Zeitschriftenartikel zum Thema „CI/CD Security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-46 Zeitschriftenartikel für die Forschung zum Thema "CI/CD Security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Ho-Dac, Hung, und Van-Len Vo. „An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools“. European Modern Studies Journal 8, Nr. 3 (30.07.2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.
Der volle Inhalt der QuelleSingh, Nikhil. „CI/CD Pipeline for Web Applications“. International Journal for Research in Applied Science and Engineering Technology 11, Nr. 5 (31.05.2023): 5218–26. http://dx.doi.org/10.22214/ijraset.2023.52867.
Der volle Inhalt der QuelleAmeta, Upasana, und Ruchi Vyas. „Application Deployment Automation by Streamlining CI/CD Pipelines“. Asian Journal of Engineering and Applied Technology 12, Nr. 1 (24.05.2023): 23–27. http://dx.doi.org/10.51983/ajeat-2023.12.1.3598.
Der volle Inhalt der QuelleBhardwaj, Arvind Kumar, P. K. Dutta und Pradeep Chintale. „Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines“. Babylonian Journal of Networking 2024 (20.08.2024): 162–70. http://dx.doi.org/10.58496/bjn/2024/016.
Der volle Inhalt der QuelleThatikonda, Vamsi Krishna. „Beyond the Buzz: A Journey Through CI/CD Principles and Best Practices“. European Journal of Theoretical and Applied Sciences 1, Nr. 5 (01.09.2023): 334–40. http://dx.doi.org/10.59324/ejtas.2023.1(5).24.
Der volle Inhalt der QuelleMuñoz, Antonio, Aristeidis Farao, Jordy Ryan Casas Correia und Christos Xenakis. „P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements“. Information 12, Nr. 9 (31.08.2021): 357. http://dx.doi.org/10.3390/info12090357.
Der volle Inhalt der QuelleShanmukhi, Bhaskara Sahithi. „Implementing and Using CI/CD: Addressing Key Challenges Faced by Software Developers“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 008 (22.08.2024): 1–3. http://dx.doi.org/10.55041/ijsrem37128.
Der volle Inhalt der QuellePhani Monogya Katikireddi, Prudhvi Singirikonda und Yeshwanth Vasa. „REVOLUTIONIZING DEVOPS WITH QUANTUM COMPUTING: ACCELERATING CI/CD PIPELINES THROUGH ADVANCED COMPUTATIONAL TECHNIQUES“. Innovative Research Thoughts 7, Nr. 2 (30.06.2021): 97–103. http://dx.doi.org/10.36676/irt.v7.i2.1482.
Der volle Inhalt der QuelleJayaprakash Malgund, Spoorthi, und Dr Sowmyarani C N. „AUTOMATING DEPLOYMENTS OF THE LATEST APPLICATION VERSION USING CI-CD WORKFLOW“. International Journal of Engineering Applied Sciences and Technology 7, Nr. 5 (01.09.2022): 99–103. http://dx.doi.org/10.33564/ijeast.2022.v07i05.017.
Der volle Inhalt der QuelleChandrasekhara Mokkapati, Shalu Jain und Pandi Kirupa Gopalakrishna Pandian. „Implementing CI/CD in Retail Enterprises: Leadership Insights for Managing Multi-Billion Dollar Projects“. Innovative Research Thoughts 9, Nr. 1 (30.03.2023): 391–405. http://dx.doi.org/10.36676/irt.v9.i1.1458.
Der volle Inhalt der QuellePerkasa, Panca Rizki, und Evangs Mailoa. „ADOPSI DEVSECOPS UNTUK MENDUKUNG METODE AGILE MENGGUNAKAN TRIVY SEBAGAI SECURITY SCANNER DOCKER IMAGE DAN DOCKERFILE“. Jurnal Indonesia : Manajemen Informatika dan Komunikasi 4, Nr. 3 (10.09.2023): 856–63. http://dx.doi.org/10.35870/jimik.v4i3.291.
Der volle Inhalt der QuelleBipin Gajbhiye, Anshika Aggarwal und Shalu Jain. „Automated Security Testing in DevOps Environments Using AI and ML“. International Journal for Research Publication and Seminar 15, Nr. 2 (29.06.2024): 259–71. http://dx.doi.org/10.36676/jrps.v15.i2.1472.
