Academic literature on the topic 'CI/CD Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CI/CD Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "CI/CD Security"
Malipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01319.
Full textResearcher. "SECURING CI/CD PIPELINES: STRATEGIES FOR MITIGATING RISKS IN MODERN SOFTWARE DELIVERY." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 1–9. https://doi.org/10.5281/zenodo.13365012.
Full textRavi, Chandra Thota. "Cloud-Native DevSecOps: Integrating Security Automation into CI/CD Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–19. https://doi.org/10.5281/zenodo.15036934.
Full textHo-Dac, Hung, and Van-Len Vo. "An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools." European Modern Studies Journal 8, no. 3 (2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.
Full textSumanth Kadulla. "Zero trust in cloud infrastructure: Implementing secure CI/CD Pipelines." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 450–57. https://doi.org/10.30574/wjarr.2025.26.2.1662.
Full textKamalakar, Reddy Ponaka. "Secure Secret Management in DevOps CI/CD Pipelines." European Journal of Advances in Engineering and Technology 7, no. 2 (2020): 73–76. https://doi.org/10.5281/zenodo.13919341.
Full textPonaka, Kamalakar Reddy. "Systematic Approach to Prevent Code Vulnerabilities using CI/CD Pipelines." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem7171.
Full textSarathe Krisshnan Jutoo Vijayaraghavan. "Security as code: Transforming DevSecOps through CI/CD Integration." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 2219–25. https://doi.org/10.30574/wjaets.2025.15.1.0446.
Full textBaladari, Venkata. "End-to-End CI/CD Deployment of RESTful Microservices in the Cloud." International Journal of Core Engineering and Management 6, no. 8 (2020): 262–68. https://doi.org/10.5281/zenodo.15020514.
Full textAkilnath, Bodipudi. "Integrating Vulnerability Scanning with Continuous Integration/Continuous Deployment (CI/CD) Pipelines." European Journal of Advances in Engineering and Technology 9, no. 2 (2022): 49–55. https://doi.org/10.5281/zenodo.13622978.
Full textDissertations / Theses on the topic "CI/CD Security"
Persson, Simone. "List of Security Concerns within Continuous Software Evolution." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254881.
Full textMoriconi, Florent. "Amélioration du cycle de développement logiciel via des approches basées sur les données." Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS164.
Full textBrás, André Emanuel Raínho. "Container security in CI/CD pipelines." Master's thesis, 2021. http://hdl.handle.net/10773/31292.
Full textZhygulskyy, Mykyta. "AUTOMATED, SCHEDULED AND CI /CD WEB INJECTION." Master's thesis, 2021. http://hdl.handle.net/10400.8/5786.
Full textBooks on the topic "CI/CD Security"
Cherukuri, Sai Sravan. Securing the CI/CD Pipeline: Best Practices for DevSecOps. Bellevue Publishers, 2024.
Find full textBook chapters on the topic "CI/CD Security"
Dingare, Pranoday Pramod. "Managing Security with Jenkins." In CI/CD Pipeline Using Jenkins Unleashed. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7508-5_7.
Full textDakic, Vedran, Jasmin Redzepagic, and Matej Basic. "CI/CD Toolset Security." In DAAAM Proceedings. DAAAM International Vienna, 2022. http://dx.doi.org/10.2507/33rd.daaam.proceedings.022.
Full textBobbert, Yuri, and Maria Chtepen. "Problems of CI/CD and DevOps on Security Compliance." In Strategic Approaches to Digital Platform Security Assurance. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7367-9.ch007.
Full textNanda, Ashok Kumar, Abhishek Sharma, P. John Augustine, B. Rex Cyril, Venneti Kiran, and Boopathi Sampath. "Securing Cloud Infrastructure in IaaS and PaaS Environments." In Improving Security, Privacy, and Trust in Cloud Computing. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1431-9.ch001.
Full textBobbert, Yuri, and Maria Chtepen. "Research Findings in the Domain of CI/CD and DevOps on Security Compliance." In Strategic Approaches to Digital Platform Security Assurance. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7367-9.ch008.
Full textNagmoti, Nikhil Subodh, Ishita Srivastava, and Madhavi Damle. "AI-Driven Enhancements in Cloud-Native DevOps Boosting Automation, Deployment, and Monitoring." In Advances in Computational Intelligence and Robotics. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-9356-7.ch008.
