{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:16:16Z","timestamp":1775067376147,"version":"3.50.1"},"reference-count":254,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3481374","type":"journal-article","created":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T18:04:50Z","timestamp":1729101890000},"page":"155168-155204","source":"Crossref","is-referenced-by-count":11,"title":["Microservice Vulnerability Analysis: A Literature Review With Empirical Insights"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4802-1382","authenticated-orcid":false,"given":"Raveen","family":"Kanishka Jayalath","sequence":"first","affiliation":[{"name":"School of Computer and Mathematical Sciences, The University of Adelaide, Adelaide, SA, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8815-7587","authenticated-orcid":false,"given":"Hussain","family":"Ahmad","sequence":"additional","affiliation":[{"name":"School of Computer and Mathematical Sciences, The University of Adelaide, Adelaide, SA, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8212-8793","authenticated-orcid":false,"given":"Diksha","family":"Goel","sequence":"additional","affiliation":[{"name":"CSIRO&#x2019;s Data61, Clayton, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4812-4654","authenticated-orcid":false,"given":"Muhammad","family":"Shuja Syed","sequence":"additional","affiliation":[{"name":"SLB, Houston, TX, USA"}]},{"given":"Faheem","family":"Ullah","sequence":"additional","affiliation":[{"name":"School of Computer and Mathematical Sciences, The University of Adelaide, Adelaide, SA, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3152803"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3631607"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS51251.2021.00030"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"88339","DOI":"10.1109\/ACCESS.2023.3305687","article-title":"A survey on microservices architecture: Principles, patterns and migration challenges","volume":"11","author":"Velepucha","year":"2023","journal-title":"IEEE Access"},{"key":"ref5","volume-title":"Predicting resource usage on a Kubernetes platform using machine learning methods","author":"G\u00f6rd\u00e9n","year":"2023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA59870.2024.00013"},{"key":"ref7","article-title":"Towards deep learning enabled cybersecurity risk assessment for microservice architectures","author":"Abdulsatar","year":"2024","journal-title":"arXiv:2403.15169"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.01.320"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67425-4_12"},{"key":"ref10","article-title":"How microservices are changing the security landscape","author":"Shmeleva","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24308-1_46"},{"key":"ref12","volume-title":"Microservices Security in Action","author":"Dias","year":"2020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4436"},{"key":"ref14","volume-title":"Microservice Security: A Systematization of Knowledge and Empirical Analysis","author":"Jayalath","year":"2024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100415"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2019.00050"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2016.7856721"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2020.110798","article-title":"A systematic mapping study on microservices architecture in DevOps","volume":"170","author":"Waseem","year":"2020","journal-title":"J. Syst. Softw."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1201\/9780429329920"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEIE47180.2019.8981437"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.217"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC54203.2021.9671131"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud.2018.00137"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/fi15070228"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/app12063023"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/910\/1\/012060"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT50939.2020.9295931"},{"key":"ref28","article-title":"Enhancing availability of microservice architecture: A case study on Kubernetes security configurations","author":"Habbal","year":"2020"},{"key":"ref29","volume-title":"Stone & Chalk: Leading Innovation Startup & Scaleup