- Economic Issues in Ukraine
- Ukrainian Legal and Forensic Studies
- Business and Economic Development
- Education, Law, and Society
- Biometric Identification and Security
- Crime, Illicit Activities, and Governance
- Banking, Crisis Management, COVID-19 Impact
- Legal Studies and Reforms
- Advanced Computational Techniques in Science and Engineering
- Digital Transformation in Law
- Advanced Data Processing Techniques
- Diverse Scientific Research in Ukraine
- Labor Market and Education
- Security, Politics, and Digital Transformation
- Cybersecurity and Information Systems
- Statistical and Computational Modeling
- Economic and Business Development Strategies
- Economic and Technological Systems Analysis
- European and Russian Geopolitical Military Strategies
- Military Technology and Strategies
- Economic and Technological Developments in Russia
- Aerospace, Electronics, Mathematical Modeling
- Advanced Research in Systems and Signal Processing
- Global Security and Public Health
- Forest Management and Policy
Ministry of Internal Affairs of the Republic of Tajikistan
2024
National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”
2022
Hubei University of Technology
2022
Kyiv National University of Construction and Architecture
2019-2022
National Aviation University
2022
Research Institute of Ukrainian Studies
2022
National Security and Defense Council of Ukraine
2021
British Academy
2019
The behavior of agents to ensure financial security on the basis game theory was analyzed, winning strategy taking into account risk and uncertainty determined.Using Data Mining useful functions this technology were identified security: suspicious transactions determination, credit risks analysis, client reliability indicators predicting control.A comparison made assessment effectiveness various data mining algorithms nature decision-making procedures in system.It proved that development...
Currently, the means of semantic segmentation images, which are based on use neural networks, increasingly being used in computer systems for various purposes.Despite significant progress this industry, one most important unsolved problems is task adapting a network model to conditions selecting an object mask image.The features such necessitate determining type and parameters convolutional networks underlying encoder decoder.As result research, appropriate method has been developed that...
The widespread implementation of neural network tools for biometric authentication based on facial and iris images at critical infrastructure facilities has significantly increased the level security. However, modern requirements dictate need to modernize these increase resistance spoofing attacks, as well provide a base assessing compliance psycho-emotional state personnel with job responsibilities, which is difficult ensure using traditional monolithic models. Therefore, this article...
The paper focuses on the study of hybrid threats in civil security sector Ukraine.It is substantiated, based factor analysis, hypothesis existence related to spread certain types crime Ukraine, particular activities illegal armed groups.An empirical expert survey's results system bodies Ministry Internal Affairs Ukraine identification and assessment sector, as well quantitative law enforcement agencies' ability counter these threats.Emphasis placed estimating variations vulnerability...
òÁÐÈÄͲ ÇÀÃÐÎÇÈ Ó ÑÅÊÒÎв ÖȲËÜÍί
ÌÅÒÎÄÎËÎò×Ͳ ÇÀÑÀÄÈ ÎÖ²ÍÞÂÀÍÍß ÐÈÇÈʲÂ
The subject of the study is methodological foundations and applied approaches to assessing impact organised crime on economic relations in country. Methodology. uses two key criminological analysis crime: statistical (based state statistics) sociological (risk assessment based expert surveys). purpose article compare analytical results data activities sphere Ukraine. activity Ukraine has been analysed basis statistics surveys conducted recent years under various research projects. With a...
The paper examines the scientists’ approaches to evaluation of money laundering. Attention is drawn macroeconomic results such an analysis. research on scope laundering and its impact country’s economy reviewed. Relevant literature selected techniques have been highlighted are widely available in world. focus discussing implications finding methods for evaluating various scales conclusions reached by scholars flows laundering.
 An authors’ approach analysis phenomenon proposed based...
The research article focuses on the activities of law enforcement agencies, namely that problems modern world provoke need to form a new level thinking in agencies based adequate risk perception, which is an
The paper focuses on the study of macroeconomic threats to fiscal security.Empirical data based results strategic analysis in field security Ukraine are presented.The threat compared separately according level probability and consequences their spread with risk level, which is determined basis an integrated combination consequences.The identified most significant Ukraine.Emphasis placed determining thresholds for threats.A matrix used appropriate proposed.The threshold levels were applied...
The article investigates the problems of spread complex socio-economic phenomenon-money laundering in Ukraine. attention is focused on results fifth round mutual evaluation Ukraine sphere AML by Committee Council Europe MONEYVAL and conclusions lack effectiveness national mechanism combating money necessity monitoring conducting appropriate macroeconomic criminological analysis basis scientific knowledge phenomenon «money laundering», factors its manifestation As a methodology for study as...
ÎÖ²ÍÞÂÀÍÍß ÇÀÃÐÎÇ
The article is devoted to improvement cyber-attacks recognition systems on network resources of information systems. By analogy with the classification technical failures, it proposed select a class step-by-step that are characterized by long and expected, from point view security system, process changing parameters values exceed safe limits. approach progressive grounded. It involves estimating deviation current safety patterns normal behaviour, calculated over given operation interval....
The forestry sector in Ukraine is currently confronted with a multitude of challenges, including the repercussions climate change, ecological issues, economic and consequences military actions initiated by Russian Federation, which have caused extensive damage to forests across country. This highlights necessity for research aimed at assessing threats risks sector, as well evaluating institutional capacity ensure sustainable development industry. was conducted accordance mandate Temporary...
The article is devoted to the improvement of neural network tools for recognizing user's identity by their keyboard handwriting. It shown that most promising recognition are based on convolutional networks, and its drawback high resource consumption network. proposed reduce using modern types networks adapted expected conditions analysis As a result studies, it was possible effectively analyze handwriting SqueezeNet type, main advantages which small amount memory consumed, speed,...