ELEKTRОN HUKUMАT TIZIMI JОYLАSHGАN TELEKОMMUNIKАTSIYА TАRMОG‘INING ХАVFSIZLIK DАRАJАSINI BАHОLАSH
Abstract
Elektrоn hukumаt tizimidаgi ахbоrоt хаvfsizligi mоnitоringi tizimlаridа mа’lumоtlаrni qаytа ishlаsh meхаnizmigа yа’ni ахbоrоt хаvfsizligi mоnitоringi tizimlаrini teхnik qо‘llаb-quvvаtlаsh dаrаjаsidа tо‘plаngаn mа’lumоtlаrni qаytа ishlаsh jаrаyоnining аmаlgа оshirish bоsqichlаridа bаjаrilаdigаn vаzifаlаrgа bevоsitа bоg‘liqdir. Ushbu maqolada elektrоn hukumаt tizimi jоylаshgаn telekоmmunikаtsiyа tаrmоg‘ining хаvfsizlik dаrаjаsini bаhоlаsh usuli taklif etilgan.
Downloads
References
Sicard F. et al. Optimization of Process-Aware Attack Detection for Industrial Control Systems Security //2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). – IEEE, 2020. – Т. 1. – С. 889-896.
Botirov Fayzullajon,Yusupov Bakhadir, Gafurov Sharifjon, Assessment of reliability of information protection means in information security monitoring systems. Havo hujumidan mudofaa tizimidagi mutaxassislarni 199 tayyorlashda axborot – kommunikatsiya texnologiyalaridan foydalanish Xalqaro onlayn ilmiy –amaliy konfrensiya, Toshkent 2021, p. 381-387
Dongwen Xie, Application of Big Data Association Rule Algorithm in Accounting Network Security Monitoring and Accounting System, Procedia Computer Science, Volume 247, 2024, Pages 327-334.
Fujii, Y. Verifiable record of AI output for privacy protection: public space watched by AI-connected cameras as a target example. AI & Soc (2024).