Artykuły w czasopismach na temat „CI/CD Security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 46 najlepszych artykułów w czasopismach naukowych na temat „CI/CD Security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Ho-Dac, Hung, i Van-Len Vo. "An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools". European Modern Studies Journal 8, nr 3 (30.07.2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.
Pełny tekst źródłaSingh, Nikhil. "CI/CD Pipeline for Web Applications". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 5218–26. http://dx.doi.org/10.22214/ijraset.2023.52867.
Pełny tekst źródłaAmeta, Upasana, i Ruchi Vyas. "Application Deployment Automation by Streamlining CI/CD Pipelines". Asian Journal of Engineering and Applied Technology 12, nr 1 (24.05.2023): 23–27. http://dx.doi.org/10.51983/ajeat-2023.12.1.3598.
Pełny tekst źródłaBhardwaj, Arvind Kumar, P. K. Dutta i Pradeep Chintale. "Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines". Babylonian Journal of Networking 2024 (20.08.2024): 162–70. http://dx.doi.org/10.58496/bjn/2024/016.
Pełny tekst źródłaThatikonda, Vamsi Krishna. "Beyond the Buzz: A Journey Through CI/CD Principles and Best Practices". European Journal of Theoretical and Applied Sciences 1, nr 5 (1.09.2023): 334–40. http://dx.doi.org/10.59324/ejtas.2023.1(5).24.
Pełny tekst źródłaMuñoz, Antonio, Aristeidis Farao, Jordy Ryan Casas Correia i Christos Xenakis. "P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements". Information 12, nr 9 (31.08.2021): 357. http://dx.doi.org/10.3390/info12090357.
Pełny tekst źródłaShanmukhi, Bhaskara Sahithi. "Implementing and Using CI/CD: Addressing Key Challenges Faced by Software Developers". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 008 (22.08.2024): 1–3. http://dx.doi.org/10.55041/ijsrem37128.
Pełny tekst źródłaPhani Monogya Katikireddi, Prudhvi Singirikonda i Yeshwanth Vasa. "REVOLUTIONIZING DEVOPS WITH QUANTUM COMPUTING: ACCELERATING CI/CD PIPELINES THROUGH ADVANCED COMPUTATIONAL TECHNIQUES". Innovative Research Thoughts 7, nr 2 (30.06.2021): 97–103. http://dx.doi.org/10.36676/irt.v7.i2.1482.
Pełny tekst źródłaJayaprakash Malgund, Spoorthi, i Dr Sowmyarani C N. "AUTOMATING DEPLOYMENTS OF THE LATEST APPLICATION VERSION USING CI-CD WORKFLOW". International Journal of Engineering Applied Sciences and Technology 7, nr 5 (1.09.2022): 99–103. http://dx.doi.org/10.33564/ijeast.2022.v07i05.017.
Pełny tekst źródłaChandrasekhara Mokkapati, Shalu Jain i Pandi Kirupa Gopalakrishna Pandian. "Implementing CI/CD in Retail Enterprises: Leadership Insights for Managing Multi-Billion Dollar Projects". Innovative Research Thoughts 9, nr 1 (30.03.2023): 391–405. http://dx.doi.org/10.36676/irt.v9.i1.1458.
Pełny tekst źródłaPerkasa, Panca Rizki, i Evangs Mailoa. "ADOPSI DEVSECOPS UNTUK MENDUKUNG METODE AGILE MENGGUNAKAN TRIVY SEBAGAI SECURITY SCANNER DOCKER IMAGE DAN DOCKERFILE". Jurnal Indonesia : Manajemen Informatika dan Komunikasi 4, nr 3 (10.09.2023): 856–63. http://dx.doi.org/10.35870/jimik.v4i3.291.
Pełny tekst źródłaBipin Gajbhiye, Anshika Aggarwal i Shalu Jain. "Automated Security Testing in DevOps Environments Using AI and ML". International Journal for Research Publication and Seminar 15, nr 2 (29.06.2024): 259–71. http://dx.doi.org/10.36676/jrps.v15.i2.1472.
