[PDF][PDF] Speakers and auditors selection technique in assessing speech information security

YN Seitkulov, SN Boranbayev, HV Davydau… - Journal of Theoretical …, 2019 - jatit.org
The article is devoted to the requirements development for speakers and auditors in
assessing speech information security. Speakers selection features and methods of their …

[PDF][PDF] Precision Automated Phonetic Analysis of Speech Signals for Information Technology of Text-dependent Authentication of a Person by Voice.

O Bisikalo, O Boivan, N Khairova, OV Kovtun, V Kovtun - IntelITSIS, 2021 - academia.edu
A model of the process of phonetic analysis of speech signals in the frequency and temporal
spaces is highlighted in the article for the first time. The generalization of the spectral …

[PDF][PDF] Speech information security assessing in case of combined masking signals

YN Seitkulov, SN Boranbayev, NN Tashatov… - J. Theoret. Appl. Inf …, 2020 - jatit.org
The paper presents the results of experimental studies directed to the speech intelligibility
assessment while protecting it from leakage via acoustic channels by masking with …

Graphical visualization of the connections of involved users and identifying influential spreaders in a social network

S Mussiraliyeva, G Baispay, R Ospanov… - … on Electrical and …, 2022 - ieeexplore.ieee.org
According to the latest research, the use of social media to track the spread of radical ideas
and extremist threats has attracted the attention of researchers for over 10 years. In recent …

Modeling Domestic Passenger Transportation in the Republic of Kazakhstan During Pandemic Period

A Boranbayev, S Boranbayev, T Muratov… - Proceedings of the …, 2022 - Springer
In the article, a model was developed to model domestic passenger traffic on the territory of
the Republic of Kazakhstan, which, in particular, includes such indicators as ticket prices …

Method and software system for assessing the reliability of information systems

A Boranbayev, S Boranbayev, N Sissenov, N Goranin - 2021 - etalpykla.vilniustech.lt
The article proposes a method that allows you to assess the level of fault tolerance of
information systems. Fault tolerance is assessed according to several criteria and various …

Software System for Determining the Level of Reliability and Fault-Tolerance of Information Systems

A Boranbayev, S Boranbayev, N Sissenov… - Proceedings of the …, 2022 - Springer
This article is written about techniques how to determine the level of fault tolerance of
Information Systems (IS). On the basis of the proposed methods and approach, a software …

Methods and techniques of information security risk management during assessment of information systems

S Boranbayev, A Amrenov, A Nurusheva… - Future of Information …, 2022 - Springer
This article proposes methods for managing the security risks of information systems. The
proposed methods were tried in practice to make an assessment of the risks of information …

[PDF][PDF] METHODS FOR THE SECURE USE OF EXTERNAL SERVERS TO SOLVE COMPUTATIONALLY-COMPLEX PROBLEMS WITH SECRET PARAMETERS

BB YERGALIYEVA, YN SEITKULOV… - Journal of Theoretical …, 2022 - jatit.org
In this work, we study methods for the secure use of external insecure computers (servers)
when solving computationally-complex problems with secret parameters. This problem is …

Method and Information Technology to Support Decision-Making for Determining the Level of Reliability of Information Systems

A Boranbayev, S Boranbayev, N Sissenov… - Future of Information …, 2022 - Springer
The paper is about the development of a method and information technology (IT) for
decision support to determine the level of reliability of systems. The method and the …