Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Tanzim Khorshed"'
Autor:
Neeraj A. Sharma, Kunal Kumar, Tanzim Khorshed, A B M Shawkat Ali, Haris M. Khalid, S. M. Muyeen, Linju Jose
Publikováno v:
Information, Vol 15, Iss 9, p 558 (2024)
The growing industry and its complex and large information sets require Big Data (BD) technology and its open-source frameworks (Apache Hadoop) to (1) collect, (2) analyze, and (3) process the information. This information usually ranges in size from
Externí odkaz:
https://doaj.org/article/e3c3b6fb32c941fb859cfa93fcacd8e6
Publikováno v:
Security and Communication Networks. 5:1235-1247
From traditional networking to cloud computing, one of the essential but formidable tasks is to detect cyber attacks and their types. A cloud provider's unwillingness to share security-related data with its clients adds to the difficulty of detection
Publikováno v:
Future Generation Computer Systems. 28:833-851
The long-term potential benefits through reduction of cost of services and improvement of business outcomes make Cloud Computing an attractive proposition these days. To make it more marketable in the wider IT user community one needs to address a va
Autor:
Ramendra Prasad, Aman Deo, M. V. D. Prasad, Neeraj Sharma, Kunal Kumar, Aaron Vinek Dutt, A. B. M. Shawkat Ali, Tanzim Khorshed
Publikováno v:
2015 2nd Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE).
This research focuses on surveying in an attractive field of quantum computing. The paper begins by highlighting a brief history of quantum mechanics. Major elements of quantum computing such as quantum superposition, quantum tunnelling and qubits ar
Publikováno v:
2015 2nd Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE).
Big Data technologies are exciting cutting-edge technologies that generate, collect, store and analyse tremendous amount of data. Like any other IT revolution, Big Data technologies also have big challenges that are obstructing it to be adopted by wi
Autor:
Kunal Kumar, A. B. M. Shawkat Ali, M. V. D. Prasad, Tanzim Khorshed, Yang Xiang, Neeraj Sharma
Publikováno v:
2015 2nd Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE).
This paper is written through the vision on integrating Internet-of-Things (IoT) with the power of Cloud Computing and the intelligence of Big Data analytics. But integration of all these three cutting edge technologies is complex to understand. In t
Publikováno v:
Security, Privacy and Trust in Cloud Systems ISBN: 9783642385858
One of the crucial but complicated tasks is to detect cyber attacks and their types in any IT networking environment including recent uptake of cloud services.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::be43002c74a0824a48a62782d657e47e
https://doi.org/10.1007/978-3-642-38586-5_14
https://doi.org/10.1007/978-3-642-38586-5_14
Publikováno v:
Smart Grids ISBN: 9781447152095
The demand of electricity is increasing in parallel with the growth of the world population. The existing power grid, which is over 100 years old, is facing many challenges to facilitate the continuous flow of electricity from large power plants to t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7e94c4b077fd805690fddb92fc80b0ad
https://doi.org/10.1007/978-1-4471-5210-1_8
https://doi.org/10.1007/978-1-4471-5210-1_8
Publikováno v:
ICPADS
The research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is slowing down cloud adoption as well as reviewing the threat remediation challenges. Next, some thou
Publikováno v:
TrustCom
One of the essential but formidable tasks in cloud computing is to detect malicious attacks and their types. A cloud provider's constraints or inability in monitoring its employees, and lack of transparency, may make the detection process even harder