{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T10:20:51Z","timestamp":1774347651560,"version":"3.50.1"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T00:00:00Z","timestamp":1774310400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T00:00:00Z","timestamp":1774310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100007689","name":"Universidade de Aveiro","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100007689","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2026,7]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Serverless computing has revolutionized cloud application development by eliminating infrastructure management complexities. However, its dynamic and ephemeral nature introduces security challenges that are difficult to mitigate using traditional mechanisms. In particular, function vulnerabilities remain a critical concern, as attackers can exploit them to compromise applications and escalate attacks across multi-tenant environments. To address these challenges, we propose an enhanced version of Moving Functions as a Service (MoFaaS), a security mechanism that leverages Moving Target Defense (MTD) and N-Version Programming (NVP) to introduce execution diversity and improve fault tolerance in serverless applications. Additionally, we incorporate a Large Language Model (LLM)-based feedback loop to assist developers in generating diverse function variants with reduced effort. We validate our contributions through open-source Proof of Concept (PoC) implementations on Knative and conduct an extensive security and performance evaluation on a realistic serverless application. The results demonstrate that our approach effectively increases attack complexity while maintaining performance within acceptable bounds.<\/jats:p>","DOI":"10.1007\/s10922-026-10054-5","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T06:45:34Z","timestamp":1774334734000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Serverless Function Resilience Against Vulnerabilities with MoFaaS"],"prefix":"10.1007","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9080-6080","authenticated-orcid":false,"given":"Pedro","family":"Escaleira","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4566-0198","authenticated-orcid":false,"given":"Vitor A.","family":"Cunha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5029-6191","authenticated-orcid":false,"given":"Jo\u00e3o P.","family":"Barraca","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5848-2802","authenticated-orcid":false,"given":"Diogo","family":"Gomes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0107-6253","authenticated-orcid":false,"given":"Rui L.","family":"Aguiar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,24]]},"reference":[{"key":"10054_CR1","unstructured":"Jonas, E., Schleier-Smith, J., Sreekanti, V., Tsai, C.-C., Khandelwal, A., Pu, Q., Shankar, V., Carreira, J., Krauth, K., Yadwadkar, N., Gonzalez, J.E., Popa, R.A., Stoica, I., Patterson, D.A.: Cloud Programming Simplified: A Berkeley View on Serverless Computing (2019). arxiv: 1902.03383"},{"issue":"10s","key":"10054_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3508360","volume":"54","author":"Z Li","year":"2022","unstructured":"Li, Z., Guo, L., Cheng, J., Chen, Q., He, B., Guo, M.: The serverless computing survey: a technical primer for design architecture. ACM Comput. Surv. 54(10s), 1\u201334 (2022). https:\/\/doi.org\/10.1145\/3508360","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"10054_CR3","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/MNET.005.2100335","volume":"37","author":"X Li","year":"2023","unstructured":"Li, X., Leng, X., Chen, Y.: Securing serverless computing: challenges, solutions, and opportunities. IEEE Netw. 37(2), 166\u2013173 (2023). https:\/\/doi.org\/10.1109\/MNET.005.2100335","journal-title":"IEEE Netw."