Match!
Tanzim Khorshed
Central Queensland University
8Publications
4H-index
70Citations
Publications 8
Newest
An extensive investigative survey on Cloud Computing with the main focus on gaps that is slowing down Cloud adoption as well as reviewing the threat remediation challenges. Some experimentally supported thoughts on novel approaches to address some of the widely discussed cyber-attack types using machine learning techniques. The thoughts have been constructed in such a way so that Cloud customers can detect the cyber-attacks in their VM without much help from Cloud service provider
#1Kunal KumarH-Index: 2
Last.A B M Shawkat AliH-Index: 4
view all 8 authors...
This research focuses on surveying in an attractive field of quantum computing. The paper begins by highlighting a brief history of quantum mechanics. Major elements of quantum computing such as quantum superposition, quantum tunnelling and qubits are addressed at next from a physics perspective. In addition, various methods and applications of quantum physics are also examined. This paper discusses the power and efficiencies that a quantum computer provides and the basis for these claims. Furth...
#1Tanzim Khorshed (Deakin University)H-Index: 4
Last.Yang Xiang (Deakin University)H-Index: 35
view all 6 authors...
This paper is written through the vision on integrating Internet-of-Things (IoT) with the power of Cloud Computing and the intelligence of Big Data analytics. But integration of all these three cutting edge technologies is complex to understand. In this research we first provide a security centric view of three layered approach for understanding the technology, gaps and security issues. Then with a series of lab experiments on different hardware, we have collected performance data from all these...
#1Tanzim KhorshedH-Index: 4
Last.Yang XiangH-Index: 35
view all 5 authors...
Big Data technologies are exciting cutting-edge technologies that generate, collect, store and analyse tremendous amount of data. Like any other IT revolution, Big Data technologies also have big challenges that are obstructing it to be adopted by wider community or perhaps impeding to extract value from Big Data with pace and accuracy it is promising. In this paper we first offer an alternative view of «Big Data Cloud» with the main aim to make this complex technology easy to understand for new...
#1Tanzim Khorshed (Central Queensland University)H-Index: 4
#2A B M Shawkat Ali (Central Queensland University)H-Index: 4
Last.Saleh A. Wasimi (Central Queensland University)H-Index: 8
view all 3 authors...
One of the crucial but complicated tasks is to detect cyber attacks and their types in any IT networking environment including recent uptake of cloud services.
#1Ali A.B.M. Shawkat (Central Queensland University)H-Index: 14
#2Salahuddin A. Azad (Central Queensland University)H-Index: 6
Last.Tanzim Khorshed (Central Queensland University)H-Index: 4
view all 3 authors...
The demand of electricity is increasing in parallel with the growth of the world population. The existing power grid, which is over 100 years old, is facing many challenges to facilitate the continuous flow of electricity from large power plants to the consumers. To overcome these challenges, the power industry has warmly accepted the new concept smart grid which has been initiated by the engineers. This movement will be more beneficial and sustainable to the extent if we can offer a secure smar...
#1Tanzim Khorshed (Central Queensland University)H-Index: 4
#2A B M Shawkat Ali (Central Queensland University)H-Index: 4
Last.Saleh A. Wasimi (Central Queensland University)H-Index: 8
view all 3 authors...
From traditional networking to cloud computing, one of the essential but formidable tasks is to detect cyber attacks and their types. A cloud provider's unwillingness to share security-related data with its clients adds to the difficulty of detection by a cloud customer. The research contributions in this paper are twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is hindering cloud adoption, accompanied by a review of the threat remediation...
Dec 1, 2011 in ICPADS (International Conference on Parallel and Distributed Systems)
#1Tanzim Khorshed (Central Queensland University)H-Index: 4
#2Ali A.B.M. Shawkat (Central Queensland University)H-Index: 14
Last.Saleh A. Wasimi (Central Queensland University)H-Index: 8
view all 3 authors...
The research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is slowing down cloud adoption as well as reviewing the threat remediation challenges. Next, some thoughts are constructed on novel approaches to address some of the widely discussed attack types using machine learning techniques. Such thoughts captured through a series of experiments are expected to give researchers, cloud providers and their custom...
#1Tanzim Khorshed (Central Queensland University)H-Index: 4
#2A B M Shawkat Ali (Central Queensland University)H-Index: 4
Last.Saleh A. Wasimi (Central Queensland University)H-Index: 8
view all 3 authors...
One of the essential but formidable tasks in cloud computing is to detect malicious attacks and their types. A cloud provider's constraints or inability in monitoring its employees, and lack of transparency, may make the detection process even harder. We found these insiders' activities form similar pattern in the monitoring systems as some other cyber attacks because these also uses huge computer resources. In this paper we first provide a brief overview on the importance of monitoring insiders...
1