#### Filter Results:

- Full text PDF available (1)

#### Publication Year

2015

2016

#### Co-author

#### Publication Venue

Learn More

- Anatolii Balyk, Uliana Yatsykovska, Mikolaj Karpinski, Yuliia Khokhlachova, Aigul Shaikhanova, Lesia Korkishko
- 2015 IEEE 8th International Conference on…
- 2015

Today network security is major problem faced not only by small companies but big giants like Samsung and Google. Traditional architecture of internet is vulnerable to DDoS attacks and it provides an opportunity to an attacker to get access to a great amount of compromised hosts by using their vulnerabilities to create attack networks or Botnets. Although a… (More)

- Gulzhan Uskenbayeva, Mamyrbek Beisenbi, Dana Satybaldina, Vasyl Martsenyuk, Aigul Shaikhanova
- 2016 16th International Conference on Control…
- 2016

The article presents a new approach to the construction control systems for objects with uncertain parameters in the form of one-parametric structurally stable maps from catastrophe theory. This method allows synthesizing the highly effective control systems, possessing in the extremely wide area of robust stability. Research of control systems robust… (More)

- Y. A. Ospanov, B. B. Orazbayev, K. N. Orazbayeva, T. Gancarczyk, A. K. Shaikhanova
- 2016 16th International Conference on Control…
- 2016

This paper proposes methods for the development of mathematical models and for the control of operation modes of technological objects in oil refinery in face of uncertainty based on fuzzy information. The mathematical formulation of the problem of decision-making on controlling modes, which are solved on the basis of mathematical modeling, is formalized… (More)

- A. Shaikhanova
- 2015

1 0 1 log 1 | i T n t c r s t c 1 1 2 log | 0 i k T n t c b s r t c b H n s n r i i i n i () () 1 0 3 , 1 1 log log 2 2 1 T n w t c s c d s i i i i i k n n w t c s d w w Abstract: Main parameters of evaluation of modern information protection systems that implement RSA encryption algorithm are performance, RAM consumption and stability of algorithm of used… (More)

- ‹
- 1
- ›