METHODS OF TAKING MEASURES FOR IDENTIFIED ILLEGAL ACTIVITIES

Authors

  • Аnvаrjon Аbdujаbborovich Mаxkаmov International Islamic Academy of Uzbekistan, Senior teacher of the “Department of Modern ICT” 11, A.Кadiri, Tashkent, 100011, Uzbekistan.
  • Alimjon Irgashevich Dadamuhamedov International Islamic Academy of Uzbekistan, Senior teacher of the “Department of Modern ICT” 11, A.Кadiri, Tashkent, 100011, Uzbekistan.

Keywords:

digital technology, network, permissions, software, data, security, threat.

Abstract

In today's digital era, methods of taking measures against detected illegal activities are one of the most important problems. Taking action against detected illegal activities is one way to ensure network security. In this article, the methods of taking measures against illegal activities detected in the network are considered.

References

Mahkamov, A. A., Jumayev, T. S., Tuhtanazarov, D. S., & Dadamuxamedov, A. I. (2024). Using AdaBoost to improve the performance of simple classifiers. In Artificial Intelligence, Blockchain, Computing and Security Volume 2 (pp. 755-760). CRC Press.

Papadopoulos, S., Kompatsiaris, Y., & Vakali, A. (2018). Network analysis and mining for social media. Synthesis Lectures on Data Mining and Knowledge Discovery.

Zhang, D., Liu, Y., & Wu, Y. (2020). Network traffic anomaly detection based on gradient boosting decision tree algorithm. Computer Communications.

Downloads

Published

2023-12-28

Issue

Section

Articles

How to Cite

METHODS OF TAKING MEASURES FOR IDENTIFIED ILLEGAL ACTIVITIES. (2023). Proceedings of International Conference on Educational Discoveries and Humanities , 3(1), 176-177. https://econferenceseries.com/index.php/icedh/article/view/3482