Hub","year":"2024"},{"key":"ref30","volume-title":"AustCyber","year":"2024"},{"key":"ref31","volume-title":"AustCyber and Stone & Chalk Merger","year":"2024"},{"key":"ref32","volume-title":"Migrova\u2014An Australia Immigration Marketplace","year":"2024"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.9770\/IRD.2020.2.4(6)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1057\/s41283-020-00063-2"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3558001"},{"key":"ref36","first-page":"1","article-title":"Cybersecurity in Saudi Arabia","volume":"14","author":"Olech","year":"2021","journal-title":"Retrieved July"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2118\/0316-0042-JPT"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CCGridW59191.2023.00017"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007960"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.21314\/jop.2020.249"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2021.07.013"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2023.03.009"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/EMR.2024.3389557"},{"key":"ref44","volume-title":"The Cyber Threat and Globalization: The Impact on U.S. National and International Security","author":"Jarmon","year":"2018"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3406500"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.779"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111393"},{"key":"ref48","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102200","article-title":"Security in microservice-based systems: A multivocal literature review","volume":"103","author":"Pereira-Vale","year":"2021","journal-title":"Comput. Secur."},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3147213.3147229"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA-C50368.2020.00024"},{"key":"ref51","article-title":"A framework to build secure microservice architecture","author":"Ramirez","year":"2023"},{"key":"ref52","first-page":"54","article-title":"A novel approach to secure microservice architecture from OWASP vulnerabilities","volume-title":"Proc. CITRENZ Conf.","author":"Baker"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp0630a"},{"key":"ref54","volume-title":"The Common Vulnerabilities and Exposures (CVE)","year":"2024"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16697-6_1"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74781-1_15"},{"issue":"3","key":"ref57","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MS.2018.2141028","article-title":"Challenges of domain-driven microservice design: A model-driven perspective","volume":"35","author":"Rademacher","year":"2018","journal-title":"IEEE Softw."},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3390\/s19224905"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-1937-9"},{"key":"ref60","volume-title":"Microservices Security in Action","author":"Prabath","year":"2020"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2967"},{"key":"ref62","article-title":"Security design patterns in distributed microservice architecture","author":"Rudrabhatla","year":"2020","journal-title":"arXiv:2008.03395"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01704-0"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2016.15"},{"key":"ref65","article-title":"Securing microservices: A practical approach","author":"Loureiro","year":"2021"},{"key":"ref66","article-title":"Investigating the security of a microservices architecture: A case study on microservice and Kubernetes security","author":"Muresu","year":"2021"},{"key":"ref67","first-page":"3","article-title":"A microservice-based health information system for student-run clinics","volume-title":"Proc. Int. Conf. Comput. Sci. Appl.","author":"de Morais"},{"key":"ref68","article-title":"Container security: Precaution levels, mitigation strategies, and research perspectives","volume":"135","author":"Sethuraman","year":"2023","journal-title":"Comput. Secur."},{"key":"ref69","volume-title":"Advances in Service-Oriented and Cloud Computing","volume":"1360","author":"Zirpins","year":"2020"},{"issue":"3","key":"ref70","first-page":"201","article-title":"A survey on microservice security-trends in architecture, privacy, and standardization on cloud computing environments","volume":"11","author":"Monteiro","year":"2018","journal-title":"Int. J. Adv. Secur."