Department Of Cybersecurity 1

1. Improving the Efficiency of Fixed-Wing Unmanned Aerial Vehicle Through the Enhancement of Aerodynamic and Mechanical Structures
2. Implementation of Lattice Theory into the TLS to Ensure Secure Traffic Transmission in IP Networks Based on IP PBX Asterisk
3. Implementation of Lattice Theory into the TLS to Ensure Secure Traffic Transmission in IP Networks Based on IP PBX Asterisk
4. A COMPARISON OF KAZAKH LANGUAGE PROCESSING MODELS FOR IMPROVING SEMANTIC SEARCH RESULTS
5. Estimation of the required number of nodes of a university cloud virtualization cluster
6. The game model of investing in the academic cloud
7. Using the Object Perimeters in MGA Algorithms for the Best Choice of Cybernetic Security Means
8. A New Fuzzy MCDM Model to Select Wireless Network Types in Healthcare Facilities
9. Detection of Unauthorized Unmanned Aerial Vehicles Using YOLOv5 and Transfer Learning
10. A Quantum-Enhanced Biometric Fusion Network for Cybersecurity Using Face and Voice Recognition
11. ESOA-HGRU: egret swarm optimization algorithm-based hybrid gated recurrent unit for classification of diabetic retinopathy
12. Designing an Intelligent Scoring System for Crediting Manufacturers and Importers of Goods in Industry 4.0
13. File Encryption by Iris Recognition System
14. Global Practical Output Tracking for a Class of Uncertain Inherently Time-Varying Delay Nonlinear Systems by Output Feedback
15. Innovative Compositions of Shotcrete Mixtures for Reinforcement of Underground Mine Excavations
16. An efficient data-balancing cyber-physical system paradigm for quality-of-service (QoS) provision over fog computing
17. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles
18. Quality of service management in telecommunication network using machine learning technique
19. Optimizing drone-assisted victim localization and identification in mass-disaster management: a study on feasible flying patterns and technical specifications
20. Automated OSINT Techniques for Digital Asset Discovery and Cyber Risk Assessment
21. Automated OSINT Techniques for Digital Asset Discovery and Cyber Risk Assessment
22. Hybrid GNN–LSTM Architecture for Probabilistic IoT Botnet Detection with Calibrated Risk Assessment
23. Risk Assessment of Cryptojacking Attacks on Endpoint Systems: Threats to Sustainable Digital Agriculture
24. Delay-Driven Information Diffusion in Telegram: Modeling, Empirical Analysis, and the Limits of Competition
25. Information Diffusion Modeling in Social Networks: A Comparative Analysis of Delay Mechanisms Using Population Dynamics
26. Development of a Hybrid Quantum Key Distribution Concept for Multi-User Networks
27. ADVANCING REAL-TIME ECHOCARDIOGRAPHIC DIAGNOSIS WITH A HYBRID DEEP LEARNING MODEL
28. DESIGN AND IMPLEMENTATION OF DISK-BASED GRAPH FEATURE PREPROCESSOR FOR TERRORIST FINANCING DETECTION
29. A Model for Financing the Process of Education Informatization, Taking into Account Computer Security within the Framework of a Differential Quality Game
30. A Data-Science Approach for Creation of a Comprehensive Model to Assess the Impact of Mobile Technologies on Humans
31. Optimal Placement Algorithms for Base and Central Stations in Mining Quarries †
32. Research of the V2X Technology Organization Model for Self-Managed Technical Equipment
33. EARAS: An Efficient, Anonymous, and Robust Authentication Scheme for Smart Homes
34. Enhancing COVID-19 misinformation detection through novel attention mechanisms in NLP
35. Post-quantum Digital Signatures using ElGamal Approach
36. Neural network methods for the detection of farm animals in dense dynamic groups on images
37. Development of High-Quality Cryptographic Constructions Based on Many-Valued Logic Affine Transformations
38. Development of High-Quality Cryptographic Constructions Based on Many-Valued Logic Affine Transformations
39. Correction of Kazakh synthetic text using finite state automata
40. Design of a Fiber Temperature and Strain Sensor Model Using a Fiber Bragg Grating to Monitor Road Surface Conditions
41. A Lightweight Variant of Falcon for Efficient Post-Quantum Digital Signature
42. Development of a Robust Neural Network- Based VAD System under Low Signal-to-Noise Ratio Conditions
43. A neuro-game model for analyzing strategies in the dynamic interaction of participants of phishing attacks
44. Development And Research Of The Influence Of The Composition And Concentration Of Activators On The Strength Of Phosphorus Slag Binders
45. DETECTION AND CLASSIFICATION OF THREATS AND VULNERABILITIES ON HACKER FORUMS BASED ON MACHINE LEARNING
46. IDENTIFYING THE INFLUENCE OF TRANSFER LEARNING METHOD IN DEVELOPING AN END-TOEND AUTOMATIC SPEECH RECOGNITION SYSTEM WITH A LOW DATA LEVEL
47. DEVELOPMENT OF A MODEL FOR DETERMINING THE NECESSARY FPGA COMPUTING RESOURCE FOR PLACING A MULTILAYER NEURAL NETWORK ON IT
48. DEVISING AN APPROACH TO CONDUCTING FULL-SCALE EXPERIMENTS IN PHYSICS THAT PROVIDES FOR THE IMPROVED EFFICIENCY WHEN MEASURING PHYSICAL QUANTITIES
49. EVALUATING THE EFFECTIVENESS OF A VOICE ACTIVITY DETECTOR BASED ON VARIOUS NEURAL NETWORKS
50. IDENTIFYING THE REGULARITIES OF THE SIGNAL DETECTION METHOD USING THE KALMAN FILTER
1 2