Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Shynar Mussiraliyeva"'
Publikováno v:
Радіоелектронні і комп'ютерні системи, Vol 2024, Iss 2, Pp 186-202 (2024)
Abstract. The increasing number of information security incidents in higher education underscores the urgent need for robust cybersecurity measures. This paper proposes a comprehensive framework designed to analyze the illegal use of internet resourc
Externí odkaz:
https://doaj.org/article/d48e189293a441bc919483046e8bcdd6
Autor:
Arusa Kanwal, Mohammad Nizamuddin, Waseem Iqbal, Waqas Aman, Yawar Abbas, Shynar Mussiraliyeva
Publikováno v:
IEEE Access, Vol 12, Pp 56517-56553 (2024)
Software Defined Networking (SDN) has emerged as a new paradigm for managing heterogeneous networks ranging from enterprises to home network via decoupling the control plane from the data plane. In the traditional networking landscape, these two plan
Externí odkaz:
https://doaj.org/article/f7106dd8d1bb41448e0a0e71dffd5055
Autor:
Ahsan Rasheed Abbasi, Mehreen Afzal, Waseem Iqbal, Shynar Mussiraliyeva, Fawad Khan, Awais Ur Rehman
Publikováno v:
IEEE Access, Vol 9, Pp 132522-132532 (2021)
Encryption, which is essential for the protection of sensitive information can also transform any malicious content to illegible form, which can then reside in any network, undetected. Encryption of malicious payload is used by malware authors to mas
Externí odkaz:
https://doaj.org/article/78ab9dc9744748bea97995a29dd71aa2
Autor:
Surendra Kumar Shukla, B. Muthu Kumar, Divyanshu Sinha, Varsha Nemade, Shynar Mussiraliyeva, R. Sugumar, Rituraj Jain
Publikováno v:
Journal of Food Quality, Vol 2022 (2022)
Medical science in recent times has witnessed the large implications of AI-based IoT approaches that made the clinical process easier than before. However, effective IoT technologies can connect as well as exchange necessary clinical data with other
Externí odkaz:
https://doaj.org/article/7ae6148583004d9f9a50c279a6697070
Autor:
Maheen Fatima, Haider Abbas, Tahreem Yaqoob, Narmeen Shafqat, Zarmeen Ahmad, Raja Zeeshan, Zia Muhammad, Tauseef Rana, Shynar Mussiraliyeva
Publikováno v:
PeerJ Computer Science, Vol 7, p e701 (2021)
Over the last few years, private and public organizations have suffered an increasing number of cyber-attacks owing to excessive exploitation of technological vulnerabilities. The major objective of these attacks is to gain illegal profits by extorti
Externí odkaz:
https://doaj.org/article/4ffe5981de3840b789149f7623c56354
Autor:
Daniyar Sultan, Aigerim Toktarova, Ainur Zhumadillayeva, Sapargali Aldeshov, Shynar Mussiraliyeva, Gulbakhram Beissenova, Abay Tursynbayev, Gulmira Baenova, Aigul Imanbayeva
Publikováno v:
Computers, Materials & Continua. 74:2115-2131
Publikováno v:
Computers, Materials & Continua. 70:915-934
Autor:
Fawad Khan, Ahsan Rasheed Abbasi, Shynar Mussiraliyeva, Mehreen Afzal, Waseem Iqbal, Awais Ur Rehman
Publikováno v:
IEEE Access, Vol 9, Pp 132522-132532 (2021)
Encryption, which is essential for the protection of sensitive information can also transform any malicious content to illegible form, which can then reside in any network, undetected. Encryption of malicious payload is used by malware authors to mas
Autor:
Ihor Tereikovskyi, Shynar Mussiraliyeva, Liudmyla Tereikovska, Denys Chernyshev, Adlet Nyussupov, Yerulan Abaiuly
Publikováno v:
2022 International Conference on Smart Information Systems and Technologies (SIST).
Publikováno v:
2022 9th International Conference on Electrical and Electronics Engineering (ICEEE).