Changes

Jump to navigation Jump to search
173 bytes added ,  13 March
m
Forensic Analysis of Podman Container Towards Metasploit Backdoor Using Checkpointctl
Line 40: Line 40:  
* 2024-04-22, [https://dl.acm.org/doi/abs/10.1145/3627703.3650085 Just-In-Time Checkpointing: Low Cost Error Recovery from Deep Learning Training Failures]
 
* 2024-04-22, [https://dl.acm.org/doi/abs/10.1145/3627703.3650085 Just-In-Time Checkpointing: Low Cost Error Recovery from Deep Learning Training Failures]
 
* 2024-04-22, [https://dl.acm.org/doi/10.1145/3627703.3629556 Pronghorn: Effective Checkpoint Orchestration for Serverless Hot-Starts]
 
* 2024-04-22, [https://dl.acm.org/doi/10.1145/3627703.3629556 Pronghorn: Effective Checkpoint Orchestration for Serverless Hot-Starts]
 +
* 2024-02-09, [https://ejournal.unitomo.ac.id/index.php/inform/article/view/7498/3738 Forensic Analysis of Podman Container Towards Metasploit Backdoor Using Checkpointctl]
 
* 2024-01-29, [https://www.sciencedirect.com/science/article/pii/S0167739X24000190 Prebaking runtime environments to improve the FaaS cold start latency]
 
* 2024-01-29, [https://www.sciencedirect.com/science/article/pii/S0167739X24000190 Prebaking runtime environments to improve the FaaS cold start latency]
 
* 2023-11-27, [https://dl.acm.org/doi/abs/10.1145/3590140.3629121 DynaCut: A Framework for Dynamic and Adaptive Program Customization]
 
* 2023-11-27, [https://dl.acm.org/doi/abs/10.1145/3590140.3629121 DynaCut: A Framework for Dynamic and Adaptive Program Customization]
355

edits

Navigation menu