[go: up one dir, main page]

Doniyor o‘g‘li et al., 2025 - Google Patents

MODERN METHODS OF INFORMATION PROTECTION

Doniyor o‘g‘li et al., 2025

View PDF
Document ID
16221382400397359033
Author
Doniyor o‘g‘li S
et al.
Publication year
Publication venue
IMRAS

External Links

Snippet

This article reviews advanced information security methods such as cryptography, authentication, network security, artificial intelligence-based security systems, blockchain technology, and cloud security. The advantages and areas of application of each method …
Continue reading at journal.imras.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Sattarova Feruza et al. IT security review: Privacy, protection, access control, assurance and system security
Bamrara et al. Cyber attacks and defense strategies in India: An empirical assessment of banking sector
Alhabeeb et al. Information security threats classification pyramid
Priyadarshini Introduction on cybersecurity
Asaad et al. A cyber security threats, vulnerability, challenges and proposed solution
Brancik et al. The optimization of situational awareness for insider threat detection
Rayhan Cybersecurity in the digital age: Assessing threats and strengthening defenses
Baballe et al. Management of vulnerabilities in cyber security
Beigh et al. Intrusion detection and prevention system: issues and challenges
Sadchenko Marketing-Management of Information Security of the Enterprise
Susanto et al. Artificial Intelligence, Blockchain Framework, Cyberthreat Defenses of Resilient Digital Ecosystems
Dhiman et al. Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques
Jouini et al. Threats classification: state of the art
Doniyor o‘g‘li MODERN METHODS OF INFORMATION PROTECTION
Koti et al. A comprehensive study and comparison of various methods on data leakages
Miloslavskaya et al. Big data information security maintenance
Chudasama et al. A Comparative Study About Cyberattacks and Cybersecurity in Real World
Nadjar et al. A case study on the multi-vector data breach on astoria
Azhar et al. Big Data Security Issues: A Review
Gyabi et al. Data Security in Rural Banking Sector: A Case Study in Ashanti Region
Ojoawo et al. Data leak protection using text mining and social network analysis
Schmüser et al. " Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine
Kadhim Techniques to protect against cyber attacks
Shivakumara et al. Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention
Lloyd et al. An Investigation into the impact Covid-19 has had on the cyber threat landscape and remote working for UK Organizations