About the Journal
Editorial Board
For authors
Publication ethics
Archive
Abstracting & Indexing
Contact us
Introduction
Online submission
TABLE OF CONTENT
JUSTIFICATION OF ENCRYPTION ALGORITHM FOR SYSTEMS MONITORING PERSONNEL CONDITION OF CRITICAL INFORMATIZATION OBJECTS
Olga Boiprav, Oleg Zelmanski, Mehman Hasanov, Ekaterina Makarenya
EVASION TECHNIQUES IN MALWARE DETECTION: CHALLENGES AND COUNTERMEASURES
Yadigar Imamverdiyev, Elshan Baghirov
NETWORK CYBERSECURITY INCIDENTS MULTICLASSIFICATION BASED ON DEEP LEARNING
Rasim Alguliyev, Ramiz Shikhaliyev
INTEGRATION OF MACHINE LEARNING-BASED DETECTION SYSTEMS INTO AUTONOMOUS VEHICLES
Haji Hajiyev
COMPARISON OF DEEP LEARNING TECHNIQUES FOR TEXTUAL SENTIMENT ANALYSIS
Leyla Mammadova
A CLOUD COMPUTING PARADIGM IN ROBOT MOTION PLANNING: INNOVATIONS AND PROSPECTS
Yusif Mardanzade