},{"issue":"1","key":"10054_CR4","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1186\/s13677-022-00347-w","volume":"11","author":"E Marin","year":"2022","unstructured":"Marin, E., Perino, D., Di Pietro, R.: Serverless computing: a security perspective. J. Cloud Comput. 11(1), 69 (2022). https:\/\/doi.org\/10.1186\/s13677-022-00347-w","journal-title":"J. Cloud Comput."},{"key":"10054_CR5","unstructured":"Podjarny, G., Tal, L.: Serverless Security, (2019). https:\/\/www.oreilly.com\/library\/view\/serverless-security\/9781492082538\/"},{"key":"10054_CR6","doi-asserted-by":"publisher","unstructured":"Escaleira, P., Cunha, V.A., Barraca, J.P., Gomes, D., Aguiar, R.L.: MoFaaS: A moving target defense approach to fortify functions as a service. In: 2024 IEEE Symposium on Computers and Communications (ISCC), pp. 1\u20137. IEEE, Paris, France (2024). https:\/\/doi.org\/10.1109\/ISCC61673.2024.10733628","DOI":"10.1109\/ISCC61673.2024.10733628"},{"key":"10054_CR7","doi-asserted-by":"publisher","unstructured":"Escaleira, P.: MoFaaS. Zenodo (2026) [software]. https:\/\/doi.org\/10.5281\/zenodo.18957225","DOI":"10.5281\/zenodo.18957225"},{"key":"10054_CR8","doi-asserted-by":"publisher","unstructured":"Escaleira, P.: MoFaaS LLM Feedback Loop. Zenodo (2026) [software]. https:\/\/doi.org\/10.5281\/zenodo.18957245","DOI":"10.5281\/zenodo.18957245"},{"key":"10054_CR9","unstructured":"Knative Project: Knative. [software] (n.d.). https:\/\/knative.dev\/"},{"issue":"5","key":"10054_CR10","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MIC.2018.053681358","volume":"22","author":"E Eyk","year":"2018","unstructured":"Eyk, E., Toader, L., Talluri, S., Versluis, L., Uta, A., Iosup, A.: Serverless is more: from paas to present cloud computing. IEEE Internet Comput. 22(5), 8\u201317 (2018). https:\/\/doi.org\/10.1109\/MIC.2018.053681358","journal-title":"IEEE Internet Comput."},{"key":"10054_CR11","doi-asserted-by":"publisher","unstructured":"Baldini, I., Cheng, P., Fink, S.J., Mitchell, N., Muthusamy, V., Rabbah, R., Suter, P., Tardieu, O.: The serverless trilemma: Function composition for serverless computing. In: Proceedings of the 2017 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, pp. 89\u2013103. ACM, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3133850.3133855","DOI":"10.1145\/3133850.3133855"},{"key":"10054_CR12","doi-asserted-by":"publisher","unstructured":"Sankaran, A., Datta, P., Bates, A.: Workflow integration alleviates identity and access management in serverless computing. In: Annual Computer Security Applications Conference, pp. 496\u2013509. ACM, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3427228.3427665","DOI":"10.1145\/3427228.3427665"},{"key":"10054_CR13","doi-asserted-by":"publisher","unstructured":"Datta, P., Kumar, P., Morris, T., Grace, M., Rahmati, A., Bates, A.: Valve: securing function workflows on serverless computing platforms. In: Proceedings of The Web Conference 2020, pp. 939\u2013950. ACM, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3366423.3380173","DOI":"10.1145\/3366423.3380173"},{"key":"10054_CR14","unstructured":"Datta, P., Polinsky, I., Inam, M.A., Bates, A., Enck, W.: ALASTOR: Reconstructing the provenance of serverless intrusions. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 2443\u20132460. USENIX Association, Boston, MA (2022). https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/datta"},{"key":"10054_CR15","unstructured":"Jegan, D.S., Wang, L., Bhagat, S., Swift, M.: Guarding serverless applications with kalium. