An empirical comparison of commercial and open-source web vulnerability scanners.
Sensei: Enforcing secure coding guidelines in the integrated development environment.
Timing isolation and improved scheduling of deep neural networks for real-time systems.
Two decades of live coding and debugging of virtual machines through simulation.
Component-aware orchestration of cloud-based enterprise applications, from TOSCA to Docker and Kubernetes.
Recommending software features to designers: From the perspective of users.
Burrows-Wheeler post-transformation with effective clustering and interpolative coding.
Proximate sharing of geo data using the credit-considered mobile edge computing server switching control scheme.
Microservice transition and its granularity problem: A systematic mapping study.
A review on the computation offloading approaches in mobile edge computing: A game-theoretic perspective.