Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Architecture
Application Of The Aho-Corasick Algorithm To Create A Network Intrusion Detection System, Komil Tashev, Mokhinabonu Agzamova, Nozima Axmedova
Application Of The Aho-Corasick Algorithm To Create A Network Intrusion Detection System, Komil Tashev, Mokhinabonu Agzamova, Nozima Axmedova
Bulletin of TUIT: Management and Communication Technologies
Nowadays the Internet is very massive and the need for a system to protect the networks from being attacked becomes very important. One of the main goals of studying pattern matching techniques is their significant role in real-world applications, such as the intrusion detection systems branch. The purpose of the network attack detection systems NIDS is to protect the infocommunication network from unauthorized access. This article provides an analysis of the exact match and fuzzy matching methods, and discusses a new implementation of the classic Aho-Corasick pattern matching algorithm at the hardware level. The proposed approach to the implementation of …
Electronic Document Exchange And Digitization Of The Attestation Process Related To Scientific Degrees, H. Zaynidinov, O.. Makhmanov, F. Latifov
Electronic Document Exchange And Digitization Of The Attestation Process Related To Scientific Degrees, H. Zaynidinov, O.. Makhmanov, F. Latifov
Bulletin of TUIT: Management and Communication Technologies
The paper describes the development of the "Complex-analytical information system of scientific degrees" for electronic document exchange and digitization of the attestation process for scientific degrees in the field of attestation of highly qualified scientific and scientific-pedagogical personnel, modules that make up the system, their functions, also information security of the system, requirements for functions performed by the system, client-server architecture of data processing in information system.