{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:23:42Z","timestamp":1773840222348,"version":"3.50.1"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/iwcmc61514.2024.10592468","type":"proceedings-article","created":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T17:18:34Z","timestamp":1721236714000},"page":"0718-0723","source":"Crossref","is-referenced-by-count":7,"title":["A Comparative Study on the Security of Kubernetes Deployments"],"prefix":"10.1109","author":[{"given":"Kacper","family":"Kamieniarz","sequence":"first","affiliation":[{"name":"Warsaw University of Technology Warsaw,Poland"}]},{"given":"Wojciech","family":"Mazurczyk","sequence":"additional","affiliation":[{"name":"Warsaw University of Technology Warsaw,Poland"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Google is a Leader in the 2023 Gartner Magic Quadrant for Container Management","author":"Chen Goldberg"},{"key":"ref2","article-title":"Tesla Falls to Crypto-Jackers","author":"Seals"},{"key":"ref3","article-title":"Threat Alert: Market-First Container Image Built to Attack Kubernetes Clusters","author":"Assaf Morag","year":"2024"},{"key":"ref4","article-title":"State of Kubernetes security report 2023","year":"2023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EnCyCriS52570.2021.00009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev45635.2020.00025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3579639"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103173"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSR59073.2023.00078"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICACEA.2015.7164727"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988337"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2015.7095802"}],"event":{"name":"2024 International Wireless Communications and Mobile Computing (IWCMC)","location":"Ayia Napa, Cyprus","start":{"date-parts":[[2024,5,27]]},"end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10592105\/10592309\/10592468.pdf?arnumber=10592468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T05:44:07Z","timestamp":1721367847000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10592468\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iwcmc61514.2024.10592468","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}