Please use this identifier to cite or link to this item:
http://hdl.handle.net/123456789/1629
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Aws Naser Jaber | en_US |
dc.contributor.author | Shahid Anwar | en_US |
dc.contributor.author | NZ Khidzir | en_US |
dc.contributor.author | Mohammed Anbar | en_US |
dc.date.accessioned | 2021-05-06T02:49:50Z | - |
dc.date.available | 2021-05-06T02:49:50Z | - |
dc.date.issued | 2021 | - |
dc.identifier.isbn | 9789813368354 | - |
dc.identifier.issn | 18650929 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/1629 | - |
dc.description | Scopus | en_US |
dc.description.abstract | Today, rather than utilizing high-powered workstation/desktop to access Internet services, users can use small portable devices for this purpose. As such, the computing power is provided via the innovative cloud computing technology, in which computations are performed in remote huge data centers. Applications are conveyed as services on the web in the field of cloud computing. Despite most organizations show significant interest in cloud computing, many clients are not willing to move their vital information to the clouds due to security concern (hacking). Data storage security is one of the greatest challenges in implementing cloud computing. If this issue is not addressed properly, it would hinder the growth of cloud computing. This research study provides a detailed analysis on intrusion identification mechanism in the cloud computing and datasets on the bases of our in-depth understanding. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer Singapore | en_US |
dc.relation.ispartof | Advances in Cyber Security | en_US |
dc.subject | Intrusion identification | en_US |
dc.subject | Cloud computing | en_US |
dc.subject | Cyber security | en_US |
dc.title | A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets | en_US |
dc.type | National | en_US |
dc.relation.conference | 2nd International Conference On Advances In Cyber Security | en_US |
dc.identifier.doi | 10.1007/978-981-33-6835-4_37 | - |
dc.description.page | 550-573 | en_US |
dc.description.researcharea | Cybersecurity | en_US |
dc.volume | 1347 | en_US |
dc.title.titleofbook | Advances in Cyber Security | en_US |
dc.date.seminarstartdate | 2020-12-08 | - |
dc.date.seminarenddate | 2020-12-09 | - |
dc.description.placeofseminar | Penang | en_US |
dc.description.seminarorganizer | Universiti Sains Malaysia | en_US |
dc.description.type | Indexed Proceedings | en_US |
dc.description.quartile | Q3 | en_US |
item.languageiso639-1 | en | - |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.openairetype | National | - |
crisitem.author.dept | Universiti Malaysia Kelantan | - |
Appears in Collections: | Faculty of Creative Technology & Heritage - Journal (Scopus/WOS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
NikZulkarnaen-Jaber2021_ADetailedAnalysisOnIntrusionId.pdf | 5.82 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.