Full textPandey, Pravin, and Advait Patel. "Integrating Security in Cloud-Native Development." In Data Governance, DevSecOps, and Advancements in Modern Software. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-0365-9.ch009.
Full textBobbert, Yuri, and Maria Chtepen. "Findings and Core Practices in the Domain of CI/CD and DevOps on Security Compliance." In Strategic Approaches to Digital Platform Security Assurance. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7367-9.ch009.
Full textRatnam, Karthik. "The Role of Artificial Intelligence in Bridging DevOps and SecOps for Cloud Infrastructure." In Data Governance, DevSecOps, and Advancements in Modern Software. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-0365-9.ch012.
Full textEigenbrode, Shelbee, and Suheil Nassar. "Design and Implementation of Service Management in DevOps Enabled Cloud Computing Models." In Handbook of Research on End-to-End Cloud Computing Architecture Design. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0759-8.ch014.
Full textConference papers on the topic "CI/CD Security"
Afifah, Angelita Salsabila, Herman Kabetta, I. Komang Setia Buana, and Hermawan Setiawan. "Code Obfuscation in CI/CD Pipelines for Enhanced DevOps Security." In 2024 International Conference on Artificial Intelligence, Blockchain, Cloud Computing, and Data Analytics (ICoABCD). IEEE, 2024. http://dx.doi.org/10.1109/icoabcd63526.2024.10704536.
Full textSaleh, Sabbir, Nazim Madhavji, and John Steinbacher. "Towards a Blockchain-Based CI/CD Framework to Enhance Security in Cloud Environments." In 20th International Conference on Evaluation of Novel Approaches to Software Engineering. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013298200003928.
Full textMeliala, Rehmia, Charles Lim, and Joseph Andreas. "Integrating Security Testing in CI/CD Pipelines: Current Trends from Literature and Market." In 2024 Ninth International Conference on Informatics and Computing (ICIC). IEEE, 2024. https://doi.org/10.1109/icic64337.2024.10957011.
Full textCheenepalli, Jayaprakashreddy, John D. Hastings, Khandaker Mamun Ahmed, and Chad Fenner. "Advancing DevSecOps in SMEs: Challenges and Best Practices for Secure CI/CD Pipelines." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11011960.
Full textThompson, Mark, and Michael Alex Kyer. "Securing the Containerized Environment Along the CI/CD Pipeline." In 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2025. https://doi.org/10.1109/ccwc62904.2025.10903704.
Full textSaleh, Sabbir M., Nazim Madhavji, and John Steinbacher. "Blockchain for Securing CI/CD Pipeline: A Review on Tools, Frameworks, and Challenges." In 2024 7th Conference on Cloud and Internet of Things (CIoT). IEEE, 2024. http://dx.doi.org/10.1109/ciot63799.2024.10757084.
Full textFreitas, Matheus B., and Lincoln S. Rocha. "GASH – The GitHub Actions Smell Hunter." In Workshop de Visualização, Evolução e Manutenção de Software. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/vem.2024.3911.
Full textShevchuk, Ruslan, Mikolaj Karpinski, Mykhailo Kasianchuk, Ihor Yakymenko, Andriy Melnyk, and Roman Tykhyi. "Software for Improve the Security of Kubernetes-based CI/CD Pipeline." In 2023 13th International Conference on Advanced Computer Information Technologies (ACIT). IEEE, 2023. http://dx.doi.org/10.1109/acit58437.2023.10275654.
Full textMarandi, Manohar, A. Bertia, and Salaja Silas. "Implementing and Automating Security Scanning to a DevSecOps CI/CD Pipeline." In 2023 World Conference on Communication & Computing (WCONF). IEEE, 2023. http://dx.doi.org/10.1109/wconf58270.2023.10235015.
Full textRangnau, Thorsten, Remco v. Buijtenen, Frank Fransen, and Fatih Turkmen. "Continuous Security Testing: A Case Study on Integrating Dynamic Security Testing Tools in CI/CD Pipelines." In 2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC). IEEE, 2020. http://dx.doi.org/10.1109/edoc49727.2020.00026.
Full textReports on the topic "CI/CD Security"
D'Onofrio, Dominic. CI/CD Pipeline and DevSecOps Integration for Security and Load Testing. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/2430395.
Full textChandramouli, Ramaswamy. Strategies for Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.
Full textHendrick, Stephen, and Martin Mckeay. Addressing Cybersecurity Challenges in Open Source Software. The Linux Foundation, 2022. https://doi.org/10.70828/jxey9389.
Full text