[PDF][PDF] Technologies ensuring the sustainability of information security of the formation of the digital economy and their perspective development directions
AG Aliyev - International Journal of Information Engineering and …, 2022 - mecs-press.org
The article is devoted to the technologies to ensure the sustainability of information security
in the formation of the digital economy and their prospects. It has been shown that the digital …
in the formation of the digital economy and their prospects. It has been shown that the digital …
Comparison of hybrid intrusion detection system
AN Cahyo, AK Sari… - 2020 12th international …, 2020 - ieeexplore.ieee.org
IDS have an important role in dispelling and preventing an intrusion or abuse of access
rights. In its development, research on IDS is growing. IDS consist of several detection …
rights. In its development, research on IDS is growing. IDS consist of several detection …
Secure hash function constructing for future communication systems and networks
S Gnatyuk, V Kinzeryavyy, K Kyrychenko… - Advances in Artificial …, 2020 - Springer
The application of Web technologies and forms of electronic document circulation in the
process of information exchange between users though simplifies this process. However …
process of information exchange between users though simplifies this process. However …
Detection of distributed denial of service attacks using snort rules in cloud computing & remote control systems
Cloud computing has the capability of sharing and retrieving data, remote controlling from
different locations, that is why many companies and organizations implement their …
different locations, that is why many companies and organizations implement their …
Secure Healthcare Access Control System (SHACS) for Anomaly Detection and Enhanced Security in Cloud-Based Healthcare Applications
SKB Sangeetha, C Selvarathi, SK Mathivanan… - IEEE …, 2024 - ieeexplore.ieee.org
The growing reliance on distributed cloud technology in mobile healthcare applications has
introduced critical challenges in ensuring secure and efficient access to Electronic Health …
introduced critical challenges in ensuring secure and efficient access to Electronic Health …
A concept of the architecture and creation for siem system in critical infrastructure
R Berdibayev, S Gnatyuk, Y Yevchenko… - Systems, Decision and …, 2021 - Springer
Energy sector is important unit of critical infrastructure and the protection of its ICT
infrastructure is essential for states. Cloud and other advanced technologies are …
infrastructure is essential for states. Cloud and other advanced technologies are …
Method of searching birationally equivalent Edwards curves over binary fields
This paper is devoted to increasing of performance of digital signature algorithms based on
elliptic curves over binary fields. Group operations complexity on Edwards curves are less …
elliptic curves over binary fields. Group operations complexity on Edwards curves are less …
Optimization of convolutional neural network structure for biometric authentication by face geometry
The article presents development of the methodology of using a convolutional neural
network for biometric authentication based on the analysis of the user face geometry. The …
network for biometric authentication based on the analysis of the user face geometry. The …
[PDF][PDF] Energy consumption in mobile phones
As the mobile devices are widely used in this world. With the increasing number of users, the
numbers of customized applications are also introduced for these users according to their …
numbers of customized applications are also introduced for these users according to their …
[PDF][PDF] Studies on Cloud-based Cyber Incidents Detection and Identification in Critical Infrastructure.
S Gnatyuk, R Berdibayev, Z Avkurova, O Verkhovets… - CPITS I, 2021 - ceur-ws.org
Cloud and other advanced technologies are implementing in various ICT infrastructures. It
has led to increased attention to the problems of cyber threats, the growth of which is …
has led to increased attention to the problems of cyber threats, the growth of which is …