2019 42nd International Conference on Telecommunications and Signal Processing (TSP) 2019
DOI: 10.1109/tsp.2019.8768825
|View full text |Cite
|
Sign up to set email alerts
|

Building and Evaluating User Network Profiles for Cybersecurity Using Serverless Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…This guarantees that effective vulnerability management is prioritized at each and every level of the development process before moving on to the next version of the code. Additionally, it ensures ongoing testing and improvement of the program through patch priority, safeguarding updates, and finding vulnerabilities, which enables developers to keep one step ahead of attackers [113,114].…”
Section: Separate Application Development Environmentsmentioning
confidence: 99%
“…This guarantees that effective vulnerability management is prioritized at each and every level of the development process before moving on to the next version of the code. Additionally, it ensures ongoing testing and improvement of the program through patch priority, safeguarding updates, and finding vulnerabilities, which enables developers to keep one step ahead of attackers [113,114].…”
Section: Separate Application Development Environmentsmentioning
confidence: 99%
“…Meanwhile, the serverless architecture is modeled into smaller, eventdriven, and stateless 'triggers' (events) and 'actions' (functions) [175]. Each component handles different pieces of data and runs independently [176]. Spreading business [77,177] and also decreases the chance of a single point of failure [77].…”
Section: Serverless Computing Vs Traditional Cloudmentioning
confidence: 99%