References
- Data dog article, "8 surprising facts about real docker adoption"[Internet], https://www.datadoghq.com/docker-adoption/.
- Right Scale Survey, "New DevOps Trends: 2016 State of the Cloud Survey" [Internet], http://www.rightscale.com/blog/cloud-industry-insights/new-devops-trends-2016-state-cloud-survey.
- Yu-mi Bae, Sung-jae Jung, and Woo-young Soh, "Comparative Analysis of the Virtual Machine and Containers Methods through the Web Server Configuration," Journal of the Korea Institute of Information and Communication Engineering, vol.18, No. 11, pp. 2670-2677, 2014. https://doi.org/10.6109/jkiice.2014.18.11.2670
- Jung-Yeon Hwang and Ho-Yong Ryu, "Performance Comparison and Forecast Analysis between KVM and Docker," Journal of KIIT, Vol. 13, No. 11, pp. 127-136, 2015.
- Ann Mary Joy, "Performance comparison between Linux containers and virtual machines," Computer Engineering and Applications (ICACEA), 2015 International Conference, pp. 342-346, 2015.
- Andrea Tosatto, Pietro Ruiu, and Antonio Attanasio, "Container-based orchestration in cloud:state of the art and challenges," 2015 Ninth International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 70-75, 2015.
- P. China Venkanna Varma, Venkata Kalyan Chakravarthy K., V. Valli Kumari, and S. Viswanadha Raju, "Analysis of a Network IO Bottleneck in Big Data Environments Based on Docker Containers," Big Data Research, Vol. 3, pp. 24-28, 2016. https://doi.org/10.1016/j.bdr.2015.12.002
- B. R. Cha and E. J. Kang, "Global Network Verification Test for Docker-based Secured mobile VoIP," Smart Media Journal, Vol. 4, no.4, pp. 47-55, 2015
- Y. J. Lee and S. R. Rim1, "A scheme of Docker-based Version Control for Open Source Project," Journal of the Korea Academia-Industrial Cooperation Society, Vol. 17, No. 2, pp. 8-14, 2016. https://doi.org/10.5762/KAIS.2016.17.2.8
- J. W. Park and Jaegyoon Hahm, "Container-based Cluster Management System for User-driven Distributed Computing," KIISE Transactions on Computing Practices, Vol. 21, No. 9, pp. 587-595, 2015. https://doi.org/10.5626/KTCP.2015.21.9.587
- Thanh Bui, "Analysis of Docker Security" [Internet], https://pdfs.semanticscholar.org/ab69/38ec199280213fc092b45abd6170ec95abda.pdf.
- Lenny Zeltser, "Running Malware Analysis Apps as Docker Containers"[Internet] https://digital-forensics.sans.org/blog/2014/12/10/running-malware-analysis-apps-as-docker-containers.
- Dohyun Kim, Jungheum Park, and Sangjin Lee, "File Carving for Ext4 File Systemon Android OS," Journal of the Korea Institute of Information Security & Cryptology (JKIISC) Vol. 23, No. 3, pp. 417-429, 2013. https://doi.org/10.13089/JKIISC.2013.23.3.417
- Jae-hyoung Ahn, Jung-heum Park, and Sang-jin Lee, "The Rese arch on the Recovery Techniques of Deleted Files in the XFS Filesystem," Journal of the Korea Institute of Information Security & Cryptology, Vol. 24, No. 5, pp. 885-896, 2014. https://doi.org/10.13089/JKIISC.2014.24.5.885