has been cited by the following article(s):
[1]
|
СТРАТЕГІЇ ТА ІННОВАЦІЙНІ ПІДХОДИ ДО ЗАХИСТУ БАЗ ДАНИХ В ЕПОХУ ЗРОСТАЮЧИХ КІБЕРЗАГРОЗ
|
|
Ukrainian Scientific Journal of …,
2024 |
|
|
[2]
|
СТРАТЕГІЇ ТА ІННОВАЦІЙНІ ПІДХОДИ ДО ЗАХИСТУ БАЗ ДАНИХ В ЕПОХУ ЗРОСТАЮЧИХ КІБЕРЗАГРОЗ.
|
|
Ukrainian Scientific Journal of …,
2024 |
|
|
[3]
|
BUILDING DISTRIBUTED APPLICATIONS TO CALCULATE COURSE LEARNING OUTCOMES
|
|
Jurnal Riset Sistem …,
2024 |
|
|
[4]
|
Sigurnost baza podataka
|
|
2023 |
|
|
[5]
|
ПОВЫШЕНИЕ БЕЗОПАСНОСТИ БАЗЫ ДАННЫХ МЕТОДОМ КРИПТОГРАФИИ С ГЕНЕТИЧЕСКИМИ ОПЕРАТОРАМИ
|
|
ПЛАНИРОВАНИЕ, ПРОВЕДЕНИЕ И ТОЛКОВАНИЕ …,
2023 |
|
|
[6]
|
Improved database security using cryptography with genetic operators
|
|
SN Computer Science,
2023 |
|
|
[7]
|
Penerapan Hak Akses pada Perancangan Database Akademik untuk Meningkatkan Keamanan Data
|
|
Indonesian Journal of Machine Learning and …,
2023 |
|
|
[8]
|
Computer Network Security Strategy Based on Data Encryption Technology
|
|
2023 IEEE 15th International …,
2023 |
|
|
[9]
|
HDTSM: Hybrid Dynamic Token-based Security Mechanism for Database Protection in E-Government Service Systems
|
|
… Conference on Artificial …,
2023 |
|
|
[10]
|
Federal database system based on foreign data wrapper
|
|
… on Frontiers of …,
2022 |
|
|
[11]
|
МЕТОДЫ ОБЕСПЕЧЕНИЯ БЕЗОПАСНОСТИ БАЗ ДАННЫХ МӘЛІМЕТТЕР БАЗАСЫНЫҢ ҚАУІПСІЗІДІГІН ҚАМТАМАСЫЗ ЕТУ ӘДІСТЕРІ DATABASE …
|
|
ЖЗ Жантасова, МА Карменова
|
|
|
[12]
|
Analysis of database protection methods and tools for study in the" Information Protection Technologies" course
|
|
|
|
|
[1]
|
Silencing eavesdroppers: SVM unveiling physical layer threats
i-manager's Journal on Information Technology,
2024
DOI:10.26634/jit.13.1.20506
|
|
|
[2]
|
Computer Network Security Strategy Based on Data Encryption Technology
International Journal of Advanced Research in Science, Communication and Technology,
2024
DOI:10.48175/IJARSCT-22764
|
|
|
[3]
|
Improving Security and Performance of Databases Through Single Cache System
2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS),
2024
DOI:10.1109/ICBCTIS64495.2024.00022
|
|
|
[4]
|
Computer Network Security Strategy Based on Data Encryption Technology
2023 IEEE 15th International Conference on Computational Intelligence and Communication Networks (CICN),
2023
DOI:10.1109/CICN59264.2023.10402235
|
|
|
[5]
|
HDTSM: Hybrid Dynamic Token-based Security Mechanism for Database Protection in E-Government Service Systems
2023 International Conference on Artificial Intelligence and Automation Control (AIAC),
2023
DOI:10.1109/AIAC61660.2023.00029
|
|
|
[6]
|
HDTSM: Hybrid Dynamic Token-based Security Mechanism for Database Protection in E-Government Service Systems
2023 International Conference on Artificial Intelligence and Automation Control (AIAC),
2023
DOI:10.1109/AIAC61660.2023.00029
|
|
|
[7]
|
Federal database system based on foreign data wrapper
2022 International Conference on Frontiers of Communications, Information System and Data Science (CISDS),
2022
DOI:10.1109/CISDS57597.2022.00025
|
|
|
[8]
|
Federal database system based on foreign data wrapper
2022 International Conference on Frontiers of Communications, Information System and Data Science (CISDS),
2022
DOI:10.1109/CISDS57597.2022.00025
|
|
|