[PDF][PDF] Speakers and auditors selection technique in assessing speech information security

YN Seitkulov, SN Boranbayev, HV Davydau… - Journal of Theoretical …, 2019 - jatit.org
The article is devoted to the requirements development for speakers and auditors in
assessing speech information security. Speakers selection features and methods of their …

[PDF][PDF] Speech information security assessing in case of combined masking signals

YN Seitkulov, SN Boranbayev, NN Tashatov… - J. Theoret. Appl. Inf …, 2020 - jatit.org
The paper presents the results of experimental studies directed to the speech intelligibility
assessment while protecting it from leakage via acoustic channels by masking with …

[PDF][PDF] Interference immunity and energy efficiency of digital communications systems in multipath channel with fading

NN Tashatov, MA Seksembayeva… - … J Elec Eng & Comp Sci, 2022 - dblib.rsreu.ru
In the study of measures to improve channel efficiency, we developed and presented a
performance analysis of a digital communication system for image transmission in a …

Modeling Domestic Passenger Transportation in the Republic of Kazakhstan During Pandemic Period

A Boranbayev, S Boranbayev, T Muratov… - Proceedings of the …, 2022 - Springer
In the article, a model was developed to model domestic passenger traffic on the territory of
the Republic of Kazakhstan, which, in particular, includes such indicators as ticket prices …

Method and software system for assessing the reliability of information systems

A Boranbayev, S Boranbayev, N Sissenov, N Goranin - 2021 - etalpykla.vilniustech.lt
The article proposes a method that allows you to assess the level of fault tolerance of
information systems. Fault tolerance is assessed according to several criteria and various …

Software System for Determining the Level of Reliability and Fault-Tolerance of Information Systems

A Boranbayev, S Boranbayev, N Sissenov… - Proceedings of the …, 2022 - Springer
This article is written about techniques how to determine the level of fault tolerance of
Information Systems (IS). On the basis of the proposed methods and approach, a software …

Methods and techniques of information security risk management during assessment of information systems

S Boranbayev, A Amrenov, A Nurusheva… - Future of Information …, 2022 - Springer
This article proposes methods for managing the security risks of information systems. The
proposed methods were tried in practice to make an assessment of the risks of information …

[PDF][PDF] METHODS FOR THE SECURE USE OF EXTERNAL SERVERS TO SOLVE COMPUTATIONALLY-COMPLEX PROBLEMS WITH SECRET PARAMETERS

BB YERGALIYEVA, YN SEITKULOV… - Journal of Theoretical …, 2022 - jatit.org
In this work, we study methods for the secure use of external insecure computers (servers)
when solving computationally-complex problems with secret parameters. This problem is …

Method and Information Technology to Support Decision-Making for Determining the Level of Reliability of Information Systems

A Boranbayev, S Boranbayev, N Sissenov… - Future of Information …, 2022 - Springer
The paper is about the development of a method and information technology (IT) for
decision support to determine the level of reliability of systems. The method and the …

Исследования и разработки в области создания материалов, технологий и средств обеспечения безопасности

ВА Богуш, ЛМ Лыньков, НВ Насонова… - Доклады …, 2024 - doklady.bsuir.by
Аннотация Представлены технологии изготовления электромагнитных экранов СВЧ-
диапазона на основе порошкообразного угля, фольгированных и композиционных …