security

Methods and Means of Analyzing Application Security via Distributed Tracing

The article describes methods and means of digital security that are utilizing distributed tracing to detect, investigate, and prevent security incidents. The described methods and means are applicable to solutions of any scale – from large enterprises to pet projects; of any domain – healthcare, banking, government, retail, etc. The article takes a comprehensive approach to digital security including identification, alerting, prevention, investigation, and audit of existing security incidents.

Application of machine learning algorithms to enhance blockchain network security

This paper embarks on a detailed examination of the inherent security challenges faced by blockchain networks, including fraudulent transactions, double-spending, and 51% attacks, among others.  Using recent advancements in ML, it presents a novel methodology for real-time anomaly detection, predictive threat modeling, and adaptive security protocols that leverage data-driven insights to fortify the blockchain against both known and emerging threats.  By analyzing case studies and empirical data, this study illustrates the effectiveness of ML techniques in enhancing the

Study of the grain market of Ukraine in the conditions of war

The purpose of the study is to investigate the state and tender development of the Ukrainian grain market in terms of unlocking the export potential of the Ukrainian grain industry, given the need to restore logistics supply chains for export-oriented grain flows in the face of blocked land and water transport corridors. The objectives of the study were:

BLOCKCHAIN AND BIOMETRICS: CHALLENGES AND SOLUTIONS

Blockchain technology has garnered significant attention in recent years due to its ability to revolutionize conventional processes by providing faster, more secure, and cost-effective solutions. This study explores the symbiotic relationship between blockchain and biometrics, investigating how these technologies can mutually reinforce each other. The research makes a dual contribution: firstly, it comprehensively analyses blockchain and biometrics, highlighting their convergence's potential advantages and obstacles.

Управління екологічною безпекою міста

Розглянуто проблеми екологічної безпеки міста як складової безпеки життєдіяльності міста. Проаналізовано причин виникнення небезпек і можливі варіанти їх ліквідації за допомогою управлінських дій. Запропоновано концептуальну схему управління міською екобезпекою і структуру управлінського органу, алгоритм управління екобезпекою.

Aerial vehicles detection system based on analysis of sound signals

The article presents a modern aircraft detection system based on the analysis of sound signals, developed using neural networks and sound analysis algorithms. During the development of the system, the latest technologies were used, such as acoustic sensors, single-board microcomputers and external devices for processing and storing information received from the environment, which ensures fast and accurate detection of aircraft in the air.

On international environmental security: modern dimensions and principles of implementation

The article describes the current problems of international environmental security in the context of the systematic manifestation of the principles of its implementation, which justifies the need to consolidate the efforts of interstate environmental measures on the basis of sustainable and balanced development. The article examines prerequisites for the formation of the global environmental safety as an integral part of international relations and politics against the background of the long-term ecological crisis.

An assessment of the effect of touting on Nigerian seaport operations: a case study of Apapa port

In Nigeria, touting has been a challenge in the port, as it causes loss and diversion of cargo. Therefore, this study examined the effect of touting on the operational performance of the Apapa port. Specifically, a self-administered questionnaire was distributed to determine the extent of the touting on service delivery, security measures on operational quality dependability, pilfering on operations output safety, touting influencing elements on operational reliability, and touting activities on overall performance.

SECURITY PROBLEMS IN SMART HOME SYSTEMS

This paper investigates the vulnerability of data transmission protocols used in smart home control systems, focusing on analyzing the communication protocols used in these systems. The spread of interconnected devices and the Internet of Things (IoT) has led to growing concerns about data privacy, unauthorized access, and potential cyberattacks. An in-depth analysis of various communication protocols used in the smart home environment was conducted, which allowed us to identify their advantages and disadvantages from a security perspective.