Doniyor o‘g‘li et al., 2025 - Google Patents
MODERN METHODS OF INFORMATION PROTECTIONDoniyor o‘g‘li et al., 2025
View PDF- Document ID
- 16221382400397359033
- Author
- Doniyor o‘g‘li S
- et al.
- Publication year
- Publication venue
- IMRAS
External Links
Snippet
This article reviews advanced information security methods such as cryptography, authentication, network security, artificial intelligence-based security systems, blockchain technology, and cloud security. The advantages and areas of application of each method …
- 238000000034 method 0 title abstract description 18
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sattarova Feruza et al. | IT security review: Privacy, protection, access control, assurance and system security | |
Bamrara et al. | Cyber attacks and defense strategies in India: An empirical assessment of banking sector | |
Alhabeeb et al. | Information security threats classification pyramid | |
Priyadarshini | Introduction on cybersecurity | |
Asaad et al. | A cyber security threats, vulnerability, challenges and proposed solution | |
Brancik et al. | The optimization of situational awareness for insider threat detection | |
Rayhan | Cybersecurity in the digital age: Assessing threats and strengthening defenses | |
Baballe et al. | Management of vulnerabilities in cyber security | |
Beigh et al. | Intrusion detection and prevention system: issues and challenges | |
Sadchenko | Marketing-Management of Information Security of the Enterprise | |
Susanto et al. | Artificial Intelligence, Blockchain Framework, Cyberthreat Defenses of Resilient Digital Ecosystems | |
Dhiman et al. | Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques | |
Jouini et al. | Threats classification: state of the art | |
Doniyor o‘g‘li | MODERN METHODS OF INFORMATION PROTECTION | |
Koti et al. | A comprehensive study and comparison of various methods on data leakages | |
Miloslavskaya et al. | Big data information security maintenance | |
Chudasama et al. | A Comparative Study About Cyberattacks and Cybersecurity in Real World | |
Nadjar et al. | A case study on the multi-vector data breach on astoria | |
Azhar et al. | Big Data Security Issues: A Review | |
Gyabi et al. | Data Security in Rural Banking Sector: A Case Study in Ashanti Region | |
Ojoawo et al. | Data leak protection using text mining and social network analysis | |
Schmüser et al. | " Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine | |
Kadhim | Techniques to protect against cyber attacks | |
Shivakumara et al. | Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention | |
Lloyd et al. | An Investigation into the impact Covid-19 has had on the cyber threat landscape and remote working for UK Organizations |