},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16697-6"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.123"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CLEI47609.2019.235060"},{"key":"ref74","volume-title":"Designing Distributed Systems: Patterns and Paradigms for Scalable, Reliable Services","author":"Burns","year":"2018"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.105"},{"key":"ref76","first-page":"1165","article-title":"A survey: Microservices architecture in advanced manufacturing systems","volume-title":"Proc. IEEE 17th Int. Conf. Ind. Informat. (INDIN)","author":"Homay"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911732"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.jss.2019.01.001","article-title":"Architecting with microservices: A systematic mapping study","volume":"150","author":"Di Francesco","year":"2019","journal-title":"J. Syst. Softw."},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65127-9_10"},{"key":"ref80","article-title":"Defense-in-depth methods in microservices access control","author":"Suomalainen","year":"2019"},{"key":"ref81","volume-title":"Microservices: Flexible Software Architecture","author":"Wolff","year":"2017"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.042"},{"key":"ref83","first-page":"120","article-title":"Performance comparison of monolith and microservices-based applications","volume-title":"Proc. 25th World Multi-Conf. Systemics, Cybern. Inform. (WMSCI)","author":"Barczak"},{"key":"ref84","volume-title":"Building Microservices: Designing Fine-grained Systems","author":"Newman","year":"2015"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C51114.2020.00107"},{"issue":"2","key":"ref86","first-page":"1","article-title":"Design of modern distributed systems based on microservices architecture","volume":"12","author":"Shabani","year":"2021","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"4","key":"ref87","doi-asserted-by":"crossref","first-page":"58","DOI":"10.3390\/fi9040058","article-title":"Access control with delegated authorization policy evaluation for data-driven microservice workflows","volume":"9","author":"Preuveneers","year":"2017","journal-title":"Future Internet"},{"issue":"9","key":"ref88","doi-asserted-by":"crossref","first-page":"4424","DOI":"10.3390\/app12094424","article-title":"Feature-driven characterization of microservice architectures: A survey of the state of the practice","volume":"12","author":"S\u00f6ylemez","year":"2022","journal-title":"Appl. Sci."},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700089"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2018.00011"},{"key":"ref91","volume-title":"OWASP Top 10 API Security Risks\u20142023","year":"2023"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.34121\/1028-9763-2023-3-51-58"},{"key":"ref93","volume-title":"Microservices Vs. Service-Oriented Architecture","author":"Richards","year":"2015"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18419-3"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.09.007"},{"key":"ref96","first-page":"285","article-title":"Fine-grained access control for microservices","volume-title":"Proc. 11th Int. Symp. Found. Pract. Secur.","author":"Nehme"},{"key":"ref97","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-04771-9","volume-title":"Software Technologies: Applications and Foundations","author":"Mazzara","year":"2018"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2017.12.194"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3233255"},{"key":"ref100","volume-title":"Microservices: Building Scalable Software","author":"Sharma","year":"2016"},{"key":"ref101","article-title":"Security challenges of microservices","author":"Jalonen","year":"2022"},{"key":"ref102","article-title":"Microservices for automated threat response to phishing","author":"Dohnal","year":"2021"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/REW.2016.026"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24308-1_11"},{"key":"ref105","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.comcom.2018.03.011","article-title":"Docker ecosystem\u2014Vulnerability analysis","volume":"122","author":"Martin","year":"2018","journal-title":"Comput. Commun."