Skip to content
Scientific and practical cyber security journal | ISSN 2587-4667
KA
RU
Home page
About journal
Issues archive
Author guidelines
Terms & conditions
User license
Contact us
Menu
Home page
About journal
Issues archive
Author guidelines
Terms & conditions
User license
Contact us
Archives: Papers
LOCATING USER IN 5G NETWORKS USING HIGH-BAND
BLOCKCHAIN-BASED POISONING ATTACK PREVENTION IN SMART FARMING
RECOMMENDER SYSTEMS USE IN CYBERSECURITY FIELD
USE OF MACHINE LEARNING IN RECOMMENDER SYSTEMS
MALICIOUS ANDROID APPS DETECTION USING MACHINE LEARNING
INFORMATION-MILITARY SECURITY IS A COMPONENT OF STATE SECURITY
INFORMATION SECURITY: AN EFFECTIVE TOOL FOR SUSTAINABLE NIGERIAN NATIONAL SECURITY AND DEVELOPMENT
THE ANALYSIS OF CYBERSECURITY PROBLEMS IN FINANCIAL SERVICES SECTOR
RADIOLOGY IN DIGITAL CLINIC MANAGEMENT SYSTEMS
THE NEED OF POINT-TO-POINT ENCRYPTION IN FINANCIAL TRANSACTIONS
Posts navigation
Older Posts
Older Posts