База данных: Статьи
Страница 1, Результатов: 4
Отмеченные записи: 0
1.

Подробнее
32.81
B63
Bissaliyev, M. S
Enterprise Security Assessment Framework for Cryptocurrency Mining Basedon Monero [Текст] / M.S Bissaliyev // Әл - Фараби ат. ҚҰУ Хабаршы = Вестник КазНУ им Аль - Фараби. - Алматы, 2018. - №2(98). - С. 67-76. - (Математика, механика, информатика сериясы=Серия математика, механика, информатика. Journal of Mathematics, Mechanics, Computer Science.)
ББК 32.81
Рубрики: Информатика
Кл.слова (ненормированные):
cryptocurrency mining -- monero -- hidden mining -- cloud abuse
Аннотация: Mining a cryptocurrency is profitable on someone’s resources. It is becoming increasing problemin the enterprise to control the operations of its infrastructure while in idle or “off-work” time. Inthis paper we present enterprise security assessment framework for cryptocurrency mining basedon Monero cryptocurrency. The framework consists from surveying power consumption on GPUmining farms and traditional desktop PCs, analysis of web resources for browser-based miningon both internal and external domain names, the handy network logs analysis tool based on theregular expressions. While there had been significant difference between GPU and traditionaldesktop PC’s power consumption, computational ratio of the idle PCs after working time remainsquestionable. In the browser-based cryptocurrency mining, there were no data on public domains,however there had been a possibility for using the private domain names, thus further researchand different tools are required. In the network analysis, there were not enough evidences on thenetwork mining, and this leads to the different research question that attackers may use proxytechniques to bypass traffic filtering and network analysis.
Держатели документа:
ЗКГУ
Доп.точки доступа:
Nyussupov, A.T
Mussiraliyeva, Sh.Zh
B63
Bissaliyev, M. S
Enterprise Security Assessment Framework for Cryptocurrency Mining Basedon Monero [Текст] / M.S Bissaliyev // Әл - Фараби ат. ҚҰУ Хабаршы = Вестник КазНУ им Аль - Фараби. - Алматы, 2018. - №2(98). - С. 67-76. - (Математика, механика, информатика сериясы=Серия математика, механика, информатика. Journal of Mathematics, Mechanics, Computer Science.)
Рубрики: Информатика
Кл.слова (ненормированные):
cryptocurrency mining -- monero -- hidden mining -- cloud abuse
Аннотация: Mining a cryptocurrency is profitable on someone’s resources. It is becoming increasing problemin the enterprise to control the operations of its infrastructure while in idle or “off-work” time. Inthis paper we present enterprise security assessment framework for cryptocurrency mining basedon Monero cryptocurrency. The framework consists from surveying power consumption on GPUmining farms and traditional desktop PCs, analysis of web resources for browser-based miningon both internal and external domain names, the handy network logs analysis tool based on theregular expressions. While there had been significant difference between GPU and traditionaldesktop PC’s power consumption, computational ratio of the idle PCs after working time remainsquestionable. In the browser-based cryptocurrency mining, there were no data on public domains,however there had been a possibility for using the private domain names, thus further researchand different tools are required. In the network analysis, there were not enough evidences on thenetwork mining, and this leads to the different research question that attackers may use proxytechniques to bypass traffic filtering and network analysis.
Держатели документа:
ЗКГУ
Доп.точки доступа:
Nyussupov, A.T
Mussiraliyeva, Sh.Zh
2.

Подробнее
74
Е 92
Ефремова , Н. Ф.
Моделирование объективной оценки достижений студентов [Текст] / Н. Ф. Ефремова // Образовательные технологии. - 2019. - №3. - С. 77-85
ББК 74
Рубрики: Образование
Кл.слова (ненормированные):
компетенции -- качество обучения -- паттерн проектирования -- моделирование оценки -- результаты обучения -- доказательный дизайн -- надёжность -- оценки -- учебная мотивация
Аннотация: В статье рассмотрены особенности проектирования оценочных средств по модели Evidence Centered Design (ECD). Применение принципов доказательной аргументации с использованием паттерн-дизайнов позволяет шире использовать методы классификации, упорядочения и планирования оценки когнитивных и компетентностных результатов освоения студентами основных профессиональных образовательных программ. Использование моделей ECD способствует разработке оценочных средств, обеспечивающих надёжность результатов оценки в условиях компетентностного подхода, что, в свою очередь, способствует повышению учебной мотивации студентов.
Держатели документа:
ЗКГУ
Е 92
Ефремова , Н. Ф.
Моделирование объективной оценки достижений студентов [Текст] / Н. Ф. Ефремова // Образовательные технологии. - 2019. - №3. - С. 77-85
Рубрики: Образование
Кл.слова (ненормированные):
компетенции -- качество обучения -- паттерн проектирования -- моделирование оценки -- результаты обучения -- доказательный дизайн -- надёжность -- оценки -- учебная мотивация
Аннотация: В статье рассмотрены особенности проектирования оценочных средств по модели Evidence Centered Design (ECD). Применение принципов доказательной аргументации с использованием паттерн-дизайнов позволяет шире использовать методы классификации, упорядочения и планирования оценки когнитивных и компетентностных результатов освоения студентами основных профессиональных образовательных программ. Использование моделей ECD способствует разработке оценочных средств, обеспечивающих надёжность результатов оценки в условиях компетентностного подхода, что, в свою очередь, способствует повышению учебной мотивации студентов.
Держатели документа:
ЗКГУ
3.

