Malicious investigation of Docker images on basis of vulnerability databases | IEEE Conference Publication | IEEE Xplore