Artigos de revistas sobre o tema "CI/CD Security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 46 melhores artigos de revistas para estudos sobre o assunto "CI/CD Security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Ho-Dac, Hung, e Van-Len Vo. "An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools". European Modern Studies Journal 8, n.º 3 (30 de julho de 2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.
Texto completo da fonteSingh, Nikhil. "CI/CD Pipeline for Web Applications". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de maio de 2023): 5218–26. http://dx.doi.org/10.22214/ijraset.2023.52867.
Texto completo da fonteAmeta, Upasana, e Ruchi Vyas. "Application Deployment Automation by Streamlining CI/CD Pipelines". Asian Journal of Engineering and Applied Technology 12, n.º 1 (24 de maio de 2023): 23–27. http://dx.doi.org/10.51983/ajeat-2023.12.1.3598.
Texto completo da fonteBhardwaj, Arvind Kumar, P. K. Dutta e Pradeep Chintale. "Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines". Babylonian Journal of Networking 2024 (20 de agosto de 2024): 162–70. http://dx.doi.org/10.58496/bjn/2024/016.
Texto completo da fonteThatikonda, Vamsi Krishna. "Beyond the Buzz: A Journey Through CI/CD Principles and Best Practices". European Journal of Theoretical and Applied Sciences 1, n.º 5 (1 de setembro de 2023): 334–40. http://dx.doi.org/10.59324/ejtas.2023.1(5).24.
Texto completo da fonteMuñoz, Antonio, Aristeidis Farao, Jordy Ryan Casas Correia e Christos Xenakis. "P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements". Information 12, n.º 9 (31 de agosto de 2021): 357. http://dx.doi.org/10.3390/info12090357.
Texto completo da fonteShanmukhi, Bhaskara Sahithi. "Implementing and Using CI/CD: Addressing Key Challenges Faced by Software Developers". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 008 (22 de agosto de 2024): 1–3. http://dx.doi.org/10.55041/ijsrem37128.
Texto completo da fontePhani Monogya Katikireddi, Prudhvi Singirikonda e Yeshwanth Vasa. "REVOLUTIONIZING DEVOPS WITH QUANTUM COMPUTING: ACCELERATING CI/CD PIPELINES THROUGH ADVANCED COMPUTATIONAL TECHNIQUES". Innovative Research Thoughts 7, n.º 2 (30 de junho de 2021): 97–103. http://dx.doi.org/10.36676/irt.v7.i2.1482.
Texto completo da fonteJayaprakash Malgund, Spoorthi, e Dr Sowmyarani C N. "AUTOMATING DEPLOYMENTS OF THE LATEST APPLICATION VERSION USING CI-CD WORKFLOW". International Journal of Engineering Applied Sciences and Technology 7, n.º 5 (1 de setembro de 2022): 99–103. http://dx.doi.org/10.33564/ijeast.2022.v07i05.017.
Texto completo da fonteChandrasekhara Mokkapati, Shalu Jain e Pandi Kirupa Gopalakrishna Pandian. "Implementing CI/CD in Retail Enterprises: Leadership Insights for Managing Multi-Billion Dollar Projects". Innovative Research Thoughts 9, n.º 1 (30 de março de 2023): 391–405. http://dx.doi.org/10.36676/irt.v9.i1.1458.
Texto completo da fontePerkasa, Panca Rizki, e Evangs Mailoa. "ADOPSI DEVSECOPS UNTUK MENDUKUNG METODE AGILE MENGGUNAKAN TRIVY SEBAGAI SECURITY SCANNER DOCKER IMAGE DAN DOCKERFILE". Jurnal Indonesia : Manajemen Informatika dan Komunikasi 4, n.º 3 (10 de setembro de 2023): 856–63. http://dx.doi.org/10.35870/jimik.v4i3.291.
Texto completo da fonteBipin Gajbhiye, Anshika Aggarwal e Shalu Jain. "Automated Security Testing in DevOps Environments Using AI and ML". International Journal for Research Publication and Seminar 15, n.º 2 (29 de junho de 2024): 259–71. http://dx.doi.org/10.36676/jrps.v15.i2.1472.
