This is the dataset for replicability for the article "Detection Strategies for Microservice Security Tactics." It provides the code needed to replicate the study in the article and the model data set of 10 system models and 20 variants of those models. The abstract of the article is: Microservice architectures are widely used today to implement distributed systems. Securing microservice architectures is challenging because of their polyglot nature, continuous evolution, and various security concerns relevant to such architectures. This article proposes a novel, model-based approach providing detection strategies to address the automated detection of security tactics (or patterns and best practices) in a given microservice architect...
This paper presents a unique security approach for detecting cyber-attacks against embedded systems ...
Limited resources preclude software engineers from finding and fixing all vulnerabilities in a softw...
The concept of breaking down a bigger application into smaller components is not a new idea, but it ...
This is the dataset provided for replicability for the article "Microservice Security Metrics for Se...
Microservice architectures are increasingly being used to develop application systems. Despite many ...
Microservice-based architecture is a relatively new paradigm of software development that has gained...
The fast-paced development cycles of microservices applications increase the probability of insuffic...
Due to rapid transitioning towards digitalized society and extended reliance on interconnected digit...
Security has become paramount in modern software services as more and more security breaches emerge,...
The microservice architecture is an architectural style that structures an application as a collecti...
Microservices have become the state-of-the-art architectural style for distributed systems, however ...
Despite the numerous benefits of microservices systems, security has been a critical issue in such s...
The microservice architecture enables organizations to shorten development cycles and deliver cloud-...
Microservices is an emerging paradigm for developing distributed systems. With their widespread adop...
Microservices based architectures are based on a set of modular, independent and fault-tolerant serv...
This paper presents a unique security approach for detecting cyber-attacks against embedded systems ...
Limited resources preclude software engineers from finding and fixing all vulnerabilities in a softw...
The concept of breaking down a bigger application into smaller components is not a new idea, but it ...
This is the dataset provided for replicability for the article "Microservice Security Metrics for Se...
Microservice architectures are increasingly being used to develop application systems. Despite many ...
Microservice-based architecture is a relatively new paradigm of software development that has gained...
The fast-paced development cycles of microservices applications increase the probability of insuffic...
Due to rapid transitioning towards digitalized society and extended reliance on interconnected digit...
Security has become paramount in modern software services as more and more security breaches emerge,...
The microservice architecture is an architectural style that structures an application as a collecti...
Microservices have become the state-of-the-art architectural style for distributed systems, however ...
Despite the numerous benefits of microservices systems, security has been a critical issue in such s...
The microservice architecture enables organizations to shorten development cycles and deliver cloud-...
Microservices is an emerging paradigm for developing distributed systems. With their widespread adop...
Microservices based architectures are based on a set of modular, independent and fault-tolerant serv...
This paper presents a unique security approach for detecting cyber-attacks against embedded systems ...
Limited resources preclude software engineers from finding and fixing all vulnerabilities in a softw...
The concept of breaking down a bigger application into smaller components is not a new idea, but it ...