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 4087\u20134104. USENIX Association, Anaheim, CA (2023). https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/jegan"},{"key":"10054_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-025-05371-4","author":"P Escaleira","year":"2025","unstructured":"Escaleira, P., Cunha, V.A., Barraca, J.P., Gomes, D., Aguiar, R.L.: A systematic review on security mechanisms for serverless computing. Clust. Comput. (2025). https:\/\/doi.org\/10.1007\/s10586-025-05371-4","journal-title":"Clust. Comput."},{"key":"10054_CR17","doi-asserted-by":"publisher","unstructured":"Byrne, A., Nadgowda, S., Coskun, A.K.: ACE: Just-in-time serverless software component discovery through approximate concrete execution. In: Proceedings of the 2020 Sixth International Workshop on Serverless Computing, pp. 37\u201342. ACM, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3429880.3430098","DOI":"10.1145\/3429880.3430098"},{"key":"10054_CR18","doi-asserted-by":"publisher","unstructured":"Xi, Z., Zhang, B., Ma, Y., He, C., Wang, Y.: The MDSC paradigm design for serverless computing defense. In: Li, X. (ed.) Third International Conference on Artificial Intelligence and Computer Engineering (ICAICE 2022), p. 78. SPIE, Wuhan, Hubei, China (2023). https:\/\/doi.org\/10.1117\/12.2671158","DOI":"10.1117\/12.2671158"},{"issue":"6","key":"10054_CR19","doi-asserted-by":"publisher","first-page":"192","DOI":"10.23919\/JCC.fa.2021-0635.202406","volume":"21","author":"Z Shuai","year":"2024","unstructured":"Shuai, Z., Yunfei, G., Hongchao, H., Wenyan, L., Yawen, W.: ATSSC: An attack tolerant system in serverless computing. China Commun. 21(6), 192\u2013205 (2024). https:\/\/doi.org\/10.23919\/JCC.fa.2021-0635.202406","journal-title":"China Commun."},{"key":"10054_CR20","doi-asserted-by":"publisher","unstructured":"Shen, J., Zhang, H., Geng, Y., Li, J., Wang, J., Xu, M.: Gringotts: Fast and accurate internal denial-of-wallet detection for serverless computing. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 2627\u20132641. ACM, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3548606.3560629","DOI":"10.1145\/3548606.3560629"},{"key":"10054_CR21","doi-asserted-by":"publisher","unstructured":"Kharbanda, S., Fonseca, P.: Always-on recording framework for serverless computations: opportunities and challenges. In: Proceedings of the 1st Workshop on Serverless Systems, Applications and Methodologies, pp. 41\u201349. ACM, New York, NY, USA (2023).  https:\/\/doi.org\/10.1145\/3592533.3592810","DOI":"10.1145\/3592533.3592810"},{"key":"10054_CR22","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.jss.2018.12.013","volume":"149","author":"P Leitner","year":"2019","unstructured":"Leitner, P., Wittern, E., Spillner, J., Hummer, W.: A mixed-method empirical study of Function-as-a-Service software development in industrial practice. J. Syst. Softw. 149, 340\u2013359 (2019). https:\/\/doi.org\/10.1016\/j.jss.2018.12.013","journal-title":"J. Syst. Softw."},{"key":"10054_CR23","unstructured":"Eismann, S., Scheuner, J., Eyk, E., Schwinger, M., Grohmann, J., Herbst, N., Abad, C.L., Iosup, A.: A Review of Serverless Use Cases and their Characteristics (2020). arXiv: https:\/\/arxiv.org\/abs\/2008.11110arXiv:2008.11110"},{"key":"10054_CR24","unstructured":"NITRD: National Cyber Leap Year Summit 2009 Participants\u2019 Ideas Report. Technical report (2009). https:\/\/www.nitrd.gov\/nitrdgroups\/images\/5\/5f\/National_Cyber_Leap_Year_Summit_2009_Participants_Ideas_Report.pdf"},{"issue":"1","key":"10054_CR25","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1109\/COMST.2019.2963791","volume":"22","author":"J-H Cho","year":"2020","unstructured":"Cho, J.