{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T21:26:39Z","timestamp":1772745999981,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T00:00:00Z","timestamp":1744243200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T00:00:00Z","timestamp":1744243200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,10]]},"DOI":"10.1109\/niss66502.2025.00012","type":"proceedings-article","created":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T20:48:36Z","timestamp":1772657316000},"page":"16-23","source":"Crossref","is-referenced-by-count":0,"title":["Comparative Analysis of GPT-2 and Gemini for Automated Generation of Dockerfiles and Docker Compose in DevOps Workflows"],"prefix":"10.1109","author":[{"given":"Laila","family":"Hamza","sequence":"first","affiliation":[{"name":"National School of Applied Sciences, Choua&#x00EF;b Doukkali University,LTI Laboratory,El Jadida,Morocco"}]},{"given":"Mohamed","family":"Lachgar","sequence":"additional","affiliation":[{"name":"Cadi Ayyad University,L2IS Laboratory, Faculty of Science and Technology, Higher Normal School,Department of Computer Science,Marrakesh,Morocco"}]},{"given":"Rahhal","family":"Errattahi","sequence":"additional","affiliation":[{"name":"National School of Applied Sciences, Choua&#x00EF;b Doukkali University,LTI Laboratory,El Jadida,Morocco"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Dockerfile reference","volume-title":"Docker Documentation"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/icssp59042.2023.00011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1008316"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref5","first-page":"1877","article-title":"Language Models are Few-Shot Learners","volume-title":"Proc. 34th Adv. Neural Information Processing Systems (NeurIPS)","author":"Brown","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icecet55527.2022.9872968"},{"key":"ref7","article-title":"Introducing Gemini: The Next Generation of AI Language Models","author":"Dean","year":"2023","journal-title":"Google AI Blog"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/icdt61202.2024.10489475"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3262138"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3137671"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC51774.2021.00133"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00060"},{"issue":"4","key":"ref13","article-title":"Development of Code Completion System for Dockerfiles","volume":"38","author":"Hanayama","year":"2021","journal-title":"Computer Software"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00047"},{"key":"ref15","article-title":"Codex: Technical Capabilities Overview","year":"2021","journal-title":"OpenAI Whitepaper"},{"key":"ref16","volume-title":"GitHub Copilot: Your AI pair programmer"},{"key":"ref17","article-title":"Binnacle: A Dockerfile Analysis Dataset for Fixing Bugs in Software Configurations","volume-title":"Proc. ACM SIGSOFT Int. Symp. Found. Softw. Eng. (FSE)","author":"Pang","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3115\/1073083.1073135"},{"key":"ref19","article-title":"ROUGE: A package for automatic evaluation of summaries","author":"Lin","year":"2004","journal-title":"Text Summarization Branches Out"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"}],"event":{"name":"2025 8th International Conference on Networking, Intelligent Systems &amp; Security (NISS)","location":"Tangier\/Chefchaouen, Morocco","start":{"date-parts":[[2025,4,10]]},"end":{"date-parts":[[2025,4,11]]}},"container-title":["2025 8th International Conference on Networking, Intelligent Systems &amp;amp; Security (NISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11415439\/11415430\/11415499.pdf?arnumber=11415499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T20:42:12Z","timestamp":1772743332000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11415499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/niss66502.2025.00012","relation":{},"subject":[],"published":{"date-parts":[[2025,4,10]]}}}