[{"title":"(55个子文件70.17MB)docker安全论文.zip","children":[{"title":"精读论文","children":[{"title":"专家团队论文","children":[{"title":"Astudyonthesecurityimplicationsofinformationleakages.pdf <span style='color:#111;'>2.32MB</span>","children":null,"spread":false}],"spread":true},{"title":".DS_Store <span style='color:#111;'>6.00KB</span>","children":null,"spread":false},{"title":"最新-CCF论文","children":[{"title":"ContainerLeaksEmergingSecurityThreatsof.pdf <span style='color:#111;'>1.27MB</span>","children":null,"spread":false},{"title":"SPEAKERSplit-PhaseExecutionofApplicationContainers.pdf <span style='color:#111;'>406.73KB</span>","children":null,"spread":false},{"title":"PhysicalDisentanglementinaContainer-Based.pdf <span style='color:#111;'>697.27KB</span>","children":null,"spread":false},{"title":"Docker-secAFullyAutomatedContainerSecurity.pdf <span style='color:#111;'>254.75KB</span>","children":null,"spread":false},{"title":"AContainer-basedDoSAttack-ResilientControl.pdf <span style='color:#111;'>2.52MB</span>","children":null,"spread":false},{"title":"IronIsolatingNetwork-basedCPU.pdf <span style='color:#111;'>925.81KB</span>","children":null,"spread":false},{"title":"OntheRelationBetweenOutdatedDockerContainers,SeverityVulnerabilities,andBugs.pdf <span style='color:#111;'>517.04KB</span>","children":null,"spread":false},{"title":"SecurityNamespaceMakingLinuxSecurity.pdf <span style='color:#111;'>490.64KB</span>","children":null,"spread":false}],"spread":true},{"title":"Lic-SecanenhancedAppArmorDockersecurityprofile.pdf <span style='color:#111;'>997.23KB</span>","children":null,"spread":false}],"spread":true},{"title":"经典论文(引用多","children":[{"title":"DockerLightweightLinuxContainersforConsistentDevelopmentand.pdf <span style='color:#111;'>297.01KB</span>","children":null,"spread":false},{"title":"Containersandvirtualmachinesatscale.pdf <span style='color:#111;'>5.68MB</span>","children":null,"spread":false},{"title":"AnUpdatedPerformanceComparisonof.pdf <span style='color:#111;'>109.65KB</span>","children":null,"spread":false},{"title":"Performanceevaluation.pdf <span style='color:#111;'>356.21KB</span>","children":null,"spread":false},{"title":"Container-basedoperatingsystemvirtualization.pdf <span style='color:#111;'>843.68KB</span>","children":null,"spread":false},{"title":"Astudyofsecurityvulnerabilitieson.pdf <span style='color:#111;'>755.88KB</span>","children":null,"spread":false},{"title":"UnikernelsLibraryoperatingsystemsforthe.pdf <span style='color:#111;'>981.81KB</span>","children":null,"spread":false},{"title":"Harbormaster.pdf <span style='color:#111;'>600.84KB</span>","children":null,"spread":false},{"title":"UnderstandingContainerIsolation.pdf <span style='color:#111;'>1.91MB</span>","children":null,"spread":false}],"spread":true},{"title":"中文硕-博论文","children":[{"title":"AMethodologyforPenetrationTestingDockerSystems.pdf <span style='color:#111;'>1.75MB</span>","children":null,"spread":false},{"title":"Linux容器防护技术研究_魏小锋.caj <span style='color:#111;'>1.88MB</span>","children":null,"spread":false},{"title":"面向Docker容器异常检测系统的设计与实现_郝启臣.caj <span style='color:#111;'>3.55MB</span>","children":null,"spread":false},{"title":"基于Docker平台的安全信息管理的研究与实现_艾明振.caj <span style='color:#111;'>6.05MB</span>","children":null,"spread":false},{"title":"容器级虚拟化的安全审计与监控研究_吴芦峰.caj <span style='color:#111;'>7.22MB</span>","children":null,"spread":false},{"title":"Linux环境下的容器安全性分析评估.pdf <span style='color:#111;'>1.43MB</span>","children":null,"spread":false},{"title":"Docker容器安全隔离机制研究_胡家发.caj <span style='color:#111;'>5.38MB</span>","children":null,"spread":false}],"spread":true},{"title":"略读论文","children":[{"title":"DockerPolicyModules.pdf <span