-H., Sharma, D.P., Alavizadeh, H., Yoon, S., Ben-Asher, N., Moore, T.J., Kim, D.S., Lim, H., Nelson, F.F.: Toward proactive, adaptive defense: a survey on moving target defense. IEEE Commun. Surv. Tutor. 22(1), 709\u2013745 (2020). https:\/\/doi.org\/10.1109\/COMST.2019.2963791","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10054_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2021.101412","volume":"74","author":"VA Cunha","year":"2021","unstructured":"Cunha, V.A., Corujo, D., Barraca, J.P., Aguiar, R.L.: TOTP Moving Target Defense for sensitive network services. Pervasive Mob. Comput. 74, 101412 (2021). https:\/\/doi.org\/10.1016\/j.pmcj.2021.101412","journal-title":"Pervasive Mob. Comput."},{"key":"10054_CR27","doi-asserted-by":"publisher","unstructured":"Merino Aguilera, X., Otero, C., Ridley, M., Elliott, D.: Managed containers: A framework for resilient containerized mission critical systems. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp. 946\u2013949. IEEE, San Francisco, CA, USA (2018). https:\/\/doi.org\/10.1109\/CLOUD.2018.00142","DOI":"10.1109\/CLOUD.2018.00142"},{"issue":"1","key":"10054_CR28","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.ijcip.2012.01.002","volume":"5","author":"H Okhravi","year":"2012","unstructured":"Okhravi, H., Comella, A., Robinson, E., Haines, J.: Creating a cyber moving target for critical infrastructure applications using platform diversity. Int. J. Crit. Infrastruct. Prot. 5(1), 30\u201339 (2012). https:\/\/doi.org\/10.1016\/j.ijcip.2012.01.002","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"10054_CR29","doi-asserted-by":"publisher","unstructured":"Ahmed, N.O., Bhargava, B.: Mayflies. In: Proceedings of the 2016 ACM Workshop on Moving Target Defense, pp. 59\u201364. ACM, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2995272.2995283","DOI":"10.1145\/2995272.2995283"},{"key":"10054_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100916","volume":"24","author":"P Escaleira","year":"2023","unstructured":"Escaleira, P., Cunha, V.A., Gomes, D., Barraca, J.P., Aguiar, R.L.: Moving Target Defense for the cloud\/edge Telco environments. Internet of Things 24, 100916 (2023). https:\/\/doi.org\/10.1016\/j.iot.2023.100916","journal-title":"Internet of Things"},{"key":"10054_CR31","doi-asserted-by":"publisher","unstructured":"Chen, L., Avizienis, A.: N-Version programming: a fault-tolerance approach to reliability of software operation. In: Proceedings - Annual International Conference on Fault-Tolerant Computing (1978). https:\/\/doi.org\/10.1109\/FTCSH.1995.532621","DOI":"10.1109\/FTCSH.1995.532621"},{"key":"10054_CR32","doi-asserted-by":"publisher","unstructured":"Hu, T., Bertolott, I.C., Navet, N.: Towards seamless integration of N-version programming in model-based design. In: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1\u20138. IEEE, Limassol, Cyprus (2017). https:\/\/doi.org\/10.1109\/ETFA.2017.8247678","DOI":"10.1109\/ETFA.2017.8247678"},{"key":"10054_CR33","unstructured":"Cox, B., Evans, D., Filipi, A., Rowanhill, J., Hu, W., Davidson, J., Knight, J., Nguyen-Tuong, A., Hiser, J.: N-Variant Systems: A Secretless Framework for Security through Diversity. 15th USENIX Security Symposium, 105\u2013120 (2006). https:\/\/www.usenix.org\/conference\/15th-usenix-security-symposium\/n-variant-systems-secretless-framework-security-through"},{"key":"10054_CR34","doi-asserted-by":"publisher","unstructured":"Zavalyshyn, I., O. Duarte, N., Santos, N.: An Extended Case Study about Securing Smart Home Hubs Through N-version Programming, 289\u2013300 (2018). https:\/\/doi.org\/10.5220\/0006854002890300","DOI":"10.5220\/0006854002890300"},{"key":"10054_CR35","unstructured":"OWASP: OWASP Top 10: Serverless Interpretation. Technical report, OWASP (2017). https:\/\/owasp.org\/www-pdf-archive\/OWASP-Top-10-Serverless-Interpretation-en.pdf"},{"key":"10054_CR36","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6743070","author":"W-S Choi","year":"2022","unstructured":"Choi, W.