Подробнее
67.411
G 51
Glavan, B. A.
Relationship between special investigation measures and criminal prosecution actions in the legal regulation of the republic of moldova [Текст] / B. A. Glavan // Құқық қорғау органдары академиясының жаршысы. - 2021. - №3. - с. 63-69
ББК 67.411
Рубрики: Уголовно - процессуальное право
Кл.слова (ненормированные):
special investigative activities -- special investigative measures -- special investigative actions -- criminal proceedings -- evidence
Аннотация: The relationship between special investigative measures and criminal prosecution actions is one of the most complicated and current issues specific to the legislation of the Republic of Moldova. In the paper the author discusses the national legal provisions that prevent the positive solution of this problem, highlights the essential similarities and differences between these two entities and analyzes the differences between the legal status of the results obtained, on the one hand, by conducting special investigative measures and, on the other hand, by carrying out criminal prosecution actions. In conclusion, even after the integration of special investigative measures in the Code of Criminal Procedure or the Republic of Moldova their legal status remains different from that of criminal prosecution actions. By carrying out these measures, information is obtained as before, not evidence. They can become evidence only if they pass the criminal procedural examination.
Держатели документа:
ЗКУ им М. Утемисова
G 51
Glavan, B. A.
Relationship between special investigation measures and criminal prosecution actions in the legal regulation of the republic of moldova [Текст] / B. A. Glavan // Құқық қорғау органдары академиясының жаршысы. - 2021. - №3. - с. 63-69
Рубрики: Уголовно - процессуальное право
Кл.слова (ненормированные):
special investigative activities -- special investigative measures -- special investigative actions -- criminal proceedings -- evidence
Аннотация: The relationship between special investigative measures and criminal prosecution actions is one of the most complicated and current issues specific to the legislation of the Republic of Moldova. In the paper the author discusses the national legal provisions that prevent the positive solution of this problem, highlights the essential similarities and differences between these two entities and analyzes the differences between the legal status of the results obtained, on the one hand, by conducting special investigative measures and, on the other hand, by carrying out criminal prosecution actions. In conclusion, even after the integration of special investigative measures in the Code of Criminal Procedure or the Republic of Moldova their legal status remains different from that of criminal prosecution actions. By carrying out these measures, information is obtained as before, not evidence. They can become evidence only if they pass the criminal procedural examination.
Держатели документа:
ЗКУ им М. Утемисова
4.

Подробнее
28
M23
Mamyrbayev , O.
Evidences propagations in bayesian networks [Текст] / O. Mamyrbayev , N. Litvinenko, A. Shayakhmetova // News of the National Academy of sciences of the Republic of Kazakhstan. - 2020. - №4. - Р. 119-126
ББК 28
Рубрики: Biology
Кл.слова (ненормированные):
bayesian networks -- orirnted graphs -- generation -- propagating
Аннотация: This paper is devoted to some problems of the distribution of several evidences in Bayesian networks.
Держатели документа:
WKU
Доп.точки доступа:
Litvinenko, N.
Shayakhmetova, A.
M23
Mamyrbayev , O.
Evidences propagations in bayesian networks [Текст] / O. Mamyrbayev , N. Litvinenko, A. Shayakhmetova // News of the National Academy of sciences of the Republic of Kazakhstan. - 2020. - №4. - Р. 119-126
Рубрики: Biology
Кл.слова (ненормированные):
bayesian networks -- orirnted graphs -- generation -- propagating
Аннотация: This paper is devoted to some problems of the distribution of several evidences in Bayesian networks.
Держатели документа:
WKU
Доп.точки доступа:
Litvinenko, N.
Shayakhmetova, A.
Страница 1, Результатов: 4