style='color:#111;'>144.01KB</span>","children":null,"spread":false},{"title":"SGX-AwareContainerOrchestration.pdf <span style='color:#111;'>614.96KB</span>","children":null,"spread":false},{"title":"SPEAKERSplit-PhaseExecutionof.pdf <span style='color:#111;'>406.73KB</span>","children":null,"spread":false},{"title":"SecurityinContainer-basedVirtualizationthroughvTPM.pdf <span style='color:#111;'>231.47KB</span>","children":null,"spread":false},{"title":"RyoanADistributedSandboxforUntrustedComputation.pdf <span style='color:#111;'>833.06KB</span>","children":null,"spread":false},{"title":"Securingtheinfrastructureandtheworkloadsoflinuxcontainers.pdf <span style='color:#111;'>335.74KB</span>","children":null,"spread":false},{"title":"MiningSandboxesforLinuxContainers.pdf <span style='color:#111;'>269.47KB</span>","children":null,"spread":false},{"title":"SecuringDockerContainersfromDenialofService.pdf <span style='color:#111;'>152.06KB</span>","children":null,"spread":false},{"title":"EnhancingSecurityofDockerusing.pdf <span style='color:#111;'>130.49KB</span>","children":null,"spread":false},{"title":"SCONESecurelinuxcontainerswithintelSGX.pdf <span style='color:#111;'>2.23MB</span>","children":null,"spread":false}],"spread":true},{"title":"权威博客","children":[{"title":"eu-15-Bettini-Vulnerability-Exploitation-In-Docker-Container-Environments-wp.pdf <span style='color:#111;'>3.74MB</span>","children":null,"spread":false}],"spread":true},{"title":"英文综述","children":[{"title":"EmergingTrends,TechniquesandOpenIssuesof.pdf <span style='color:#111;'>4.35MB</span>","children":null,"spread":false},{"title":"ApplicationContainerSecurityGuide.pdf <span style='color:#111;'>748.10KB</span>","children":null,"spread":false},{"title":"TheChallengesoftheDataPrivacyintheCloudusingDockerASystematicReview.pdf <span style='color:#111;'>110.69KB</span>","children":null,"spread":false},{"title":"AMeasurementStudyonLinuxContainerSecurity.pdf <span style='color:#111;'>3.04MB</span>","children":null,"spread":false},{"title":"AReviewofDockerSecurityResearch(2).pdf <span style='color:#111;'>742.76KB</span>","children":null,"spread":false},{"title":"SecurityAnalysisandThreatsDetectionTechniquesonDockerContainer.pdf <span style='color:#111;'>155.70KB</span>","children":null,"spread":false},{"title":"Areviewofnativecontainersecurityforrunningapplication.pdf <span style='color:#111;'>284.69KB</span>","children":null,"spread":false},{"title":"ADefenseMethodagainstDockerEscapeAttack.pdf <span style='color:#111;'>1.01MB</span>","children":null,"spread":false},{"title":"CloudContainerTechnologies.pdf <span style='color:#111;'>2.85MB</span>","children":null,"spread":false},{"title":"OntheRelationbetweenOutdatedDocker.pdf <span style='color:#111;'>491.33KB</span>","children":null,"spread":false},{"title":"AStudy,AnalysisanddeepdiveonCloudPAAS.pdf <span style='color:#111;'>295.90KB</span>","children":null,"spread":false},{"title":"ContainersandClustersforEdgeCloud.pdf <span style='color:#111;'>387.52KB</span>","children":null,"spread":false},{"title":"AReviewofDockerSecurityResearch.pdf <span style='color:#111;'>742.76KB</span>","children":null,"spread":false},{"title":"Dockerecosystem–VulnerabilityAnalysis.pdf <span style='color:#111;'>2.07MB</span>","children":null,"spread":false},{"title":"EnhancingSecurityofDockerusing.pdf <span style='color:#111;'>130.48KB</span>","children":null,"spread":false},{"title":"AutomatedCloudInfrastructure,ContinuousIntegrationandContinuous.pdf <span style='color:#111;'>232.21KB</span>","children":null,"spread":false},{"title":"ContainerSecurityIssues,Challenges.pdf <span style='color:#111;'>4.22MB</span>","children":null,"spread":false}],"spread":false}],"spread":true}]