Der volle Inhalt der QuelleShama, Abriza Mahandis, und Dian W. Chandra. „IMPLEMENTASI STATIC APPLICATION SECURITY TESTING MENGGUNAKAN JENKINS CI/CD BERBASIS DOCKER CONTAINER PADA PT. EMPORIA DIGITAL RAYA“. JURNAL ILMIAH INFORMATIKA 9, Nr. 02 (02.09.2021): 95–99. http://dx.doi.org/10.33884/jif.v9i02.3769.
Der volle Inhalt der QuelleHarrison Oke Ekpobimi, Regina Coelis Kandekere und Adebamigbe Alex Fasanmade. „Front-end development and cybersecurity: A conceptual approach to building secure web applications“. Computer Science & IT Research Journal 5, Nr. 9 (06.09.2024): 2154–68. http://dx.doi.org/10.51594/csitrj.v5i9.1556.
Der volle Inhalt der QuelleAlbaihaqi, Muhammad Fauzan, Anisa Nurul Wilda und Bambang Sugiantoro. „Deploying an Application to Cloud Platform Using Continous Integration and Continous Delivery“. Proceeding International Conference on Science and Engineering 3 (30.04.2020): 279–82. http://dx.doi.org/10.14421/icse.v3.513.
Der volle Inhalt der QuelleRaj, Pritish. „Continuous Integration for New Service Deployment and Service Validation Script for Vault“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 06 (12.06.2024): 1–5. http://dx.doi.org/10.55041/ijsrem35565.
Der volle Inhalt der QuelleAmarjeet Singh, Et al. „Microservices Container Security Orchestration Framework within Kubernetes and Docker for Business-Critical Applications within Digital Transformation“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 3 (31.03.2023): 332–36. http://dx.doi.org/10.17762/ijritcc.v11i3.9863.
Der volle Inhalt der QuelleLonkar, Madhav Sandeep. „HUMAN RESOURCE MANAGEMENT SYSTEM(HRMS)“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 04 (10.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem30538.
Der volle Inhalt der QuelleBysani, Varshitha. „Automation in Cloud Infrastructure Management: Enhancing Efficiency and Reliability“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 06 (11.06.2024): 1–5. http://dx.doi.org/10.55041/ijsrem35750.
Der volle Inhalt der QuelleSingh, Amarjeet. „Microservices Security Vulnerability Remediation approach using Veracode and Checkmarx“. Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 4, Nr. 1 (05.05.2024): 145–51. http://dx.doi.org/10.60087/jaigs.v4i1.128.
Der volle Inhalt der QuelleKrauss, Philip, Vasundra Touré, Kristin Gnodtke, Katrin Crameri und Sabine Österle. „DCC Terminology Service—An Automated CI/CD Pipeline for Converting Clinical and Biomedical Terminologies in Graph Format for the Swiss Personalized Health Network“. Applied Sciences 11, Nr. 23 (29.11.2021): 11311. http://dx.doi.org/10.3390/app112311311.
Der volle Inhalt der QuelleTeisserenc, Benjamin, und Samad M. E. Sepasgozar. „Software Architecture and Non-Fungible Tokens for Digital Twin Applications in the Built Environment“. Buildings 12, Nr. 9 (14.09.2022): 1447. http://dx.doi.org/10.3390/buildings12091447.
Der volle Inhalt der QuelleРедкин, П. А., und А. С. Алёшкин. „Программный комплекс распределенного тестирования веб-приложений“. International Journal of Open Information Technologies 12, Nr. 4 (01.04.2024): 125–32. http://dx.doi.org/10.25559/injoit.2307-8162.12.202404.125-132.
Der volle Inhalt der QuelleTeisserenc, Benjamin, und Samad Sepasgozar. „Project Data Categorization, Adoption Factors, and Non-Functional Requirements for Blockchain Based Digital Twins in the Construction Industry 4.0“. Buildings 11, Nr. 12 (08.12.2021): 626. http://dx.doi.org/10.3390/buildings11120626.