},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.04.047"},{"key":"ref107","volume-title":"Learn Kubernetes Security: Securely Orchestrate, Scale, and Manage Your Microservices in Kubernetes Deployments","author":"Huang","year":"2020"},{"key":"ref108","article-title":"Development of hierarchical taxonomy that incorporates patterns for improving security in information systems based on microservice architecture","author":"Tenev","year":"2020"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340502"},{"issue":"3","key":"ref110","first-page":"51","article-title":"Securing microservice CICD pipelines in cloud deployments through infrastructure as code implementation approach and best practices","volume":"3","author":"Singh","year":"2022","journal-title":"J. Sci. Technol."},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.64"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2018.1520056"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34339-2_24"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3538986"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-204C"},{"issue":"5","key":"ref116","first-page":"1117","article-title":"Microservices-based DevSecOps platform using Pipeline and open source software","volume":"39","author":"Lee","year":"2023","journal-title":"J. Inf. Sci. Eng."},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud49737.2020.00034"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111014"},{"key":"ref119","volume-title":"Software Vulnerability CVE-2023-28346","year":"2024"},{"key":"ref120","volume-title":"Software Vulnerability CVE-2019-11248","year":"2024"},{"key":"ref121","volume-title":"Software Vulnerability CVE-2023-52077","year":"2024"},{"key":"ref122","volume-title":"Software Vulnerability CVE-2024-24771","year":"2024"},{"key":"ref123","volume-title":"Software Vulnerability CVE-2024-4200","year":"2024"},{"key":"ref124","volume-title":"Software Vulnerability CVE-2018-1002105","year":"2024"},{"key":"ref125","volume-title":"Software Vulnerability CVE-2024-21661","year":"2024"},{"key":"ref126","volume-title":"Software Vulnerability CVE-2024-41701","year":"2024"},{"key":"ref127","volume-title":"Software Vulnerability CVE-2020-8554","year":"2024"},{"key":"ref128","volume-title":"Software Vulnerability CVE-2024-30381","year":"2024"},{"key":"ref129","volume-title":"Software Vulnerability CVE-2024-28848","year":"2024"},{"key":"ref130","volume-title":"Software Vulnerability CVE-2022-39388","year":"2024"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3044610"},{"key":"ref132","volume-title":"Software Vulnerability CVE-2023-6229","year":"2024"},{"key":"ref133","volume-title":"Software Vulnerability CVE-2024-40632","year":"2024"},{"key":"ref134","volume-title":"Software Vulnerability CVE-2024-25124","year":"2024"},{"key":"ref135","volume-title":"Software Vulnerability CVE-2024-3384","year":"2024"},{"key":"ref136","volume-title":"Software Vulnerability CVE-2018-15664","year":"2024"},{"key":"ref137","volume-title":"Software Vulnerability CVE-2020-7802","year":"2024"},{"key":"ref138","volume-title":"Software Vulnerability CVE-2016-2183","year":"2024"},{"key":"ref139","volume-title":"Software Vulnerability CVE-2024-28872","year":"2024"},{"key":"ref140","volume-title":"Software Vulnerability CVE-2018-7750","year":"2024"},{"key":"ref141","volume-title":"Software Vulnerability CVE-2016-0733","year":"2024"},{"key":"ref142","volume-title":"Software Vulnerability CVE-2024-25124","year":"2024"},{"key":"ref143","volume-title":"Software Vulnerability CVE-2024-25731","year":"2024"},{"key":"ref144","volume-title":"Software Vulnerability CVE-2023-48840","year":"2024"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04596-z"},{"key":"ref146","volume-title":"Software Vulnerability CVE-2018-6389","year":"2024"},{"key":"ref147","volume-title":"Software Vulnerability CVE-2023-20155","year":"2024"},{"key":"ref148","volume-title":"Software Vulnerability 2023-20155","year":"2024"},{"key":"ref149","volume-title":"Software Vulnerability CVE-2024-0555","year":"2024"},{"key":"ref150","volume-title":"Software Vulnerability CVE-2023-4420","year":"2024"},{"key":"ref151","volume-title":"Software Vulnerability CVE-2023-2986","year":"2024"},{"key":"ref152","volume-title":"Software Vulnerability CVE-2024-22432","year":"2024"},{"key":"ref153","volume-title":"Software Vulnerability CVE-2023-27860","year":"2024"},{"key":"ref154","volume-title":"Software Vulnerability CVE-2020-0601","year":"2024"},{"key":"ref155","volume-title":"Software Vulnerability CVE-2024-33551","year":"2024"},{"key":"ref156","volume-title":"Software Vulnerability CVE-2024-5385","year":"2024"},{"key":"ref157","volume-title":"Software