Dmytro Uzlov

ORCID: 0000-0003-3308-424X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Economic and Technological Systems Analysis
  • Advanced Data Processing Techniques
  • Cybersecurity and Information Systems
  • Environmental Sustainability and Technology
  • Legal and Policy Issues
  • Network Security and Intrusion Detection
  • Advanced Research in Systems and Signal Processing
  • Digital Transformation in Law
  • Software System Performance and Reliability
  • IoT and Edge/Fog Computing
  • Information Systems and Technology Applications
  • Scientific Research Methodologies and Applications
  • Scientific Research and Philosophical Inquiry
  • Healthcare Systems and Public Health

V. N. Karazin Kharkiv National University
2024

National Guard Military Academy of Ukraine
2020

Topicality. Efficient multi-object control in network environments ensures optimal performance and reliability. Due to delays errors, traditional methods often face challenges managing complex, large-scale networks. The aim of the research. This study aims evaluate compare efficiency reliability three distinct methods: independent control, sequential with error correction, simultaneous global correction. Research methods. research employs mathematical modelling, probabilistic time graphs,...

10.20998/2522-9052.2025.1.07 article EN cc-by-nc Advanced Information Systems 2025-02-24

This article is devoted to a review and perspectives of using data mining methods in the work criminal analysts national police by process developing implementing proactive activities for prevention investigation crimes. It also describes tools improving effectiveness information-analytical law-enforcement agencies through creation automated intelligent technological tools. The operative part outlines basic principles, models technologies that specialized software used support analytical analysts.

10.1109/infocommst.2018.8632122 article EN 2018-10-01

This article is devoted to the problem of appliance web-based geoinformation tools for improving effectiveness information-analitical work in internal affairs through creation intelligent technological new generation. It has gone overview foreign automated information and analytical works, highlighting their strengths weaknesses. As a solution problems set forth proposed use developed web-oriented protected system criminal analysis - RICAS support crimes investigation. Its purpose,...

10.1109/infocommst.2017.8246450 article EN 2017-10-01

In modern telecommunications and computer networks, efficient reliable information collection is essential for effective decision-making control task resolution. Current methods, such as periodic data transmission, event-driven collection, on-demand requests, have distinct advantages limitations. The object of the paper: study focuses on developing a comprehensive model to optimize processes in network environments. Subject This paper investigates various including evaluates their efficiency...

10.32620/reks.2024.2.08 article EN cc-by-nc RADIOELECTRONIC AND COMPUTER SYSTEMS 2024-04-23

The study analyzes sources related to methods and technologies for DNS (Domain Name System) traffic filtering. Five main directions are identified that actively used enhance security at the level. All examined offer improvements in quality of It is emphasized combining different approaches simultaneously can overall security. summary research results on issues indicates certain problems threat intelligence channels used. Therefore, implementation AI LM should "depth" extracting useful...

10.26565/2519-2310-2024-1-01 article EN Computer Science and Cybersecurity 2024-09-09

In the police activities of any country, there are two major directions: identifying signs crime preparation and preventing its commission (prediction), as well prevention by eliminating conditions for (prevention). At same time, various theories explaining that place time occur at random, when certain met commission, which depend on type factors objective side (place, mechanism commission) object encroachment. Currently, a huge number criminal events has been accumulated in databases law...

10.1109/dsmp47368.2020.9204127 article EN 2020-08-01

The article is devoted to the study of categories cyber incidents and their prioritization in context information security. It discusses main sources that provide about threats defines role detecting analyzing incidents, provides tools for collecting data. concepts event, incident, crime relationship between them are discussed. author a classification various types threats, how they coded, characteristics impact on systems. Examples use incident given. authors also consider specific may...

10.26565/2519-2310-2023-2-04 article EN Computer Science and Cybersecurity 2023-12-28

Law enforcement agencies increasingly use predictive and automation technologies where the core technology is often a machine learning (ML) model. The article considers problem of accountability responsibility law officials connected with using ML models. authors point out that key element democratic enforcement, but software can create challenges in ensuring accountability. discusses how application lead to obfuscation complicating «multi-agent structures» combine humans computational...

10.26565/2519-2310-2023-2-01 article EN Computer Science and Cybersecurity 2023-12-28

The purpose of this work is a comparative analysis the most well-known foreign and domestic intelligent data platforms for criminal analysis. article, based on review existing practical experience, form

10.30890/2709-2313.2023-17-03-001 article EN cc-by European Science 2020-02-28
Coming Soon ...