A.Zh. Imanbayev, S. Tynymbayev, R.S. Odarchenko, Zh. Alikhankyzy
ANALYSIS OF THE SECURITY PROBLEMS OF FIFTH GENERATION MOBILE NETWORKS
21-28
E.T. Kalaman, Zh.K. Alimseitova, K.G. Sabrayev
INFORMATION SECURITY SYSTEM BASED ON MODELING OF VULNERABILITY INDICATORS OF THE UNIVERSITY COMPUTER NETWORK
188-200
Zh.T Aituganova, B.A. Talpakova, B.K. Zhussipbek
EFFECTIVE WAYS TO INCREASE THE SECURITY OF STORING INFORMATION IN A DATABASE
199-206
Y. Çelik, O. Fındık, Y. Alaca , B. Assanova, S. Sharmukhanbet
IMPLEMENTATION OF THE ARTIFICIAL IMMUNE SYSTEM ALGORITHM FOR SECURITY INFORMATION AND EVENT MANAGEMENT SYSTEMS
176-187
S.A. Аdiljanova , G.A. Тulepberdinova , M.J. SakypbekovaM, N.A. Тekesbayeva
ANALYSIS OF MATHEMATICAL METHODS OF MULTI-CRITERIA OPTIMIZATION AND DYNAMIC MANAGEMENT OF CYBERSECURITY RESOURCES OF INFORMATIZATION OBJECTS
162-167
D. Zhaxsygulova, S.Zh. Rakhmetullina, S.O. Gnatyuk
STUDY OF A MODEL FOR CALCULATING A QUANTITATIVE CRITERION FOR ASSESSING THE STABILITY OF INFORMATION AND TELECOMMUNICATION SYSTEMS OF CRITICAL INFRASTRUCTURE FACILITIES
27-39
G.A. Madyarova, P.R. Sattar
FEATURES OF INFORMATION SECURITY TRAINING BASED ON THE USE OF DIGITAL TECHNOLOGIES
244-250
A. Khompysh, N.A. Kapalova, D.S. Dyusenbayev, V.A. Varennikov
STUDY OF THE STATISTICAL SECURITY OF THE AL04 ENCRYPTION ALGORITHM
154-163
А.А. Зиро, D Tursumbayev , Zh Zhaibergenova, Sh Toibayeva
CONDUCTING PENETRATION TESTING USING THE WHITE BOX METHOD
118-125
D. Amirkhanova , О. Mamyrbayev
CRYPTOGRAPHIC ANALYSIS OF THE SCHEME OF POLYLINEAR CRYPTOGRAPHY
114-122
A. Karipzhanova , K. Kozhakhmet, R. Zhumalieva , A. Omirali, D. Bayazitov
IMPROVING THE SECURITY OF SPLIT DATA WHEN USING MULTIDIMENSIONAL REPORTING ALGORITHMS
145-157
O.S. Akhmetova , S.A. Issayev
PROSPECTS AND POSSIBLE RISKS OF THE APPLICATION OF SMART CONTRACTS IN SCIENCE AND EDUCATION
168-173
S.T. Mambetov, Ye.Ye. Begimbayeva, А.K. Khikmetov, S.K. Joldasbayev, G.N. Kazbekova
SENTIMENT ANALYSIS OF HACKER INTERNET FORUMS
162-172
S. Avdarsol, A.D. Ongarbayeva
FORMATION OF MEDIA DIGITAL LITERACY OF PRIMARY SCHOOL STUDENTS
179-188
F.R Gusmanova, G.A Abdulkarimova
OVERVIEW OF THE BLOCK ENCRYPTION DEVELOPMENT
295-301
A.S. Amirova, A.T. Tohmetov
COMBINED MODEL OF THREAT DETECTION IN INDUSTRIAL INTERNET OF THINGS
70-77
B. Sydykhov, D.U. Ydyrysbayev , З.Ә. Батырхан
APPLICATION OF VIRTUALIZATION TECHNOLOGIES IN THE CONTEXT OF DIGITALIZATION OF EDUCATION
61-67
V.A. Lakhno, L.M. Kydyralina, M. Bereke
THE TASKS OF SCALING CLOUD APPLICATIONS FOR THE EDUCATIONAL ENVIRONMENT OF UNIVERSITIES
99-105
B.S. Akhmetova, S.A. Adilzhanova, A. Abuova, Sh. Sagyndykova
MODULAR DECISION SUPPORT SYSTEM DURING THE OPTIMIZATION OF RESOURCE DISTRIBUTION BETWEEN PROTECTED OBJECTS
128-135
Ж.К. Кyлмaгaмбeтoвa
THE NEED FOR CLOUD TECHNOLOGIES IN THE EDUCATIONAL PROCESS
214-218
Zh. Seitbattalov, S.K. Atanov, A.E. Kyzyrkanov
AUTOMATED SYSTEM FOR MONITORING SENSOR VALUES BASED ON EDGE COMPUTING
238-244
K. Abeshev, A. Kulzhanova, T. Bakibayev, M. Dolayev
ANALYSIS OF ANTIFRAUD METHODS AND CYBERSECURITY FOR ONLINE QUIZ APPLICATIONS
138-145
M.B. Ydyryshbayeva, B.S. Akhmetov
A MODEL FOR DESCRIBING META-KNOWLEDGE IN A CYBERSECURITY SOLUTION SUPPORT SYSTEM
186-194
A.R. Turganbayeva, А.Е. Шахан
EMERGING IN THE PROCESS OF DIGITALIZATION OF HIGHER EDUCATION
198-202
D. Zhaxsygulova, S. Rakhmetullina, S. Gnatyuk
RESEARCH OF MODELS OF WIRELESS SENSOR NETWORKS FOR AN IOS-BASED MONITORING SYSTEM
51-58