Vulnerability CVE-2019-12735","year":"2024"},{"key":"ref158","volume-title":"Software Vulnerability CVE-2019-2725","year":"2024"},{"key":"ref159","volume-title":"Software Vulnerability CVE-2024-5128","year":"2024"},{"key":"ref160","volume-title":"Software Vulnerability CVE-2024-29210","year":"2024"},{"key":"ref161","volume-title":"Software Vulnerability CVE-2024-0865","year":"2024"},{"key":"ref162","volume-title":"Software Vulnerability CVE-2024-2338","year":"2024"},{"key":"ref163","volume-title":"Software Vulnerability CVE-2024-5558","year":"2024"},{"key":"ref164","volume-title":"Software Vulnerability CVE-2023-34362","year":"2024"},{"key":"ref165","volume-title":"Software Vulnerability CVE-2024-6778","year":"2024"},{"key":"ref166","volume-title":"Software Vulnerability CVE-2024-2032","year":"2024"},{"key":"ref167","volume-title":"Software Vulnerability CVE-2023-6271","year":"2024"},{"key":"ref168","volume-title":"Software Vulnerability CVE-2023-5808","year":"2024"},{"key":"ref169","volume-title":"Software Vulnerability CVE-2023-6553","year":"2024"},{"key":"ref170","volume-title":"Software Vulnerability CVE-2024-20358","year":"2024"},{"key":"ref171","volume-title":"Software Vulnerability CVE-2014-0160","year":"2024"},{"key":"ref172","volume-title":"Software Vulnerability CVE-2021-29659","year":"2024"},{"key":"ref173","volume-title":"Software Vulnerability CVE-2024-5967","year":"2024"},{"key":"ref174","volume-title":"Software Vulnerability CVE-2024-21643","year":"2024"},{"key":"ref175","volume-title":"Software Vulnerability CVE-2024-24830","year":"2024"},{"key":"ref176","volume-title":"Software Vulnerability CVE-2024-27782","year":"2024"},{"key":"ref177","volume-title":"Software Vulnerability CVE-2024-20395","year":"2024"},{"key":"ref178","volume-title":"Software Vulnerability CVE-2024-39208","year":"2024"},{"key":"ref179","volume-title":"Software Vulnerability CVE-2023-38489","year":"2024"},{"key":"ref180","volume-title":"Software Vulnerability CVE-2023-7028","year":"2024"},{"key":"ref181","volume-title":"Software Vulnerability CVE-2019-11510","year":"2024"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.12.006"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8660-1_38"},{"key":"ref184","volume-title":"Software Vulnerability CVE-2019-16759","year":"2024"},{"key":"ref185","volume-title":"Software Vulnerability CVE-2021-44877","year":"2024"},{"key":"ref186","volume-title":"Software Vulnerability CVE-2021-41635","year":"2024"},{"key":"ref187","volume-title":"Software Vulnerability CVE-2024-5166","year":"2024"},{"key":"ref188","volume-title":"Software Vulnerability CVE-2021-40444","year":"2024"},{"key":"ref189","volume-title":"Software Vulnerability CVE-2017-3506","year":"2024"},{"key":"ref190","volume-title":"Software Vulnerability CVE-2023-38001","year":"2024"},{"key":"ref191","volume-title":"Software Vulnerability CVE-2022-39801","year":"2024"},{"key":"ref192","volume-title":"Software Vulnerability CVE-2019-16782","year":"2024"},{"key":"ref193","volume-title":"Software Vulnerability CVE-2019-5736","year":"2024"},{"key":"ref194","volume-title":"Software Vulnerability CVE-2020-15257","year":"2024"},{"key":"ref195","volume-title":"Software Vulnerability CVE-2023-38275","year":"2024"},{"key":"ref196","volume-title":"Software Vulnerability CVE-2018-14620","year":"2024"},{"key":"ref197","volume-title":"Software Vulnerability CVE-2024-36819","year":"2024"},{"key":"ref198","volume-title":"Software Vulnerability CVE-2013-6426","year":"2024"},{"key":"ref199","volume-title":"Software Vulnerability CVE-2024-4146","year":"2024"},{"key":"ref200","volume-title":"Software Vulnerability CVE-2021-25742","year":"2024"},{"key":"ref201","volume-title":"Software Vulnerability CVE-2022-20308","year":"2024"},{"key":"ref202","volume-title":"Software Vulnerability CVE-2020-16898","year":"2024"},{"key":"ref203","volume-title":"Software Vulnerability CVE-2023-33372","year":"2024"},{"key":"ref204","volume-title":"Software Vulnerability CVE-2007-1741","year":"2024"},{"key":"ref205","volume-title":"Software Vulnerability CVE-2023-38295","year":"2024"},{"key":"ref206","volume-title":"Software Vulnerability CVE-2024-3234","year":"2024"},{"key":"ref207","volume-title":"Software Vulnerability CVE-2019-15591","year":"2024"},{"key":"ref208","volume-title":"Software Vulnerability CVE-2013-6623","year":"2024"},{"key":"ref209","volume-title":"Software