4 СЕКЦИЯ. КРИПТОГРАФИЯДАҒЫ ЖАСАНДЫ ИНТЕЛЛЕК ЖӘНЕ КИБЕРҚАУІПСІЗДІК: Недавние поступления
Отображаемые элементы 21-27 из 27
-
CRITICALITY ASSESSMENT AND CLASSIFICATION OF CRITICAL INFORMATION INFRASTRUCTURE (CII): APPROACHES AND METHODOLOGIES
(L.N. Gumilyov Eurasian National University, 2025-04-16)2025-06-05 -
APPLICATION OF MACHINE LEARNING AND AUTOMATED PROCESSES IN DIGITAL FORENSICS
(L.N. Gumilyov Eurasian National University, 2025-04-16)Digital forensics plays a pivotal role in investigating incidents and crimes involving digital data, leveraging technological footprints left by users in cyberspace. With the exponential growth in data volumes, traditional forensic techniques often fall short, necessitating the integration of machine learning (ML) to enhance efficiency and accuracy. This paper explores the ...2025-06-05 -
SECURE DATA TRANSMISSION IN MODERN TELECOMMUNICATIONS: EMERGING ALGORITHMS, QUANTUM CHALLENGES, AND OPTIMIZATION TRENDS
(L.N. Gumilyov Eurasian National University, 2025-04-16)2025-06-05 -
ENHANCING DEVELOPER PRODUCTIVITY WITH INTEGRATED ARTIFICIAL INTELLIGENCE AND CYBERSECURITY CONSIDERATIONS
(L.N. Gumilyov Eurasian National University, 2025-04-16)The rapid advancement of artificial intelligence (AI) has introduced new tools to enhance developer productivity, particularly in cybersecurity. Cursor AI, an AI-powered coding assistant, is designed to streamline software development by providing real-time code suggestions, debugging support, and security enhancements. This review explores the impact of Cursor AI on ...2025-06-05 -
AI-ENHANCED CRYPTOGRAPHIC FRAMEWORK FOR HIGH-SPEED SECURE DATA TRANSMISSION IN LOW-ORBIT AIRCRAFT SYSTEMS
(L.N. Gumilyov Eurasian National University, 2025-04-16)The increasing use of low-orbit aircraft (LOA) for critical applications requires strong data security. This paper introduces an AI-enhanced cryptographic framework for high-speed data transmission in LOA systems. The framework uses AI anomaly detection, hybrid encryption, and blockchain for real-time security, adaptability, and data integrity. It addresses the limitations ...2025-06-05 -
ONTOLOGICAL MODELS OF THE KAZAKH LANGUAGE FOR SECONDARY EDUCATION
(L.N. Gumilyov Eurasian National University, 2025-04-16)2025-06-05 -
АНАЛИЗ ЭФФЕКТИВНОСТИ DDOS СЕТЕВОЙ АТАКИ НА IOT УСТРОЙСТВО
(Л.Н.Гумилев атындағы ЕҰУ, 2025-04-16)В этой статье обсуждается DDoS-атаки более детально. DDoS (Distributed Denial of Service) атаки представляют собой серьезную угрозу для онлайн-ресурсов, включая вебсайты, сервера и сети. Они могут быть проведены злоумышленниками с целью парализовать работу целевой системы, не позволяя пользователям получать доступ к сервисам.2025-06-05