Pełny tekst źródłaShama, Abriza Mahandis, i Dian W. Chandra. "IMPLEMENTASI STATIC APPLICATION SECURITY TESTING MENGGUNAKAN JENKINS CI/CD BERBASIS DOCKER CONTAINER PADA PT. EMPORIA DIGITAL RAYA". JURNAL ILMIAH INFORMATIKA 9, nr 02 (2.09.2021): 95–99. http://dx.doi.org/10.33884/jif.v9i02.3769.
Pełny tekst źródłaHarrison Oke Ekpobimi, Regina Coelis Kandekere i Adebamigbe Alex Fasanmade. "Front-end development and cybersecurity: A conceptual approach to building secure web applications". Computer Science & IT Research Journal 5, nr 9 (6.09.2024): 2154–68. http://dx.doi.org/10.51594/csitrj.v5i9.1556.
Pełny tekst źródłaAlbaihaqi, Muhammad Fauzan, Anisa Nurul Wilda i Bambang Sugiantoro. "Deploying an Application to Cloud Platform Using Continous Integration and Continous Delivery". Proceeding International Conference on Science and Engineering 3 (30.04.2020): 279–82. http://dx.doi.org/10.14421/icse.v3.513.
Pełny tekst źródłaRaj, Pritish. "Continuous Integration for New Service Deployment and Service Validation Script for Vault". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 06 (12.06.2024): 1–5. http://dx.doi.org/10.55041/ijsrem35565.
Pełny tekst źródłaAmarjeet Singh, Et al. "Microservices Container Security Orchestration Framework within Kubernetes and Docker for Business-Critical Applications within Digital Transformation". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 3 (31.03.2023): 332–36. http://dx.doi.org/10.17762/ijritcc.v11i3.9863.
Pełny tekst źródłaLonkar, Madhav Sandeep. "HUMAN RESOURCE MANAGEMENT SYSTEM(HRMS)". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 04 (10.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem30538.
Pełny tekst źródłaBysani, Varshitha. "Automation in Cloud Infrastructure Management: Enhancing Efficiency and Reliability". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 06 (11.06.2024): 1–5. http://dx.doi.org/10.55041/ijsrem35750.
Pełny tekst źródłaSingh, Amarjeet. "Microservices Security Vulnerability Remediation approach using Veracode and Checkmarx". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 4, nr 1 (5.05.2024): 145–51. http://dx.doi.org/10.60087/jaigs.v4i1.128.
Pełny tekst źródłaKrauss, Philip, Vasundra Touré, Kristin Gnodtke, Katrin Crameri i Sabine Österle. "DCC Terminology Service—An Automated CI/CD Pipeline for Converting Clinical and Biomedical Terminologies in Graph Format for the Swiss Personalized Health Network". Applied Sciences 11, nr 23 (29.11.2021): 11311. http://dx.doi.org/10.3390/app112311311.
Pełny tekst źródłaTeisserenc, Benjamin, i Samad M. E. Sepasgozar. "Software Architecture and Non-Fungible Tokens for Digital Twin Applications in the Built Environment". Buildings 12, nr 9 (14.09.2022): 1447. http://dx.doi.org/10.3390/buildings12091447.
Pełny tekst źródłaРедкин, П. А., i А. С. Алёшкин. "Программный комплекс распределенного тестирования веб-приложений". International Journal of Open Information Technologies 12, nr 4 (1.04.2024): 125–32. http://dx.doi.org/10.25559/injoit.2307-8162.12.202404.125-132.
Pełny tekst źródłaTeisserenc, Benjamin, i Samad Sepasgozar. "Project Data Categorization, Adoption Factors, and Non-Functional Requirements for Blockchain Based Digital Twins in the Construction Industry 4.0". Buildings 11, nr 12 (8.12.2021): 626. http://dx.doi.org/10.3390/buildings11120626.
