About the Journal Editorial Board For authors Publication ethics Archive Abstracting & Indexing Contact us
Introduction
Online submission
TABLE OF CONTENT
JUSTIFICATION OF ENCRYPTION ALGORITHM FOR SYSTEMS MONITORING PERSONNEL CONDITION OF CRITICAL INFORMATIZATION OBJECTS
Olga Boiprav, Oleg Zelmanski, Mehman Hasanov, Ekaterina Makarenya
EVASION TECHNIQUES IN MALWARE DETECTION: CHALLENGES AND COUNTERMEASURES
Yadigar Imamverdiyev, Elshan Baghirov
NETWORK CYBERSECURITY INCIDENTS MULTICLASSIFICATION BASED ON DEEP LEARNING
Rasim Alguliyev, Ramiz Shikhaliyev
INTEGRATION OF MACHINE LEARNING-BASED DETECTION SYSTEMS INTO AUTONOMOUS VEHICLES
Haji Hajiyev
COMPARISON OF DEEP LEARNING TECHNIQUES FOR TEXTUAL SENTIMENT ANALYSIS
Leyla Mammadova
A CLOUD COMPUTING PARADIGM IN ROBOT MOTION PLANNING: INNOVATIONS AND PROSPECTS
Yusif Mardanzade
© Institute of Information Technology, 2025 www.ict.az |  secretary@iit.ab.az |  info@science.az
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.