Malicious investigation of Docker images on basis of vulnerability databases.
Ryota YoshizakiAtsushi KanaiPublished in: GCCE (2022)
Keyphrases
- databases
- image data
- image database
- image retrieval
- input image
- image analysis
- image classification
- rigid body
- multiple images
- three dimensional
- object recognition
- database
- image collections
- image features
- image registration
- multiscale
- pixel values
- image set
- test images
- image matching
- segmentation algorithm
- keypoints
- feature points
- lighting conditions
- metadata
- image processing
- illumination conditions
- relational databases
- database systems
- similarity measure