[PDF][PDF] Speech information security assessing in case of combined masking signals

YN Seitkulov, SN Boranbayev, NN Tashatov… - J. Theoret. Appl. Inf …, 2020 - jatit.org
The paper presents the results of experimental studies directed to the speech intelligibility
assessment while protecting it from leakage via acoustic channels by masking with …

Modeling Domestic Passenger Transportation in the Republic of Kazakhstan During Pandemic Period

A Boranbayev, S Boranbayev, T Muratov… - Proceedings of the …, 2022 - Springer
In the article, a model was developed to model domestic passenger traffic on the territory of
the Republic of Kazakhstan, which, in particular, includes such indicators as ticket prices …

Method and software system for assessing the reliability of information systems

A Boranbayev, S Boranbayev, N Sissenov, N Goranin - 2021 - etalpykla.vilniustech.lt
The article proposes a method that allows you to assess the level of fault tolerance of
information systems. Fault tolerance is assessed according to several criteria and various …

Software System for Determining the Level of Reliability and Fault-Tolerance of Information Systems

A Boranbayev, S Boranbayev, N Sissenov… - Proceedings of the …, 2022 - Springer
This article is written about techniques how to determine the level of fault tolerance of
Information Systems (IS). On the basis of the proposed methods and approach, a software …

Methods and techniques of information security risk management during assessment of information systems

S Boranbayev, A Amrenov, A Nurusheva… - Future of Information …, 2022 - Springer
This article proposes methods for managing the security risks of information systems. The
proposed methods were tried in practice to make an assessment of the risks of information …

[PDF][PDF] METHODS FOR THE SECURE USE OF EXTERNAL SERVERS TO SOLVE COMPUTATIONALLY-COMPLEX PROBLEMS WITH SECRET PARAMETERS

BB YERGALIYEVA, YN SEITKULOV… - Journal of Theoretical …, 2022 - jatit.org
In this work, we study methods for the secure use of external insecure computers (servers)
when solving computationally-complex problems with secret parameters. This problem is …

Method and Information Technology to Support Decision-Making for Determining the Level of Reliability of Information Systems

A Boranbayev, S Boranbayev, N Sissenov… - Future of Information …, 2022 - Springer
The paper is about the development of a method and information technology (IT) for
decision support to determine the level of reliability of systems. The method and the …

Исследования и разработки в области создания материалов, технологий и средств обеспечения безопасности

ВА Богуш, ЛМ Лыньков, НВ Насонова… - Доклады …, 2024 - doklady.bsuir.by
Аннотация Представлены технологии изготовления электромагнитных экранов СВЧ-
диапазона на основе порошкообразного угля, фольгированных и композиционных …

ЦИФРОВАЯ ТРАНСФОРМАЦИЯ

HV DAVYDAU, VA PAPOU, AV PATAPOVICH… - ЦИФРОВАЯ …, 2022 - elibrary.ru
The paper presents the results of research on the assessment of the security risks of speech
information. It is shown that for speech information circulating in an acoustic form in a room …

[引用][C] Защита речевой информации комбинированными маскирующими сигналами

ГВ Давыдов, ВА Попов, АВ Потапович, ВЕ Галузо - 2021 - БГУИР