IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 4, April 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Concept Of Establishing Multi-Agent Intellectual Automatically Systems In The Enterprise

[Full Text]

 

AUTHOR(S)

Bekmuratov Tulkun, Ganiev Abdukhalil, Botirov Fayzullajon

 

KEYWORDS

Enterprise security assignments, concept, information security management system, multi-agent system

 

ABSTRACT

this article includes the development of an automated information security system at the enterprise, an overview of the enterprise security task structure, and the concept of building an automated information security system at the enterprise.

 

REFERENCES

[1] Bekmuratov T.F., Botirov F.B., “Multi-agent system of protection from unauthorized access”, 2019 International Conference on International Scientific and Practical Conference "Innovative ideas of modern youth in science and education", USA, p.4-7.
[2] Bekmuratov TF, Botirov FB, Application of multicenter systems in information security systems // Problemy information and energy. 2018. No. 5. S. 78–83.
[3] Legkov K.E. Methods of automation of information systems of automated system of up -to-date objects object specification // T-Comm: Telecommunications and transport. 2018. Volume 12. No. 5. S. 31-40
[4] I Formatless bezopasnost и язык программирования CS. Malkov M.A. Intelligent system. Theory and Applications. 2016. T. 20. No. 3. S. 209–213.
[5] Jidko E. A., Razinkov S. N. The model of the system and the information on the system and the uptake of the data object // System Upgrade, the thread and the bezopasnosti. 2018. No. 1. S. 122–135. URL: http://sccs.intelgr.com/archive/2018-01/06-Zhidko.pdf
[6] Zhidko EA, Razinkov SN Model of security and information protection subsystem of a communication and control system of a critical object. Control Systems, Communic ation and Security, 2018, pp. 122–135. Available at: URL: http://sccs.intelgr.com/archive/2018-01/06-Zhidko.pdf (in Russian).
[7] Bekmuratov T.F., Concepts and post-modern intellectual systems of information and information technologies // Problems of information security and cyber security in information technologies and communications: Republican scientific and technical conference. Tashkent - 2018., pp. 4-8.
[8] Jidko E. A. Nauchno-obosnovanniy podxod k Classification ugroz information information technology // Information systems and technology. 2015. No. 1 (87). S. 132–139.
[9] Sazonova S. A. Otsenka nadejnosti raboti setevix obyektov // Vestnik Voronezhskogo Institute of Technology. 2016. No. 1 (16). S. 40-42
[10] Gavrilov V. E., Zakarinniy A. A. Informatsionniye sistemi i informatsionniye materiali voprosi obespecheniya zashite informatsii v avtomatizatsiya informatsionnix sistemax na oblachnix texnologiy s ispolstvovaniyem sistemov iskusstvennoy Intel // Sistemi i sredstva informatsiY. - 20 16. - T. 26. - No. 4. - S. 38-50.
[11] M Models and methods podderjki prinyatiya resheniy PO Obespechenie informatsionnoy Safety informatsionno upravlyayushchix System. Zegjda PD, Anisimov VG, Suprun AF, Anisimov EG, Saurenko TN Problems of informational design. Computer System. 2018. No. 1. S. 43-47.
[12] Bekmuratov T.F., Botirov F.B,, Problems of information security management // Problems of information security in information technologies and communications: Republican scientific and technical conference. Tashkent - 2019., pp . 151-155.