G.A. Madyarova, P.R. Sattar
FEATURES OF INFORMATION SECURITY TRAINING BASED ON THE USE OF DIGITAL TECHNOLOGIES
244-250
S.A. Аdiljanova , G.A. Тulepberdinova , M.J. SakypbekovaM, N.A. Тekesbayeva
ANALYSIS OF MATHEMATICAL METHODS OF MULTI-CRITERIA OPTIMIZATION AND DYNAMIC MANAGEMENT OF CYBERSECURITY RESOURCES OF INFORMATIZATION OBJECTS
162-167
A.Zh. Imanbayev, S. Tynymbayev, R.S. Odarchenko, Zh. Alikhankyzy
ANALYSIS OF THE SECURITY PROBLEMS OF FIFTH GENERATION MOBILE NETWORKS
21-28
E.T. Kalaman, Zh.K. Alimseitova, K.G. Sabrayev
INFORMATION SECURITY SYSTEM BASED ON MODELING OF VULNERABILITY INDICATORS OF THE UNIVERSITY COMPUTER NETWORK
188-200
А.А. Зиро, D Tursumbayev , Zh Zhaibergenova, Sh Toibayeva
CONDUCTING PENETRATION TESTING USING THE WHITE BOX METHOD
118-125
Y. Çelik, O. Fındık, Y. Alaca , B. Assanova, S. Sharmukhanbet
IMPLEMENTATION OF THE ARTIFICIAL IMMUNE SYSTEM ALGORITHM FOR SECURITY INFORMATION AND EVENT MANAGEMENT SYSTEMS
176-187
D. Zhaxsygulova, S.Zh. Rakhmetullina, S.O. Gnatyuk
STUDY OF A MODEL FOR CALCULATING A QUANTITATIVE CRITERION FOR ASSESSING THE STABILITY OF INFORMATION AND TELECOMMUNICATION SYSTEMS OF CRITICAL INFRASTRUCTURE FACILITIES
27-39
O.S. Akhmetova , S.A. Issayev
PROSPECTS AND POSSIBLE RISKS OF THE APPLICATION OF SMART CONTRACTS IN SCIENCE AND EDUCATION
168-173
S. Avdarsol, A.D. Ongarbayeva
FORMATION OF MEDIA DIGITAL LITERACY OF PRIMARY SCHOOL STUDENTS
179-188
F.R Gusmanova, G.A Abdulkarimova
OVERVIEW OF THE BLOCK ENCRYPTION DEVELOPMENT
295-301
A. Khompysh, N.A. Kapalova, D.S. Dyusenbayev, V.A. Varennikov
STUDY OF THE STATISTICAL SECURITY OF THE AL04 ENCRYPTION ALGORITHM
154-163
A. Aitim , G. Sembina
DEVELOPMENT OF SYSTEMS FOR EFFECTIVE ESTIMATION OF CREDIT SCORES
150-156
Zh. Seitbattalov, S.K. Atanov, A.E. Kyzyrkanov
AUTOMATED SYSTEM FOR MONITORING SENSOR VALUES BASED ON EDGE COMPUTING
238-244
A.R. Turganbayeva, А.Е. Шахан
EMERGING IN THE PROCESS OF DIGITALIZATION OF HIGHER EDUCATION
198-202
K. Abeshev, A. Kulzhanova, T. Bakibayev, M. Dolayev
ANALYSIS OF ANTIFRAUD METHODS AND CYBERSECURITY FOR ONLINE QUIZ APPLICATIONS
138-145
A. Karipzhanova , K. Kozhakhmet, R. Zhumalieva , A. Omirali, D. Bayazitov
IMPROVING THE SECURITY OF SPLIT DATA WHEN USING MULTIDIMENSIONAL REPORTING ALGORITHMS
145-157
D. Amirkhanova , О. Mamyrbayev
CRYPTOGRAPHIC ANALYSIS OF THE SCHEME OF POLYLINEAR CRYPTOGRAPHY
114-122
D. Zhaxsygulova, S. Rakhmetullina, S. Gnatyuk
RESEARCH OF MODELS OF WIRELESS SENSOR NETWORKS FOR AN IOS-BASED MONITORING SYSTEM
51-58
A.S. Amirova, A.T. Tohmetov
COMBINED MODEL OF THREAT DETECTION IN INDUSTRIAL INTERNET OF THINGS
70-77
S.T. Mambetov, Ye.Ye. Begimbayeva, А.K. Khikmetov, S.K. Joldasbayev, G.N. Kazbekova
SENTIMENT ANALYSIS OF HACKER INTERNET FORUMS
162-172
B.A Kumalakov, Y. Shakan Y.
BLOCKCHAIN IN EDUCATION: HOW TO MANAGE STUDENT CREDITS OF HIGHER EDUCATION THROUGH THE BLOCKCHAIN?
251-256
N.B. Daukenov, I.A. Tereikovskyi
INTEGRATION AND AUTOMATION IN ACTIVE PROTECTION OF NETWORK RESOURCES: PROSPECTS FOR DEVELOPMENT
178-187
Z.G. Ualiyev, Ye. Temirbekov, K. Bissembayev, D. Kerimkulov, M. Kanapiya
MODELLING OF TRANSFER MECHANISMS TAKING INTO CONSIDERATION KINEMATIC AND DYNAMIC CHARACTERISTICS
107-118
Zh.T Aituganova, B.A. Talpakova, B.K. Zhussipbek
EFFECTIVE WAYS TO INCREASE THE SECURITY OF STORING INFORMATION IN A DATABASE
199-206
N.Zh. Aitenov, B.O. Kulambayev, D.K. Zhekenov, D.I. Gubina
OPEN DATA AND ARTIFICIAL INTELLIGENCE: A COMPARATIVE ANALYSIS OF THE USA AND CHINA
132-145