Mussiraliyeva S 1

1. Encryption and Re-Randomization Techniques for Malware Propagation
2. Context-Based Adaptive Fog Computing Trust Solution for Time-Critical Smart Healthcare Systems
3. Reliability through an optimal SDS controller’s placement in a SDDC and smart city
4. A FRAMEWORK FOR DETECTING AND MITIGATING OF CYBER CRIMINAL ACTIVITIES USING UNIVERSITY NETWORKS IN KAZAKHSTAN
5. Detection of extremist messages in web resources in the Kazakh language
6. Detection of offensive content in the Kazakh language using machine learning and deep learning approaches
7. A survey on common criteria (CC) evaluating schemes for security assessment of IT products
8. Exploring Security Dynamics in SDN Controller Architectures: Threat Landscape and Implications
9. Empowering privacy and resilience: a decentralized federated learning approach to cyberbullying detection
10. PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems
11. Applying machine learning techniques for religious extremism detection on online user contents
12. Extremist Ideology Classification in Kazakh: A Multi-Class Approach Using Machine Learning and Psycholinguistic Analysis
13. Identifying Influential Nodes in the Spread of Criminal Information in Social Networks
14. Leveraging Machine Learning Methods for Crime Analysis in Textual Data
15. Social Media Mining to Detect Online Violent Extremism using Machine Learning Techniques
16. A framework to predict early news popularity using deep temporal propagation patterns
17. Deepvoc: a linked open vocabulary for reproducible and reliable deep learning experiments
18. ENHANCED IDENTIFICATION OF ILLICIT BITCOIN TRANSACTIONS THROUGH GENETIC ALGORITHM-BASED FEATURE SELECTION
19. Lightweight secure authentication protocol for automatic dependent surveillance broadcast system
20. Apprehending the Effect of Internet of Things (IoT) Enables Big Data Processing through Multinetwork in Supporting High-Quality Food Products to Reduce Breast Cancer
21. Cyberbullying-related Hate Speech Detection Using Shallow-to-deep Learning
22. Method for Constructing Neural Network Means for Recognizing Scenes of Political Extremism in Graphic Materials of Online Social Networks
1