共 64 条
[1]
Afaneh Suha, 2023, 2023 International Conference on Information Technology (ICIT), P102, DOI 10.1109/ICIT58056.2023.10226018
[2]
Ahmed Zaheeruddin, 2019, 2019 International Conference on Digitization (ICD). Proceedings, P178, DOI 10.1109/ICD47981.2019.9105789
[4]
Almuairfi S., 2020, Computer Fraud Security, P13, DOI [10.1016/S1361-3723(20)30109-3, DOI 10.1016/S1361-3723(20)30109-3]
[5]
Continuous Delivery with Jenkins Jenkins Solutions to Implement Continuous Delivery
[J].
2015 IEEE/ACM 3RD INTERNATIONAL WORKSHOP ON RELEASE ENGINEERING,
2015,
:24-27
[7]
Leveraging the Serverless Architecture for Securing Linux Containers
[J].
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW),
2017,
:401-404
[8]
Bird C, 2011, FSE, P4, DOI [DOI 10.1145/2025113.2025119, 10.1145/2025113.2025119]
[9]
Analysing the Program Analyser
[J].
2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C),
2016,
:765-768
[10]
Camacho NG., 2024, J Artif Intell Gen Sci (JAIGS), V3, P106