Der volle Inhalt der QuelleLi, Jianzhong, Qiang Wan, Wenjuan Ma, Xiaoting Fang, Chuyi Yin und Jun Cui. „Analysis DevOps efficiency and digital transformation of digital economy, cross-border e-commerce, and brand building:“. Transactions on Computer Science and Intelligent Systems Research 4 (20.06.2024): 38–47. http://dx.doi.org/10.62051/gc7xf329.
Der volle Inhalt der QuellePindoriya, Anurag, und Janki Velani. „Advancements in GitHub Automation and Workflow: A Comprehensive Exploration“. International Journal of Innovative Science and Modern Engineering 12, Nr. 2 (28.02.2024): 10–13. http://dx.doi.org/10.35940/ijisme.b1311.12020224.
Der volle Inhalt der QuelleRoy, Gareth, Emanuele Simili, Samuel Cadellin Skipsey, Gordon Stewart und David Britton. „Using the Autopilot pattern to deploy container resources at a WLCG Tier-2“. EPJ Web of Conferences 214 (2019): 07013. http://dx.doi.org/10.1051/epjconf/201921407013.
Der volle Inhalt der QuelleEmmanni, Phani Sekhar. „Architectural Patterns and Best Practices for Scalable Enterprise Applications with Angular“. Journal of Mathematical & Computer Applications 3, Nr. 1 (28.02.2024): 1–4. http://dx.doi.org/10.47363/jmca/2024(3)141.
Der volle Inhalt der QuelleOsinachi Deborah Segun-Falade, Olajide Soji Osundare, Wagobera Edgar Kedi, Patrick Azuka Okeleke, Tochukwu Ignatius Ijomah und Oluwatosin Yetunde Abdul-Azeez. „Assessing the transformative impact of cloud computing on software deployment and management“. Computer Science & IT Research Journal 5, Nr. 8 (31.08.2024): 2062–82. http://dx.doi.org/10.51594/csitrj.v5i8.1492.
Der volle Inhalt der QuelleRottler, Benjamin, Michael Böhler, Günter Duckeck, Alexander Lory, Christoph Anton Mitterer und Jaroslava Schovancova. „Bringing the ATLAS HammerCloud setup to the next level with containerization“. EPJ Web of Conferences 295 (2024): 04011. http://dx.doi.org/10.1051/epjconf/202429504011.
Der volle Inhalt der QuelleAgrawal, Raj, und Nakul Pandey. „Strategies for Developing and Deploying Enterprise-Level Mobile Applications on a Large Scale: A Comprehensive Analysis“. International Journal of Enhanced Research in Management & Computer Applications 09, Nr. 11 (2020): 23–31. http://dx.doi.org/10.55948/ijermca.2020.1104.
Der volle Inhalt der QuelleDaniel Ajiga, Patrick Azuka Okeleke, Samuel Olaoluwa Folorunsho und Chinedu Ezeigweneme. „Enhancing software development practices with AI insights in high-tech companies“. Computer Science & IT Research Journal 5, Nr. 8 (23.08.2024): 1897–919. http://dx.doi.org/10.51594/csitrj.v5i8.1450.
Der volle Inhalt der QuelleKiriakidi, S. K., und O. V. Kryvenko. „Study of web application development methodology for a medical clinic using React“. Reporter of the Priazovskyi State Technical University. Section: Technical sciences, Nr. 48 (27.06.2024): 19–25. http://dx.doi.org/10.31498/2225-6733.48.2024.310670.
Der volle Inhalt der QuelleQin, Anzhen, Yanjie Fang, Dongfeng Ning, Zhandong Liu, Ben Zhao, Junfu Xiao, Aiwang Duan und Beibei Yong. „Incorporation of Manure into Ridge and Furrow Planting System Boosts Yields of Maize by Optimizing Soil Moisture and Improving Photosynthesis“. Agronomy 9, Nr. 12 (10.12.2019): 865. http://dx.doi.org/10.3390/agronomy9120865.
Der volle Inhalt der QuelleSoma, Venkat. „Enhancing CI/CD Pipelines with Azure Pipelines“. Journal of Engineering and Applied Sciences Technology, 31.08.2024, 1–4. http://dx.doi.org/10.47363/jeast/2024(6)e108.
