </span>","children":null,"spread":false}],"spread":true},{"title":"经典论文(引用多","children":[{"title":"Docker Lightweight Linux Containers for Consistent Development and.pdf <span style='color:#111;'> 297.01KB </span>","children":null,"spread":false},{"title":"Containers and virtual machines at scale.pdf <span style='color:#111;'> 5.68MB </span>","children":null,"spread":false},{"title":"An Updated Performance Comparison of.pdf <span style='color:#111;'> 109.65KB </span>","children":null,"spread":false},{"title":"Performance evaluation.pdf <span style='color:#111;'> 356.21KB </span>","children":null,"spread":false},{"title":"Container-based operating system virtualization.pdf <span style='color:#111;'> 843.68KB </span>","children":null,"spread":false},{"title":"A study of security vulnerabilities on.pdf <span style='color:#111;'> 755.88KB </span>","children":null,"spread":false},{"title":"Unikernels Library operating systems for the.pdf <span style='color:#111;'> 981.81KB </span>","children":null,"spread":false},{"title":"Harbormaster.pdf <span style='color:#111;'> 600.84KB </span>","children":null,"spread":false},{"title":"Understanding Container Isolation.pdf <span style='color:#111;'> 1.91MB </span>","children":null,"spread":false}],"spread":true},{"title":"中文硕-博论文","children":[{"title":"A Methodology for Penetration Testing Docker Systems.pdf <span style='color:#111;'> 1.75MB </span>","children":null,"spread":false},{"title":"Linux容器防护技术研究_魏小锋.caj <span style='color:#111;'> 1.88MB </span>","children":null,"spread":false},{"title":"面向Docker容器异常检测系统的设计与实现_郝启臣.caj <span style='color:#111;'> 3.55MB </span>","children":null,"spread":false},{"title":"基于Docker平台的安全信息管理的研究与实现_艾明振.caj <span style='color:#111;'> 6.05MB </span>","children":null,"spread":false},{"title":"容器级虚拟化的安全审计与监控研究_吴芦峰.caj <span style='color:#111;'> 7.22MB </span>","children":null,"spread":false},{"title":"Linux环境下的容器安全性分析评估.pdf <span style='color:#111;'> 1.43MB </span>","children":null,"spread":false},{"title":"Docker容器安全隔离机制研究_胡家发.caj <span style='color:#111;'> 5.38MB </span>","children":null,"spread":false}],"spread":true},{"title":"略读论文","children":[{"title":"DockerPolicyModules.pdf <span style='color:#111;'> 144.01KB </span>","children":null,"spread":false},{"title":"SGX-Aware Container Orchestration.pdf <span style='color:#111;'> 614.96KB </span>","children":null,"spread":false},{"title":"SPEAKER Split-Phase Execution of.pdf <span style='color:#111;'> 406.73KB </span>","children":null,"spread":false},{"title":"Security in Container-based Virtualization through vTPM.pdf <span style='color:#111;'> 231.47KB </span>","children":null,"spread":false},{"title":"Ryoan A Distributed Sandbox for Untrusted Computation.pdf <span style='color:#111;'> 833.06KB </span>","children":null,"spread":false},{"title":"Securing the infrastructure and the workloads of linux containers.pdf <span style='color:#111;'> 335.74KB </span>","children":null,"spread":false},{"title":"Mining Sandboxes for Linux Containers.pdf <span style='color:#111;'> 269.47KB </span>","children":null,"spread":false},{"title":"Securing Docker Containers from Denial of Service.pdf <span style='color:#111;'> 152.06KB </span>","children":null,"spread":false},{"title":"Enhancing Security of Docker using.pdf <span style='color:#111;'> 130.49KB </span>","children":null,"spread":false},{"title":"SCONE Secure linux containers with intel SGX.pdf <span style='color:#111;'> 2.23MB </span>","children":null,"spread":false}],"spread":true},{"title":"权威博客","children":[{"title":"eu-15-Bettini-Vulnerability-Exploitation-In-Docker-Container-Environments-wp.pdf <span style='color:#111;'> 3.74MB </span>","children":null,"spread":false}],"spread":true},{"title":"英文综述","children":[{"title":"Emerging Trends, Techniques and Open Issues of.pdf <span style='color:#111;'> 4.35MB </span>","children":null,"spread":false},{"title":"Application Container Security Guide.pdf <span style='color:#111;'> 748.10KB </span>","children":null,"spread":false},{"title":"The Challenges of the Data Privacy in the Cloud using Docker A Systematic Review.pdf <span style='color:#111;'> 110.69KB </span>","children":null,"spread":false},{"title":"A Measurement Study on Linux Container Security.pdf <span style='color:#111;'> 3.04MB </span>","children":null,"spread":false},{"title":"A Review of Docker Security Research (2).pdf <span style='color:#111;'> 742.76KB </span>","children":null,"spread":false},{"title":"Security Analysis and Threats Detection Techniques on Docker Container.pdf <span style='color:#111;'> 155.70KB </span>","children":null,"spread":false},{"title":"A review of native container security for running application.pdf <span style='color:#111;'> 284.69KB </span>","children":null,"spread":false},{"title":"A Defense Method against Docker Escape Attack.pdf <span style='color:#111;'> 1.01MB </span>","children":null,"spread":false},{"title":"Cloud Container Technologies.pdf <span style='color:#111;'> 2.85MB </span>","children":null,"spread":false},{"title":"On the Relation between Outdated Docker.pdf <span style='color:#111;'> 491.33KB </span>","children":null,"spread":false},{"title":"A Study, Analysis and deep dive on Cloud PAAS.pdf <span style='color:#111;'> 295.90KB </span>","children":null,"spread":false},{"title":"Containers and Clusters for Edge Cloud.pdf <span style='color:#111;'> 387.52KB </span>","children":null,"spread":false},{"title":"A Review of Docker Security Research.pdf <span style='color:#111;'> 742.76KB </span>","children":null,"spread":false},{"title":"Docker ecosystem – Vulnerability Analysis.pdf <span style='color:#111;'> 2.07MB </span>","children":null,"spread":false},{"title":"Enhancing Security of Docker using.pdf <span style='color:#111;'> 130.48KB </span>","children":null,"spread":false},{"title":"Automated Cloud Infrastructure, Continuous Integration and Continuous.pdf <span style='color:#111;'> 232.21KB </span>","children":null,"spread":false},{"title":"Container Security Issues, Challenges.pdf <span style='color:#111;'> 4.22MB </span>","children":null,"spread":false}],"spread":false}],"spread":true}]

评论信息

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明