Analysis of Computer Crime Incidents

dc.contributor.authorRadjabova Madina Shavkatovna
dc.contributor.authorYusupova Surayo Muyasar's Qizi
dc.contributor.authorMehmonkhozhaev Azizbek Shukhratjon O’g’li
dc.date.accessioned2026-01-01T12:09:54Z
dc.date.issued2022-10-22
dc.description.abstract"Algorithms for predicting measures to ensure information security based on the analysis of computer crime incidents", computer crime, its types and reasons for committing were analyzed. In Maskur's article, a network traffic analysis algorithm generated several time series between different sets of infrastructure as a result of short-term forecasting and monitoring. If each observed value does not exist within the confidence interval, such information is called a risk, that is, an incident
dc.formatapplication/pdf
dc.identifier.urihttps://zienjournals.com/index.php/tjm/article/view/2569
dc.identifier.urihttps://asianeducationindex.com/handle/123456789/63152
dc.language.isoeng
dc.publisherZien Journals
dc.relationhttps://zienjournals.com/index.php/tjm/article/view/2569/2158
dc.rightshttps://creativecommons.org/licenses/by-nc/4.0
dc.sourceTexas Journal of Multidisciplinary Studies; Vol. 13 (2022): TJM; 113-116
dc.source2770-0003
dc.subjectComputer crime
dc.subjectuse of banking services
dc.subjectDoS attack
dc.subjecthacking
dc.titleAnalysis of Computer Crime Incidents
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Article

item.page.files

item.page.filesection.original.bundle

pagination.showing.labelpagination.showing.detail
loading.default
thumbnail.default.alt
item.page.filesection.name
shavkatovna_2022_analysis_of_computer_crime_incidents.pdf
item.page.filesection.size
162.01 KB
item.page.filesection.format
Adobe Portable Document Format

item.page.collections