Department Of Information Security 2
51. Interpretable Predictive Modeling for Educational Equity: A Workload-Aware Decision Support System for Early Identification of At-Risk Students
52. Security Audit of IoT Device Networks: A Reproducible Machine Learning Framework for Threat Detection and Performance Benchmarking
53. Remote Sensing Technique to Recognise Physical Characteristics of Water Bodies of the Republic of Kazakhstan
54. Enhancing Visual Data Security: A Novel FSM-Based Image Encryption and Decryption Methodology
55. Computational Assessment of Information System Reliability Using Hybrid MCDM Models
56. Integrating multi-criteria decision making and reinforcement learning for consensus protocol selection
57. Interference immunity and energy efficiency of digital communications systems in multipath channel with fading
58. Fault-tolerant backup storage system for confidential data in distributed servers
59. THE DEVELOPMENT OF AN EVALUATION MODEL FOR USER AUTHENTICATION METHODS WITH SECURITY, USABILITY, AND USAGE FREQUENCY
60. Authentication and key distribution protocol based on Diffie-Hellman algorithm and physically unclonable functions
61. On some methods of storing data in the cloud for a given time
62. Continuous Authentication in Resource-Constrained Devices via Biometric and Environmental Fusion
63. Design and Performance of the New Ankle Joint Exoskeleton
64. Human-machine interactions based on hand gesture recognition using deep learning methods
1 2 2