-S., Lee, S.-Y., Choi, S.-G.: Implementation and design of a zero-day intrusion detection and response system for responding to network security blind spots. Mob. Inf. Syst. (2022). https:\/\/doi.org\/10.1155\/2022\/6743070","journal-title":"Mob. Inf. Syst."},{"key":"10054_CR37","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1015\/4\/042060","volume":"1015","author":"RY Tsarev","year":"2018","unstructured":"Tsarev, R.Y., Durmu\u015f, M.S., \u00dcstoglu, I., Morozov, V.A.: Classification of voting algorithms for N-version software. J. Phys: Conf. Ser. 1015, 042060 (2018). https:\/\/doi.org\/10.1088\/1742-6596\/1015\/4\/042060","journal-title":"J. Phys: Conf. Ser."},{"key":"10054_CR38","doi-asserted-by":"publisher","unstructured":"H\u00f6ller, A., Rauter, T., Iber, J., Kreiner, C.: Patterns for automated software diversity to support security and reliability. In: Proceedings of the 20th European Conference on Pattern Languages of Programs, pp. 1\u201313. ACM, New York, NY, USA (2015). https:\/\/doi.org\/10.1145\/2855321.2855360","DOI":"10.1145\/2855321.2855360"},{"key":"10054_CR39","doi-asserted-by":"publisher","unstructured":"Xu, F.F., Alon, U., Neubig, G., Hellendoorn, V.J.: A systematic evaluation of large language models of code. In: Proceedings of the 6th ACM SIGPLAN International Symposium on Machine Programming, pp. 1\u201310. ACM, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3520312.3534862","DOI":"10.1145\/3520312.3534862"},{"issue":"3","key":"10054_CR40","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s10664-025-10614-4","volume":"30","author":"F Tambon","year":"2025","unstructured":"Tambon, F., Moradi-Dakhel, A., Nikanjam, A., Khomh, F., Desmarais, M.C., Antoniol, G.: Bugs in large language models generated code: an empirical study. Empir. Softw. Eng. 30(3), 65 (2025). https:\/\/doi.org\/10.1007\/s10664-025-10614-4","journal-title":"Empir. Softw. Eng."},{"key":"10054_CR41","unstructured":"Knative Project: Knative Offerings. (n.d.). https:\/\/knative.dev\/docs\/install\/knative-offerings\/"},{"key":"10054_CR42","unstructured":"Kubernetes Project: Controllers \u2014 Controller Pattern. (n.d.). https:\/\/kubernetes.io\/docs\/concepts\/architecture\/controller\/#controller-pattern"},{"key":"10054_CR43","unstructured":"aiohttp Project: aiohttp. [software] (n.d.). https:\/\/docs.aiohttp.org\/"},{"key":"10054_CR44","unstructured":"CloudEvents Project: CloudEvents. [software] (n.d.). https:\/\/cloudevents.io\/"},{"key":"10054_CR45","unstructured":"Knative Project: Knative Eventing \u2014 The Event-driven Application Platform for Kubernetes. (n.d.). https:\/\/knative.dev\/docs\/eventing\/"},{"key":"10054_CR46","unstructured":"The Linux man-pages project: iptables(8) \u2013 Linux Manual Page. The Linux Kernel Organization, (2025). The Linux Kernel Organization. https:\/\/man7.org\/linux\/man-pages\/man8\/iptables.8.html"},{"key":"10054_CR47","unstructured":"Envoy Project: Envoy Proxy. [software] (n.d.). https:\/\/www.envoyproxy.io\/"},{"key":"10054_CR48","unstructured":"The Linux man-pages project: capabilities(7) \u2013 Linux Manual Page. The Linux Kernel Organization, (2025). The Linux Kernel Organization. https:\/\/man7.org\/linux\/man-pages\/man7\/capabilities.7.html"},{"key":"10054_CR49","unstructured":"Kubernetes Project: Init Containers. (n.d.). https:\/\/kubernetes.io\/docs\/concepts\/workloads\/pods\/init-containers\/"},{"key":"10054_CR50","unstructured":"Kyverno Project: Kyverno. [software] (n.d.). https:\/\/kyverno.io\/"},{"key":"10054_CR51","unstructured":"llama-cpp-python