Expert systems for information security management and audit. Implementation phase issues
M Kanatov, L Atymtayeva… - 2014 Joint 7th …, 2014 - ieeexplore.ieee.org
Auditing of information security constitutes a key part of security operations taken inside
organizations. Often information security problems must be addressed as quickly as …
organizations. Often information security problems must be addressed as quickly as …
Building a knowledge base for expert system in information security
L Atymtayeva, K Kozhakhmet, G Bortsova - Soft computing in artificial …, 2014 - Springer
In the days of technological advancement, a role of information security (IS) is very
important. There is an urgent need in implementing and assessing information security at a …
important. There is an urgent need in implementing and assessing information security at a …
Enhancing information Security Audits in Enterprise Systems with a Recommendation Generation Process
S Kaimov, T Kaiym, N Kanagatova… - Procedia Computer …, 2024 - Elsevier
To ensure a high level of security, every organization should conduct regular information
security audits. This process is very time-consuming, costly and labor-intensive. Automating …
security audits. This process is very time-consuming, costly and labor-intensive. Automating …
Automated System for Monitoring of Educational Processes: Collection, Management, and Modeling of Data
L Atymtayeva, K Kozhakhmet, A Savchenko - Business Modeling and …, 2020 - Springer
Currently, the most of the processes at the educational analytical centers entirely depend on
the human factor. Automation of the real-time monitoring system for the educational …
the human factor. Automation of the real-time monitoring system for the educational …
Using Big Data Technology for Vulnerability Scanners
A Kulmanov, L Atymtayeva - Advanced Engineering Technology …, 2016 - journals.ekb.eg
This paper presents the general characteristics of expert systems for processing of data
analysis and secure information systems using vulnerability scanners and Big Data …
analysis and secure information systems using vulnerability scanners and Big Data …
[PDF][PDF] The development of expert system as a framework for choosing the mobile operators
A Baybakova, L Atymtayeva - Computer Modelling and Information … - ismaitm.lv
This paper presents the main processes of the development of expert system, which can
serve to the users in solving the problem of a suitable choice for mobile communication …
serve to the users in solving the problem of a suitable choice for mobile communication …
[PDF][PDF] Expert Systems for beauty products
IN Yersari, LB Atymtayeva - Computer Modelling and Information Technologies - ismaitm.lv
This paper describes the main principles of the development of an expert system in a beauty
sphere. The use of this expert system will simplify the selection of cosmetics for skin care, by …
sphere. The use of this expert system will simplify the selection of cosmetics for skin care, by …
[PDF][PDF] An Intelligent Approach and Data Management in Active Security Auditing Processes for Web Based Applications
L Atymtayeva, S Nurmyshev… - BMSD 2017-Proceedings …, 2017 - scitepress.org
Currently we observe increasing popularity of web technology that allows for reflecting
traditional businesses into web-based applications (web applications, for short). Such web …
traditional businesses into web-based applications (web applications, for short). Such web …
[引用][C] Main Issues of the Software Development for Knowledge Base Processing in the Intelligent Applications for Information Security Audit
L Atymtayeva, A Akzhalova, K Kozhakhmet - Journal” Recent Advances in Computer …, 2014