Analysis and modeling of price changes on the exchange market based on structural market data

B Bebeshko, K Khorolska… - 2021 IEEE 8th …, 2021 - ieeexplore.ieee.org
The securities market, also known as the stock market, is a public trading platform for trading
stocks of various companies. Forecasting in the stock market is an attempt to determine the …

[PDF][PDF] Experimental studies of the features of using waf to protect internal services in the zero trust structure

V Lakhno, A Blozva, D Kasatkin, V Chubaievskyi… - J Theor Appl Inf …, 2022 - jatit.org
With the growth of web applications popularity, the need to protect them from hacking and
unauthorized access is growing even faster. More than 75% of hacker attacks are aimed at …

Application of a Genetic Algorithm for the Selection of the Optimal Composition of Protection Tools of the Information and Educational System of the University

BS Akhmetov, V Lakhno, BB Akhmetov… - Procedia Computer …, 2022 - Elsevier
The article discusses the possibility of using a genetic algorithm (GA) in the search for the
optimal composition of information security tools (IST) for the information and educational …

[PDF][PDF] Genetic algorithm for solving the problem of scaling a cloud-oriented object of informatization

V Lakhno, M Bereke, S Adilzhanova… - Journal of Theoretical …, 2022 - jatit.org
This article discusses the problem of mathematical modeling performed in the process of
choosing server platforms and the required additional amount of RAM for the deployment of …

Университеттің ақпараттық және цифрлық білім беру ортасында бұлтты қосымшаларды масштабтауға арналған шешімдерді қолдау жүйесін әзірлеу

МБ Береке, ВА Лахно, БС Ахметов, АК Абуова - Вестник Ауэс, 2022 - vestnik.aues.kz
Аннотация Предложен концептуальный подход к проектированию системы поддержки
принятия решения (СППР) для задачи оценки вариантов масштабирования облако …

Automatic Physical Cell Identity Planning using Machine Learning

BNSVB Manda, M Yama - 2022 - diva-portal.org
Background: The growing needs of communications have a higher demand for data and
stream-less services for the users. A unique physical cell identity (PCI) is assigned to …

ОПТИМІЗАЦІЯ МЕТОДУ ВИБОРУ СТРАТЕГІЇ ІНВЕСТУВАННЯ ЗАСОБІВ ЗАХИСТУ ІНФОРМАЦІЇ НА ОСНОВІ КОМБІНАЦІЇ ТЕОРІЇ ІГОР ТА ГЕНЕТИЧНОГО …

L Plyska, V Maliukov - Електронне фахове наукове …, 2022 - csecurity.kubg.edu.ua
Анотація Today, there is a tendency to increase financial income from criminal
organizations and increase attacks on information systems. At the same time, new methods …

ВЕСТНИК АЛМАТИНСКОГО УНИВЕРСИТЕТА ЭНЕРГЕТИКИ И СВЯЗИ

ТВ Голубева, ВА Тайлаков, КД Василенко… - … ЭНЕРГЕТИКИ И СВЯЗИ … - elibrary.ru
В результате обзора научных работ, близких к решаемой задаче создания архитектур
прототипов средств автоматического поиск уязвимостей в машинном коде устройств …

[PDF][PDF] Improving the RC5RA Algorithm's Crypto Resistance for Embedded Computers

A Sahun, V Khaidurov, P Gikalo - ceur-ws.org
An approach to increase the cryptographic stability of the RC5RA classical cryptographic
algorithm. The proposed approach does not increase the computational complexity of the …