Pełny tekst źródłaLi, Jianzhong, Qiang Wan, Wenjuan Ma, Xiaoting Fang, Chuyi Yin i Jun Cui. "Analysis DevOps efficiency and digital transformation of digital economy, cross-border e-commerce, and brand building:". Transactions on Computer Science and Intelligent Systems Research 4 (20.06.2024): 38–47. http://dx.doi.org/10.62051/gc7xf329.
Pełny tekst źródłaPindoriya, Anurag, i Janki Velani. "Advancements in GitHub Automation and Workflow: A Comprehensive Exploration". International Journal of Innovative Science and Modern Engineering 12, nr 2 (28.02.2024): 10–13. http://dx.doi.org/10.35940/ijisme.b1311.12020224.
Pełny tekst źródłaRoy, Gareth, Emanuele Simili, Samuel Cadellin Skipsey, Gordon Stewart i David Britton. "Using the Autopilot pattern to deploy container resources at a WLCG Tier-2". EPJ Web of Conferences 214 (2019): 07013. http://dx.doi.org/10.1051/epjconf/201921407013.
Pełny tekst źródłaEmmanni, Phani Sekhar. "Architectural Patterns and Best Practices for Scalable Enterprise Applications with Angular". Journal of Mathematical & Computer Applications 3, nr 1 (28.02.2024): 1–4. http://dx.doi.org/10.47363/jmca/2024(3)141.
Pełny tekst źródłaOsinachi Deborah Segun-Falade, Olajide Soji Osundare, Wagobera Edgar Kedi, Patrick Azuka Okeleke, Tochukwu Ignatius Ijomah i Oluwatosin Yetunde Abdul-Azeez. "Assessing the transformative impact of cloud computing on software deployment and management". Computer Science & IT Research Journal 5, nr 8 (31.08.2024): 2062–82. http://dx.doi.org/10.51594/csitrj.v5i8.1492.
Pełny tekst źródłaRottler, Benjamin, Michael Böhler, Günter Duckeck, Alexander Lory, Christoph Anton Mitterer i Jaroslava Schovancova. "Bringing the ATLAS HammerCloud setup to the next level with containerization". EPJ Web of Conferences 295 (2024): 04011. http://dx.doi.org/10.1051/epjconf/202429504011.
Pełny tekst źródłaAgrawal, Raj, i Nakul Pandey. "Strategies for Developing and Deploying Enterprise-Level Mobile Applications on a Large Scale: A Comprehensive Analysis". International Journal of Enhanced Research in Management & Computer Applications 09, nr 11 (2020): 23–31. http://dx.doi.org/10.55948/ijermca.2020.1104.
Pełny tekst źródłaDaniel Ajiga, Patrick Azuka Okeleke, Samuel Olaoluwa Folorunsho i Chinedu Ezeigweneme. "Enhancing software development practices with AI insights in high-tech companies". Computer Science & IT Research Journal 5, nr 8 (23.08.2024): 1897–919. http://dx.doi.org/10.51594/csitrj.v5i8.1450.
Pełny tekst źródłaKiriakidi, S. K., i O. V. Kryvenko. "Study of web application development methodology for a medical clinic using React". Reporter of the Priazovskyi State Technical University. Section: Technical sciences, nr 48 (27.06.2024): 19–25. http://dx.doi.org/10.31498/2225-6733.48.2024.310670.
Pełny tekst źródłaQin, Anzhen, Yanjie Fang, Dongfeng Ning, Zhandong Liu, Ben Zhao, Junfu Xiao, Aiwang Duan i Beibei Yong. "Incorporation of Manure into Ridge and Furrow Planting System Boosts Yields of Maize by Optimizing Soil Moisture and Improving Photosynthesis". Agronomy 9, nr 12 (10.12.2019): 865. http://dx.doi.org/10.3390/agronomy9120865.
Pełny tekst źródłaSoma, Venkat. "Enhancing CI/CD Pipelines with Azure Pipelines". Journal of Engineering and Applied Sciences Technology, 31.08.2024, 1–4. http://dx.doi.org/10.47363/jeast/2024(6)e108.