Vulnerability CVE-2021-47542","year":"2024"},{"key":"ref210","volume-title":"Software Vulnerability CVE-2017-5638","year":"2024"},{"key":"ref211","volume-title":"Software Vulnerability CVE-2020-5902","year":"2024"},{"key":"ref212","volume-title":"Software Vulnerability CVE-2017-0144","year":"2024"},{"key":"ref213","volume-title":"Software Vulnerability CVE-2018-5547","year":"2024"},{"key":"ref214","volume-title":"Software Vulnerability CVE-2015-4475","year":"2024"},{"key":"ref215","volume-title":"Software Vulnerability CVE-2020-8559","year":"2024"},{"key":"ref216","volume-title":"Software Vulnerability CVE-2024-41656","year":"2024"},{"key":"ref217","volume-title":"Software Vulnerability CVE-2024-23332","year":"2024"},{"key":"ref218","volume-title":"Software Vulnerability CVE-2024-21815","year":"2024"},{"key":"ref219","volume-title":"Software Vulnerability CVE-2024-3454","year":"2024"},{"key":"ref220","volume-title":"Software Vulnerability CVE-2023-7224","year":"2024"},{"key":"ref221","volume-title":"Software Vulnerability CVE-2024-41944","year":"2024"},{"key":"ref222","volume-title":"Software Vulnerability CVE-2024-37165","year":"2024"},{"key":"ref223","volume-title":"Software Vulnerability CVE-2024-6152","year":"2024"},{"key":"ref224","volume-title":"Software Vulnerability CVE-2024-21312","year":"2024"},{"key":"ref225","volume-title":"Software Vulnerability CVE-2023-31997","year":"2024"},{"key":"ref226","volume-title":"Software Vulnerability CVE-2019-9946","year":"2024"},{"key":"ref227","volume-title":"Software Vulnerability CVE-2024-30247","year":"2024"},{"key":"ref228","volume-title":"Software Vulnerability CVE-2022-4390","year":"2024"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE52839.2021.00020"},{"key":"ref230","volume-title":"Software Vulnerability CVE-2022-28145","year":"2024"},{"key":"ref231","volume-title":"Software Vulnerability CVE-2022-22984","year":"2024"},{"key":"ref232","volume-title":"Software Vulnerability CVE-2019-16574","year":"2024"},{"key":"ref233","volume-title":"Software Vulnerability CVE-2020-5252","year":"2024"},{"key":"ref234","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-3600645\/v1","article-title":"Security vulnerabilities in infrastructure as code: What, how many, and who?","author":"War","year":"2023"},{"key":"ref235","volume-title":"Software Vulnerability CVE-2024-38346","year":"2024"},{"key":"ref236","volume-title":"Software Vulnerability CVE-2022-23635","year":"2024"},{"key":"ref237","volume-title":"Software Vulnerability CVE-2024-33891","year":"2024"},{"key":"ref238","volume-title":"Software Vulnerability CVE-2024-41110","year":"2024"},{"key":"ref239","volume-title":"Software Vulnerability CVE-2024-41129","year":"2024"},{"key":"ref240","volume-title":"Software Vulnerability CVE-2023-30617","year":"2024"},{"key":"ref241","volume-title":"Software Vulnerability CVE-2024-41122","year":"2024"},{"key":"ref242","volume-title":"Software Vulnerability CVE-2018-3831","year":"2024"},{"key":"ref243","volume-title":"Software Vulnerability CVE-2021-26084","year":"2024"},{"key":"ref244","volume-title":"Software Vulnerability CVE-2024-5687","year":"2024"},{"key":"ref245","volume-title":"Software Vulnerability CVE-2021-40539","year":"2024"},{"key":"ref246","volume-title":"Software Vulnerability CVE-2024-3234","year":"2024"},{"key":"ref247","volume-title":"Software Vulnerability CVE-2021-34523","year":"2024"},{"key":"ref248","volume-title":"Software Vulnerability CVE-2003-0550","year":"2024"},{"key":"ref249","volume-title":"Software Vulnerability CVE-2018-13379","year":"2024"},{"key":"ref250","article-title":"DevSecOps: Building security into the core of DevOps","author":"Koskinen","year":"2019"},{"key":"ref251","volume-title":"Microservice","author":"Wolff","year":"2023"},{"key":"ref252","volume-title":"E-Commerce-Microservices-Sample","author":"Ravuri","year":"2023"},{"key":"ref253","volume-title":"Spring-Microservices","year":"2023"},{"key":"ref254","volume-title":"App","year":"2023"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10720020.pdf?arnumber=10720020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:59:07Z","timestamp":1732669147000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10720020\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":254,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3481374","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}