Texto completo da fonteShama, Abriza Mahandis, e Dian W. Chandra. "IMPLEMENTASI STATIC APPLICATION SECURITY TESTING MENGGUNAKAN JENKINS CI/CD BERBASIS DOCKER CONTAINER PADA PT. EMPORIA DIGITAL RAYA". JURNAL ILMIAH INFORMATIKA 9, n.º 02 (2 de setembro de 2021): 95–99. http://dx.doi.org/10.33884/jif.v9i02.3769.
Texto completo da fonteHarrison Oke Ekpobimi, Regina Coelis Kandekere e Adebamigbe Alex Fasanmade. "Front-end development and cybersecurity: A conceptual approach to building secure web applications". Computer Science & IT Research Journal 5, n.º 9 (6 de setembro de 2024): 2154–68. http://dx.doi.org/10.51594/csitrj.v5i9.1556.
Texto completo da fonteAlbaihaqi, Muhammad Fauzan, Anisa Nurul Wilda e Bambang Sugiantoro. "Deploying an Application to Cloud Platform Using Continous Integration and Continous Delivery". Proceeding International Conference on Science and Engineering 3 (30 de abril de 2020): 279–82. http://dx.doi.org/10.14421/icse.v3.513.
Texto completo da fonteRaj, Pritish. "Continuous Integration for New Service Deployment and Service Validation Script for Vault". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 06 (12 de junho de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem35565.
Texto completo da fonteAmarjeet Singh, Et al. "Microservices Container Security Orchestration Framework within Kubernetes and Docker for Business-Critical Applications within Digital Transformation". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 3 (31 de março de 2023): 332–36. http://dx.doi.org/10.17762/ijritcc.v11i3.9863.
Texto completo da fonteLonkar, Madhav Sandeep. "HUMAN RESOURCE MANAGEMENT SYSTEM(HRMS)". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (10 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30538.
Texto completo da fonteBysani, Varshitha. "Automation in Cloud Infrastructure Management: Enhancing Efficiency and Reliability". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 06 (11 de junho de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem35750.
Texto completo da fonteSingh, Amarjeet. "Microservices Security Vulnerability Remediation approach using Veracode and Checkmarx". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 4, n.º 1 (5 de maio de 2024): 145–51. http://dx.doi.org/10.60087/jaigs.v4i1.128.
Texto completo da fonteKrauss, Philip, Vasundra Touré, Kristin Gnodtke, Katrin Crameri e Sabine Österle. "DCC Terminology Service—An Automated CI/CD Pipeline for Converting Clinical and Biomedical Terminologies in Graph Format for the Swiss Personalized Health Network". Applied Sciences 11, n.º 23 (29 de novembro de 2021): 11311. http://dx.doi.org/10.3390/app112311311.
Texto completo da fonteTeisserenc, Benjamin, e Samad M. E. Sepasgozar. "Software Architecture and Non-Fungible Tokens for Digital Twin Applications in the Built Environment". Buildings 12, n.º 9 (14 de setembro de 2022): 1447. http://dx.doi.org/10.3390/buildings12091447.
Texto completo da fonteРедкин, П. А., e А. С. Алёшкин. "Программный комплекс распределенного тестирования веб-приложений". International Journal of Open Information Technologies 12, n.º 4 (1 de abril de 2024): 125–32. http://dx.doi.org/10.25559/injoit.2307-8162.12.202404.125-132.
Texto completo da fonteTeisserenc, Benjamin, e Samad Sepasgozar. "Project Data Categorization, Adoption Factors, and Non-Functional Requirements for Blockchain Based Digital Twins in the Construction Industry 4.0". Buildings 11, n.º 12 (8 de dezembro de 2021): 626. http://dx.doi.org/10.3390/buildings11120626.
