Galyna A. Akmayeva

According to our database1, Galyna A. Akmayeva authored at least 14 papers between 2008 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Panel discussion: Secured environment for end-users and contents.
Proceedings of the 2015 World Congress on Internet Security, 2015

2014
Confidential initial identification and other improvements for UMTS security.
Secur. Commun. Networks, 2014

2012
Digital forensic research - The analysis of user input on volatile memory of Windows application.
Proceedings of the 2012 World Congress on Internet Security, 2012

Anti-phishing prevention measure for email systems.
Proceedings of the 2012 World Congress on Internet Security, 2012

Machine learning approach towards email management.
Proceedings of the 2012 World Congress on Internet Security, 2012

Forensic memory evidence of windows application.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
Security of mobile Internet access with UMTS/HSDPA/LTE.
Proceedings of the 2011 World Congress on Internet Security, 2011

Security review of email summarization systems.
Proceedings of the 2011 World Congress on Internet Security, 2011

UMTS security: Enhancement of identification, authentication and key agreement protocols.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2009
Applying semantic web and user behavior analysis to enforce the intrusion detection system.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Mixed load balance strategy to improve performance efficacy for three tiers Peer-to-Peer network topology.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2008
A novel approach in securing DDoS attack.
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008

The softphone security.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

A NetFlow based internet-worm detecting system in large network.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008


  Loading...