Analysis of Computer Crime Incidents
| dc.contributor.author | Radjabova Madina Shavkatovna | |
| dc.contributor.author | Yusupova Surayo Muyasar's Qizi | |
| dc.contributor.author | Mehmonkhozhaev Azizbek Shukhratjon O’g’li | |
| dc.date.accessioned | 2026-01-01T12:09:54Z | |
| dc.date.issued | 2022-10-22 | |
| dc.description.abstract | "Algorithms for predicting measures to ensure information security based on the analysis of computer crime incidents", computer crime, its types and reasons for committing were analyzed. In Maskur's article, a network traffic analysis algorithm generated several time series between different sets of infrastructure as a result of short-term forecasting and monitoring. If each observed value does not exist within the confidence interval, such information is called a risk, that is, an incident | |
| dc.format | application/pdf | |
| dc.identifier.uri | https://zienjournals.com/index.php/tjm/article/view/2569 | |
| dc.identifier.uri | https://asianeducationindex.com/handle/123456789/63152 | |
| dc.language.iso | eng | |
| dc.publisher | Zien Journals | |
| dc.relation | https://zienjournals.com/index.php/tjm/article/view/2569/2158 | |
| dc.rights | https://creativecommons.org/licenses/by-nc/4.0 | |
| dc.source | Texas Journal of Multidisciplinary Studies; Vol. 13 (2022): TJM; 113-116 | |
| dc.source | 2770-0003 | |
| dc.subject | Computer crime | |
| dc.subject | use of banking services | |
| dc.subject | DoS attack | |
| dc.subject | hacking | |
| dc.title | Analysis of Computer Crime Incidents | |
| dc.type | info:eu-repo/semantics/article | |
| dc.type | info:eu-repo/semantics/publishedVersion | |
| dc.type | Peer-reviewed Article |
item.page.files
item.page.filesection.original.bundle
pagination.showing.detail
loading.default
- item.page.filesection.name
- shavkatovna_2022_analysis_of_computer_crime_incidents.pdf
- item.page.filesection.size
- 162.01 KB
- item.page.filesection.format
- Adobe Portable Document Format