Showing 3 open source projects for "malware detection in cloud in java"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    Apache SkyWalking

    Apache SkyWalking

    Application Performance Monitoring System

    Apache SkyWalking is an open source application performance monitoring system designed specifically for microservices, as well as cloud-native and container-based(Docker, Mesos, Kubernetes) architectures. It is capable of monitoring, tracing and diagnosing distributed systems in cloud native architectures. Apache Skywalking supports the collection of telemetry data from a number of different sources and in different formats, such as Java, .NET Core, PHP, LUA agent and more. It also...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    Discovery

    Discovery

    Nepxion Discovery is a solution for Spring Cloud

    Nepxion Discovery is a solution for Spring Cloud with blue green, gray, route, blacklist, limitation, circuit breaker, degrade, isolation, monitor, tracing, dye, failover, async agent. Only one or more services are upgraded at a time, the upgrade is completed and monitored and observed, and this process is performed continuously until all the old versions in the cluster are upgraded to the new version. In the process of stopping the old version, it is impossible to accurately calculate...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    An open-source configurable virtual testbed (based on the Eucalyptus cloud platform) for Intrusion Detection System Evaluation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next