Texto completo da fonteLi, Jianzhong, Qiang Wan, Wenjuan Ma, Xiaoting Fang, Chuyi Yin e Jun Cui. "Analysis DevOps efficiency and digital transformation of digital economy, cross-border e-commerce, and brand building:". Transactions on Computer Science and Intelligent Systems Research 4 (20 de junho de 2024): 38–47. http://dx.doi.org/10.62051/gc7xf329.
Texto completo da fontePindoriya, Anurag, e Janki Velani. "Advancements in GitHub Automation and Workflow: A Comprehensive Exploration". International Journal of Innovative Science and Modern Engineering 12, n.º 2 (28 de fevereiro de 2024): 10–13. http://dx.doi.org/10.35940/ijisme.b1311.12020224.
Texto completo da fonteRoy, Gareth, Emanuele Simili, Samuel Cadellin Skipsey, Gordon Stewart e David Britton. "Using the Autopilot pattern to deploy container resources at a WLCG Tier-2". EPJ Web of Conferences 214 (2019): 07013. http://dx.doi.org/10.1051/epjconf/201921407013.
Texto completo da fonteEmmanni, Phani Sekhar. "Architectural Patterns and Best Practices for Scalable Enterprise Applications with Angular". Journal of Mathematical & Computer Applications 3, n.º 1 (28 de fevereiro de 2024): 1–4. http://dx.doi.org/10.47363/jmca/2024(3)141.
Texto completo da fonteOsinachi Deborah Segun-Falade, Olajide Soji Osundare, Wagobera Edgar Kedi, Patrick Azuka Okeleke, Tochukwu Ignatius Ijomah e Oluwatosin Yetunde Abdul-Azeez. "Assessing the transformative impact of cloud computing on software deployment and management". Computer Science & IT Research Journal 5, n.º 8 (31 de agosto de 2024): 2062–82. http://dx.doi.org/10.51594/csitrj.v5i8.1492.
Texto completo da fonteRottler, Benjamin, Michael Böhler, Günter Duckeck, Alexander Lory, Christoph Anton Mitterer e Jaroslava Schovancova. "Bringing the ATLAS HammerCloud setup to the next level with containerization". EPJ Web of Conferences 295 (2024): 04011. http://dx.doi.org/10.1051/epjconf/202429504011.
Texto completo da fonteAgrawal, Raj, e Nakul Pandey. "Strategies for Developing and Deploying Enterprise-Level Mobile Applications on a Large Scale: A Comprehensive Analysis". International Journal of Enhanced Research in Management & Computer Applications 09, n.º 11 (2020): 23–31. http://dx.doi.org/10.55948/ijermca.2020.1104.
Texto completo da fonteDaniel Ajiga, Patrick Azuka Okeleke, Samuel Olaoluwa Folorunsho e Chinedu Ezeigweneme. "Enhancing software development practices with AI insights in high-tech companies". Computer Science & IT Research Journal 5, n.º 8 (23 de agosto de 2024): 1897–919. http://dx.doi.org/10.51594/csitrj.v5i8.1450.
Texto completo da fonteKiriakidi, S. K., e O. V. Kryvenko. "Study of web application development methodology for a medical clinic using React". Reporter of the Priazovskyi State Technical University. Section: Technical sciences, n.º 48 (27 de junho de 2024): 19–25. http://dx.doi.org/10.31498/2225-6733.48.2024.310670.
Texto completo da fonteQin, Anzhen, Yanjie Fang, Dongfeng Ning, Zhandong Liu, Ben Zhao, Junfu Xiao, Aiwang Duan e Beibei Yong. "Incorporation of Manure into Ridge and Furrow Planting System Boosts Yields of Maize by Optimizing Soil Moisture and Improving Photosynthesis". Agronomy 9, n.º 12 (10 de dezembro de 2019): 865. http://dx.doi.org/10.3390/agronomy9120865.
Texto completo da fonteSoma, Venkat. "Enhancing CI/CD Pipelines with Azure Pipelines". Journal of Engineering and Applied Sciences Technology, 31 de agosto de 2024, 1–4. http://dx.doi.org/10.47363/jeast/2024(6)e108.
