A biohashing method for fingerprint templates protection YN Imamverdiyev 2009 International Conference on Application of Information and …, 2009 | 1 | 2009 |
A Comparative Analysis of Pitch Detection Methods Under the Influence of Different Noise Conditions L Sukhostat, Y Imamverdiyev Journal of Voice 29 (4), 410-417, 2015 | 51 | 2015 |
A conceptual model of digital twin for the oil and gas industry YN Imamverdiyev Problems of Information Technology, 41-51, 2020 | 1 | 2020 |
A CONSENSUS RANKING METHOD FOR INFORMATION SECURITY THREATS OF AN E-GOVERNMENT YN Imamverdiyev Problems of information technology, 30-40, 2018 | | 2018 |
A DEEP LEARNING METHOD FOR SENTIMENT CLASSIFICATION YN Imamverdiyev, MS Hajirahimova, AY Imamverdiyeva Оптико-электронные приборы и устройства в системах распознавания образов и …, 2019 | | 2019 |
A hypergame model for information security Y Imamverdiyev International Journal of Information Security Science 3 (1), 148-155, 2014 | 8 | 2014 |
A longitudinal study on degree centrality changes in a group of students Y Imamverdiyev, HZ Asl, N Janani, S Siami, N Babapoor, S Nezhadseifi, ... 2010 4th International Conference on Application of Information and …, 2010 | 3 | 2010 |
A method for cryptographic key generation from fingerprints YN Imamverdiev, LV Sukhostat Automatic Control and Computer Sciences 46, 66-75, 2012 | 10 | 2012 |
A model for optimal planning of information security incident response operations YN Imamverdiyev Problems of information technology, 69-80, 2018 | 2 | 2018 |
A Model of Fusion of Information on Image Quality Based on the Dempster−Shafer Theory for Biometric Systems Interoperability YN Imamverdiev Journal of Automation and Information Sciences 42 (4), 66-74, 2010 | 1 | 2010 |
A MULTI-CRITERIA EVALUATION MODEL FOR E-GOVERNMENT INFORMATION SECURITY COORDINATION SYSTEM YN Imamverdiyev Problems of Information Technology, 47-58, 2019 | | 2019 |
ABOUT ONE METHOD FOR INFORMATION SECURITY THREAT RANKING YN Imamverdiyev, SA Derakhshandeh Problems of Information Technology, 46-56, 2011 | | 2011 |
About one method of risk measurement of maintenance of information security of corporative networks because of fuzzy sets RM Alguliev, YN Imamverdiev Proc. of the 4th International Conference on New Information (Technologies …, 2000 | 6 | 2000 |
An advanced channel compensation method for speaker recognition Y Imamverdiyev, L Sukhostat 2013 7th International Conference on Application of Information and …, 2013 | | 2013 |
AN ALTERED FINGERPRINT DETECTION METHOD BASED ON FRACTAL CHARACTERISTICS YN Imamverdiyev Problems of Information Technology, 17-26, 2012 | | 2012 |
An anomaly detection based on optimization RM Alguliyev, RM Aliguliyev, YN Imamverdiyev, LV Sukhostat International Journal of Intelligent Systems and Applications 9 (12), 87, 2017 | 24 | 2017 |
An application of extreme value theory to e-government information security risk assessment Y Imamverdiyev 2013 7th International Conference on Application of Information and …, 2013 | 7 | 2013 |
AN ASSESSMENT MODEL FOR E-GOVERNMENT INFORMATION SECURITY TRUST YN Imamverdiyev Problems of Information Technology, 25-32, 2015 | | 2015 |
An improved ensemble approach for DoS attacks detection RM Alguliyev, RM Aliguliyev, YN Imamverdiyev, LV Sukhostat Радіоелектроніка, інформатика, управління, 73-82, 2018 | 9 | 2018 |
An information security incident prioritization method Y Imamverdiyev 2013 7th International Conference on Application of Information and …, 2013 | 6 | 2013 |