Department Of Information Security 1
1. Encryption and Re-Randomization Techniques for Malware Propagation
2. Application of Multicriteria Methods for Improvement of Information Security Metrics
3. Analysis of the emotional coloring of text using machine and deep learning methods
4. Specifics of Data Collection and Data Processing during Formation of RailVista Dataset for Machine Learning- and Deep Learning-Based Applications
5. A Systematic Literature Review of Current Trends in Electronic Voting System Protection Using Modern Cryptography
6. Visual Basic and MathCAD used for Visualization and modeling STEM education
7. Cybersecurity Risk Assessments within Critical Infrastructure Social Networks
8. A Survey of Cross-Layer Security for Resource-Constrained IoT Devices
9. Blockchain as a method of cryptographic protection of big data transmitted from aircraft
10. Optimizing the implementation of the Saber post-quantum cryptography scheme with a hybrid architecture
11. Delay-Driven Information Diffusion in Telegram: Modeling, Empirical Analysis, and the Limits of Competition
12. Information Diffusion Modeling in Social Networks: A Comparative Analysis of Delay Mechanisms Using Population Dynamics
13. Advanced Cybersecurity Framework for LEO Aerospace: Integrating Quantum Cryptography, Artificial Intelligence Anomaly Detection, and Blockchain Technology
14. Application of Quantum Key Distribution to Enhance Data Security in Agrotechnical Monitoring Systems Using UAVs
15. DEVELOPMENT OF IMAGE ENCRYPTION METHOD USING SURJECTIVE FINITE AUTOMATA AND CUSTOM S-BOX WITHIN THE ADVANCED ENCRYPTION STANDARD FRAMEWORK
16. Quadratic-phase wave packet transform
17. Air Pollution Forecasting in Almaty Based on Meteorological Data Using Machine Learning for Sustainable Environmental Management
18. A survey on common criteria (CC) evaluating schemes for security assessment of IT products
19. Deep neural networks for removing clouds and nebulae from satellite images
20. Forecasting stock market prices using deep learning methods
21. The impact of blockchain and artificial intelligence technologies in network security for e-voting
22. Development of High-Quality Cryptographic Constructions Based on Many-Valued Logic Affine Transformations
23. Application of deep learning methods for automated analysis of retinal structures in ophthalmology
24. Predicting player skills and optimizing tactical decisions in football data analysis using machine learning methods
25. Integration of Color QR-Code Technology in Biometric Data Encoding and Facial Identity Systems
26. Cyberbullying and cyber-mobbing in developing countries
27. Enhancing Transparency and Trust in Higher Education Institutions via Blockchain: A Conceptual Model Utilizing the Ethereum Consortium Approach
28. Large language models for pattern recognition in text data
29. Control of Telecommunication Network Parameters under Conditions of Uncertainty of the Impact of Destabilizing Factors
30. THE IMPACT OF QUANTUM COMPUTING (ALGORITHMS) ON CONTEMPORARY SECURITY SYSTEMS AND FUTURE
31. DeepStego: Privacy-Preserving Natural Language Steganography Using Large Language Models and Advanced Neural Architectures
32. EVALUATION OF THE CONTEMPORARY STATE OF SOCIAL NETWORK SECURITY ISSUES: PUBLICATION CONTENT ANALYSIS
33. PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems
34. Active online learning with remote sensing data in higher education
35. AI-Enhanced High-Speed Data Encryption System for Unmanned Aerial Vehicles in Fire Detection Applications
36. Enhancing cryptographic protection, authentication, and authorization in cellular networks: A comprehensive research study
37. Improved unmanned aerial vehicle control for efficient obstacle detection and data protection
38. Maximal regularity and two-sided estimates of the approximation numbers of the nonlinear Sturm–Liouville equation solutions with rapidly oscillating coefficients in L2(ℝ)
39. Detection of heart pathology using deep learning methods
40. Development of an Artificial Vision for a Parallel Manipulator Using Machine-to-Machine Technologies
41. Cloud Service for Protecting Computer Networks of Enterprises Using Intelligent Hardware and Software Devices, Based on Raspberry Pi Microcomputers
42. Research and Experimental Testing of a Remotely Controlled Ankle Rehabilitation Exoskeleton Prototype
43. Big data handling approach for unauthorized cloud computing access
44. Blockchain-Enabled Deep Recurrent Neural Network Model for Clickbait Detection
45. Blockchain-Enabled Deep Recurrent Neural Network Model for Clickbait Detection
46. Secure Chip-Off Method with Acoustic-based Fault Diagnostics for IoT and Smart Grid Data Recovery
47. Artificial Olfactory System for Distinguishing Oil-Contaminated Soils
48. IDENTIFYING THE EFFICIENCY OF APPLYING OF FINITE AUTOMATA IN ENCRYPTION AND DECRYPTION
49. Design, Simulation and Functional Testing of a Novel Ankle Exoskeleton with 3DOFs
50. Development of an Ankle Exoskeleton: Design, Modeling, and Testing
1 2