Project: llama-cpp-python. [software] (n.d.). https:\/\/llama-cpp-python.readthedocs.io\/"},{"key":"10054_CR52","unstructured":"llama.cpp Project: llama.cpp. [software] (n.d.). https:\/\/github.com\/ggml-org\/llama.cpp"},{"key":"10054_CR53","unstructured":"Abdin, M., Aneja, J., Behl, H., Bubeck, S., Eldan, R., Gunasekar, S., Harrison, M., Hewett, R.J., Javaheripi, M., Kauffmann, P., Lee, J.R., Lee, Y.T., Li, Y., Liu, W., Mendes, C.C.T., Nguyen, A., Price, E., Rosa, G., Saarikivi, O., Salim, A., Shah, S., Wang, X., Ward, R., Wu, Y., Yu, D., Zhang, C., Zhang, Y.: Phi-4 Technical Report (2024). arxiv: 2412.08905"},{"key":"10054_CR54","unstructured":"ggml Project: GGUF. [software] (n.d.). https:\/\/github.com\/ggml-org\/ggml\/blob\/master\/docs\/gguf.md"},{"key":"10054_CR55","doi-asserted-by":"publisher","unstructured":"Lang, J., Guo, Z., Huang, S.: A comprehensive study on quantization techniques for large language models. In: 2024 4th International Conference on Artificial Intelligence, Robotics, and Communication (ICAIRC), pp. 224\u2013231. IEEE, Xiamen, China (2024). https:\/\/doi.org\/10.1109\/ICAIRC64177.2024.10899941","DOI":"10.1109\/ICAIRC64177.2024.10899941"},{"key":"10054_CR56","unstructured":"goimports Project: goimports. [software] (n.d.). https:\/\/pkg.go.dev\/golang.org\/x\/tools\/cmd\/goimports"},{"key":"10054_CR57","unstructured":"Go Project: Go Modules Reference \u2013 go mod tidy. [software] (n.d.). https:\/\/go.dev\/ref\/mod#go-mod-tidy"},{"key":"10054_CR58","unstructured":"golangci-lint Project: golangci-lint. [software] (n.d.). https:\/\/golangci-lint.run\/"},{"key":"10054_CR59","unstructured":"kaniko Project: kaniko. [software] (n.d.). https:\/\/github.com\/GoogleContainerTools\/kaniko"},{"key":"10054_CR60","unstructured":"Robot Framework Project: Robot Framework. [software] (n.d.). https:\/\/robotframework.org\/"},{"key":"10054_CR61","unstructured":"open-chat-playground Project: open-chat-playground. [software] (n.d.). https:\/\/github.com\/abetlen\/open-chat-playground"},{"key":"10054_CR62","unstructured":"Directus Project: Directus. [software] (n.d.). https:\/\/directus.io\/"},{"key":"10054_CR63","unstructured":"MySQL Project: MySQL. [software] (n.d.). https:\/\/www.mysql.com\/"},{"key":"10054_CR64","doi-asserted-by":"publisher","unstructured":"Jones, M.B., Bradley, J., Sakimura, N.: JSON Web Token (JWT). RFC Editor (2015). https:\/\/doi.org\/10.17487\/RFC7519","DOI":"10.17487\/RFC7519"},{"key":"10054_CR65","unstructured":"SUSE: K3s. [software] (n.d.). https:\/\/k3s.io\/"},{"key":"10054_CR66","unstructured":"Proxmox Project: Proxmox. [software] (n.d.). https:\/\/www.proxmox.com\/"},{"key":"10054_CR67","unstructured":"Apache OpenWhisk Project: Apache OpenWhisk. [software] (n.d.). https:\/\/openwhisk.apache.org\/"},{"key":"10054_CR68","unstructured":"Flask Project: Flask Documentation. [software] (n.d.). https:\/\/flask.palletsprojects.com\/"},{"key":"10054_CR69","unstructured":"SQLite Project: SQLite. [software] (n.d.). https:\/\/www.sqlite.org\/"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-026-10054-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-026-10054-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-026-10054-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T06:46:00Z","timestamp":1774334760000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-026-10054-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,24]]},"references-count":69,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,7]]}},"alternative-id":["10054"],"URL":"https:\/\/doi.org\/10.1007\/s10922-026-10054-5","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,24]]},"assertion":[{"value":"13 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"72"}}