Der volle Inhalt der QuellePan, Ziyue, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu und Kui Ren. „Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines“. IEEE Transactions on Dependable and Secure Computing, 2023, 1–16. http://dx.doi.org/10.1109/tdsc.2023.3253572.
Der volle Inhalt der QuelleKağızmandere, Ömercan, und Halil Arslan. „Vulnerability analysis based on SBOMs: A model proposal for automated vulnerability scanning for CI/CD pipelines“. International Journal of Information Security Science, 28.06.2024. http://dx.doi.org/10.55859/ijiss.1455039.
Der volle Inhalt der QuelleRaut, Rahul. „Implementation of a Continuous Integration and Deployment Pipeline for Containerized Applications in Amazon Web Services Using Jenkins“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 06, Nr. 11 (23.11.2022). http://dx.doi.org/10.55041/ijsrem16948.
Der volle Inhalt der QuelleN, Sravani, Sai Raju O, Harish Ch, Anil Kumar B und Anirudh S. „Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery“. International Journal Of Scientific Research In Engineering & Technology, 05.02.2024, 29. http://dx.doi.org/10.59256/ijsreat.20240401005.
Der volle Inhalt der Quelle-, Jesu Narkarunai Arasu Malaiyappan, Lavanya Shanmugam -, Kumaran Thirunavukkarasu - und Jawaharbabu Jeyaraman -. „Cloud Storage Security: Threats, Solutions, and Future Directions“. International Journal For Multidisciplinary Research 5, Nr. 6 (29.11.2023). http://dx.doi.org/10.36948/ijfmr.2023.v05i06.16337.
Der volle Inhalt der QuelleMogwitz, Sabine, Christian Albus, Petra Beschoner, Yesim Erim, Franziska Geiser, Lucia Jerg-Bretzke, Eva Morawa, Susann Steudte-Schmiedgen, Gloria-Beatrice Wintermann und Kerstin Weidner. „Mental distress of physicians in the outpatient care throughout the COVID-19 pandemic: emotional and supportive human relations matter – Cross-sectional results of the VOICE-study“. BMC Health Services Research 23, Nr. 1 (12.05.2023). http://dx.doi.org/10.1186/s12913-023-09361-3.
Der volle Inhalt der Quelle„Applying Unsupervised Machine Learning in Continuous Integration, Security and Deployment Pipeline Automation for Application Software System“. International Journal of Recent Technology and Engineering 8, Nr. 4 (30.11.2019): 1426–30. http://dx.doi.org/10.35940/ijrte.d7387.118419.
Der volle Inhalt der QuelleFarhat, Fozia, Muhammad Arfan, Xiukang Wang, Arneeb Tariq, Muhammad Kamran, Hafiza Naila Tabassum, Ifra Tariq et al. „The Impact of Bio-Stimulants on Cd-Stressed Wheat (Triticum aestivum L.): Insights Into Growth, Chlorophyll Fluorescence, Cd Accumulation, and Osmolyte Regulation“. Frontiers in Plant Science 13 (18.02.2022). http://dx.doi.org/10.3389/fpls.2022.850567.
Der volle Inhalt der QuellePatharlagadda, Pallavi Priya. „Integration of SonarQube, The Quality Inspector for GO & Docker Compose“. Journal of Engineering and Applied Sciences Technology, 31.08.2023, 1–5. http://dx.doi.org/10.47363/jeast/2023(5)e111.
Der volle Inhalt der QuelleМалыгин, Д. С. „Microservice architecture in cloud systems: risks and application opportunities in 2024–2030“. МОДЕЛИРОВАНИЕ, ОПТИМИЗАЦИЯ И ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ 12, Nr. 2(45) (07.04.2024). http://dx.doi.org/10.26102/2310-6018/2024.45.2.029.
Der volle Inhalt der QuelleElhemri, Mansour, Iman Reksowardojo, Kanit Wattanavichien und Wiranto Arismunandar. „A comparative study for the effects of synthetic diesel fuels on the performance and emissions of a single cylinder DI diesel engine“. Libyan Journal for Engineering Research 1, Nr. 2 (03.09.2017). http://dx.doi.org/10.37376/lyjer.v1i2.471.
Der volle Inhalt der Quelle