Texto completo da fontePan, Ziyue, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu e Kui Ren. "Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines". IEEE Transactions on Dependable and Secure Computing, 2023, 1–16. http://dx.doi.org/10.1109/tdsc.2023.3253572.
Texto completo da fonteKağızmandere, Ömercan, e Halil Arslan. "Vulnerability analysis based on SBOMs: A model proposal for automated vulnerability scanning for CI/CD pipelines". International Journal of Information Security Science, 28 de junho de 2024. http://dx.doi.org/10.55859/ijiss.1455039.
Texto completo da fonteRaut, Rahul. "Implementation of a Continuous Integration and Deployment Pipeline for Containerized Applications in Amazon Web Services Using Jenkins". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 06, n.º 11 (23 de novembro de 2022). http://dx.doi.org/10.55041/ijsrem16948.
Texto completo da fonteN, Sravani, Sai Raju O, Harish Ch, Anil Kumar B e Anirudh S. "Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery". International Journal Of Scientific Research In Engineering & Technology, 5 de fevereiro de 2024, 29. http://dx.doi.org/10.59256/ijsreat.20240401005.
Texto completo da fonte-, Jesu Narkarunai Arasu Malaiyappan, Lavanya Shanmugam -, Kumaran Thirunavukkarasu - e Jawaharbabu Jeyaraman -. "Cloud Storage Security: Threats, Solutions, and Future Directions". International Journal For Multidisciplinary Research 5, n.º 6 (29 de novembro de 2023). http://dx.doi.org/10.36948/ijfmr.2023.v05i06.16337.
Texto completo da fonteMogwitz, Sabine, Christian Albus, Petra Beschoner, Yesim Erim, Franziska Geiser, Lucia Jerg-Bretzke, Eva Morawa, Susann Steudte-Schmiedgen, Gloria-Beatrice Wintermann e Kerstin Weidner. "Mental distress of physicians in the outpatient care throughout the COVID-19 pandemic: emotional and supportive human relations matter – Cross-sectional results of the VOICE-study". BMC Health Services Research 23, n.º 1 (12 de maio de 2023). http://dx.doi.org/10.1186/s12913-023-09361-3.
Texto completo da fonte"Applying Unsupervised Machine Learning in Continuous Integration, Security and Deployment Pipeline Automation for Application Software System". International Journal of Recent Technology and Engineering 8, n.º 4 (30 de novembro de 2019): 1426–30. http://dx.doi.org/10.35940/ijrte.d7387.118419.
Texto completo da fonteFarhat, Fozia, Muhammad Arfan, Xiukang Wang, Arneeb Tariq, Muhammad Kamran, Hafiza Naila Tabassum, Ifra Tariq et al. "The Impact of Bio-Stimulants on Cd-Stressed Wheat (Triticum aestivum L.): Insights Into Growth, Chlorophyll Fluorescence, Cd Accumulation, and Osmolyte Regulation". Frontiers in Plant Science 13 (18 de fevereiro de 2022). http://dx.doi.org/10.3389/fpls.2022.850567.
Texto completo da fontePatharlagadda, Pallavi Priya. "Integration of SonarQube, The Quality Inspector for GO & Docker Compose". Journal of Engineering and Applied Sciences Technology, 31 de agosto de 2023, 1–5. http://dx.doi.org/10.47363/jeast/2023(5)e111.
Texto completo da fonteМалыгин, Д. С. "Microservice architecture in cloud systems: risks and application opportunities in 2024–2030". МОДЕЛИРОВАНИЕ, ОПТИМИЗАЦИЯ И ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ 12, n.º 2(45) (7 de abril de 2024). http://dx.doi.org/10.26102/2310-6018/2024.45.2.029.
Texto completo da fonteElhemri, Mansour, Iman Reksowardojo, Kanit Wattanavichien e Wiranto Arismunandar. "A comparative study for the effects of synthetic diesel fuels on the performance and emissions of a single cylinder DI diesel engine". Libyan Journal for Engineering Research 1, n.º 2 (3 de setembro de 2017). http://dx.doi.org/10.37376/lyjer.v1i2.471.
Texto completo da fonte