MODELS, ALGORITHMS AND SOFTWARE FOR IDENTIFYING MALICIOUS INFORMATION IN SOCIAL NETWORKS
Keywords:
information security, cyberattack, cybercrime, algorithm, virus, antivirus
Abstract
In this article, the opinions and comments of our country's and foreign scientists are mentioned about the improvement of models, algorithms and software complex for identifying harmful information in social networks.
References
1. Alimov R.Kh., Khodiyev B. Yu. and others. Information systems and technology in the national economy gyals. Tashkent. "Sharq", 2004.
2. Aripov M., Begalov B. and others. Information Technology. For higher educational institutions study guide. Tashkent-Noshir-2009.
3. Fundamentals of Library and Informational science‖, by ABDUWAHAB OLANREWAJU ISSA, Ph.D in 2013, pages – 133.
4. Harris, M.H. History of Libraries in the Western World, 4th ed. (Scarecrow, 2011)
5. http://en.wikipedia.org/wiki/Library_science
6. http://WWW.rocket-library.com/)
7. http://en.wikipedia.org/wiki/List_of_libraries
2. Aripov M., Begalov B. and others. Information Technology. For higher educational institutions study guide. Tashkent-Noshir-2009.
3. Fundamentals of Library and Informational science‖, by ABDUWAHAB OLANREWAJU ISSA, Ph.D in 2013, pages – 133.
4. Harris, M.H. History of Libraries in the Western World, 4th ed. (Scarecrow, 2011)
5. http://en.wikipedia.org/wiki/Library_science
6. http://WWW.rocket-library.com/)
7. http://en.wikipedia.org/wiki/List_of_libraries
Published
2023-08-22
How to Cite
Mallayev Oybek Usmankulovich, Mirzaeva Malika Bakhadirovna, & A. O. Mukhamedaminov. (2023). MODELS, ALGORITHMS AND SOFTWARE FOR IDENTIFYING MALICIOUS INFORMATION IN SOCIAL NETWORKS. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 4(8), 77-80. Retrieved from https://cajmtcs.centralasianstudies.org/index.php/CAJMTCS/article/view/501
Section
Articles