Publisher
Springer Nature Switzerland
Reference29 articles.
1. Alspach, K.: Major vulnerability found in open source dev tool for kubernetes (2022). https://venturebeat.com/security/major-vulnerability-found-in-open-source-dev-tool-for-kubernetes/
2. Assuncao, L., Cunha, J.C.: Dynamic workflow reconfigurations for recovering from faulty cloud services, vol. 1, pp. 88–95. IEEE Computer Society (2013)
3. Chiba, T., Nakazawa, R., Horii, H., Suneja, S., Seelam, S.: Confadvisor: a performance-centric configuration tuning framework for containers on kubernetes, pp. 168–178 (2019)
4. Fairwinds: Kubernetes benchmark report security, cost, and reliability workload results (2023). https://www.fairwinds.com/kubernetes-config-benchmark-report
5. Fine, S., Singer, Y., Tishby, N.: The hierarchical hidden Markov model: analysis and applications. Mach. Learn. 32, 41–62 (1998)