Pełny tekst źródłaPan, Ziyue, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu i Kui Ren. "Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines". IEEE Transactions on Dependable and Secure Computing, 2023, 1–16. http://dx.doi.org/10.1109/tdsc.2023.3253572.
Pełny tekst źródłaKağızmandere, Ömercan, i Halil Arslan. "Vulnerability analysis based on SBOMs: A model proposal for automated vulnerability scanning for CI/CD pipelines". International Journal of Information Security Science, 28.06.2024. http://dx.doi.org/10.55859/ijiss.1455039.
Pełny tekst źródłaRaut, Rahul. "Implementation of a Continuous Integration and Deployment Pipeline for Containerized Applications in Amazon Web Services Using Jenkins". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 06, nr 11 (23.11.2022). http://dx.doi.org/10.55041/ijsrem16948.
Pełny tekst źródłaN, Sravani, Sai Raju O, Harish Ch, Anil Kumar B i Anirudh S. "Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery". International Journal Of Scientific Research In Engineering & Technology, 5.02.2024, 29. http://dx.doi.org/10.59256/ijsreat.20240401005.
Pełny tekst źródła-, Jesu Narkarunai Arasu Malaiyappan, Lavanya Shanmugam -, Kumaran Thirunavukkarasu - i Jawaharbabu Jeyaraman -. "Cloud Storage Security: Threats, Solutions, and Future Directions". International Journal For Multidisciplinary Research 5, nr 6 (29.11.2023). http://dx.doi.org/10.36948/ijfmr.2023.v05i06.16337.
Pełny tekst źródłaMogwitz, Sabine, Christian Albus, Petra Beschoner, Yesim Erim, Franziska Geiser, Lucia Jerg-Bretzke, Eva Morawa, Susann Steudte-Schmiedgen, Gloria-Beatrice Wintermann i Kerstin Weidner. "Mental distress of physicians in the outpatient care throughout the COVID-19 pandemic: emotional and supportive human relations matter – Cross-sectional results of the VOICE-study". BMC Health Services Research 23, nr 1 (12.05.2023). http://dx.doi.org/10.1186/s12913-023-09361-3.
Pełny tekst źródła"Applying Unsupervised Machine Learning in Continuous Integration, Security and Deployment Pipeline Automation for Application Software System". International Journal of Recent Technology and Engineering 8, nr 4 (30.11.2019): 1426–30. http://dx.doi.org/10.35940/ijrte.d7387.118419.
Pełny tekst źródłaFarhat, Fozia, Muhammad Arfan, Xiukang Wang, Arneeb Tariq, Muhammad Kamran, Hafiza Naila Tabassum, Ifra Tariq i in. "The Impact of Bio-Stimulants on Cd-Stressed Wheat (Triticum aestivum L.): Insights Into Growth, Chlorophyll Fluorescence, Cd Accumulation, and Osmolyte Regulation". Frontiers in Plant Science 13 (18.02.2022). http://dx.doi.org/10.3389/fpls.2022.850567.
Pełny tekst źródłaPatharlagadda, Pallavi Priya. "Integration of SonarQube, The Quality Inspector for GO & Docker Compose". Journal of Engineering and Applied Sciences Technology, 31.08.2023, 1–5. http://dx.doi.org/10.47363/jeast/2023(5)e111.
Pełny tekst źródłaМалыгин, Д. С. "Microservice architecture in cloud systems: risks and application opportunities in 2024–2030". МОДЕЛИРОВАНИЕ, ОПТИМИЗАЦИЯ И ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ 12, nr 2(45) (7.04.2024). http://dx.doi.org/10.26102/2310-6018/2024.45.2.029.
Pełny tekst źródłaElhemri, Mansour, Iman Reksowardojo, Kanit Wattanavichien i Wiranto Arismunandar. "A comparative study for the effects of synthetic diesel fuels on the performance and emissions of a single cylinder DI diesel engine". Libyan Journal for Engineering Research 1, nr 2 (3.09.2017). http://dx.doi.org/10.37376/lyjer.v1i2.471.
Pełny tekst źródła