security

Cyber-Jihad as a Security Threat: Pecularities of Use and Counteraction within the European Union

The authors argue that the impact of globalisation on the transformation of traditional threats to the international community caused the emergence of new asymmetric threats. The newest asymmetric threats come from "weak" states or groups, in various ways, which, without military superiority, can cause significant damage to stronger international actors. The article analyses the main characteristics of asymmetric threats, including their intensity, probability, and timeframe, which allow weaker actors to inflict damage.

The Right to Freedom of Religion: Problems of Implementation During the War in Ukraine

This article analyzes the possibilities for exercising the right to freedom of thought, conscience, and religion in Ukraine during martial law. It emphasizes that although Ukraine is a secular state with constitutionally enshrined separation of church and state, this does not negate its obligations to ensure this right. On the contrary, the secular nature of the state requires a set of legal and organizational measures to guarantee everyone’s right to freedom of belief.

Enhancing host intrusion detection systems for Linux based network operating systems

This paper proposes an enhanced model of Host Intrusion Detection Systems (HIDS) adapted for Linux- based Network Operating Systems (NOS), specifically SONiC. The SONiC architecture has been analyzed to identify intrusion-sensitive components, including telemetry data, container logs, and inter-container communications. A machine learning-based HIDS profile has been introduced to detect anomalies within containerized services and network modules. Signature-based, anomaly-based, and hybrid-based detection approaches have been classified with consideration of NOS-specific traits.

“PESCO 4”: the Role of Member States’ Ambitions in the Implementation of Defence and Security Projects of the European Union

The article clarifies the options for cooperation of 26 EU Member States within the framework of PESCO, which combine and develop their capabilities that they would be unable to create and implement separately. It is about developing defence capabilities, investment coordination, increasing operational readiness, operational interoperability, stability of their armed forces, and cooperation in various projects. It is emphasized on the various PESCO projects, such as cyber, unmanned systems, chemical, biological, radiological, nuclear surveillance, and medical services.

Methods and Means of Analyzing Application Security via Distributed Tracing

The article describes methods and means of digital security that are utilizing distributed tracing to detect, investigate, and prevent security incidents. The described methods and means are applicable to solutions of any scale – from large enterprises to pet projects; of any domain – healthcare, banking, government, retail, etc. The article takes a comprehensive approach to digital security including identification, alerting, prevention, investigation, and audit of existing security incidents.

Application of machine learning algorithms to enhance blockchain network security

This paper embarks on a detailed examination of the inherent security challenges faced by blockchain networks, including fraudulent transactions, double-spending, and 51% attacks, among others.  Using recent advancements in ML, it presents a novel methodology for real-time anomaly detection, predictive threat modeling, and adaptive security protocols that leverage data-driven insights to fortify the blockchain against both known and emerging threats.  By analyzing case studies and empirical data, this study illustrates the effectiveness of ML techniques in enhancing the

Study of the grain market of Ukraine in the conditions of war

The purpose of the study is to investigate the state and tender development of the Ukrainian grain market in terms of unlocking the export potential of the Ukrainian grain industry, given the need to restore logistics supply chains for export-oriented grain flows in the face of blocked land and water transport corridors. The objectives of the study were:

BLOCKCHAIN AND BIOMETRICS: CHALLENGES AND SOLUTIONS

Blockchain technology has garnered significant attention in recent years due to its ability to revolutionize conventional processes by providing faster, more secure, and cost-effective solutions. This study explores the symbiotic relationship between blockchain and biometrics, investigating how these technologies can mutually reinforce each other. The research makes a dual contribution: firstly, it comprehensively analyses blockchain and biometrics, highlighting their convergence's potential advantages and obstacles.

Управління екологічною безпекою міста

Розглянуто проблеми екологічної безпеки міста як складової безпеки життєдіяльності міста. Проаналізовано причин виникнення небезпек і можливі варіанти їх ліквідації за допомогою управлінських дій. Запропоновано концептуальну схему управління міською екобезпекою і структуру управлінського органу, алгоритм управління екобезпекою.

Aerial vehicles detection system based on analysis of sound signals

The article presents a modern aircraft detection system based on the analysis of sound signals, developed using neural networks and sound analysis algorithms. During the development of the system, the latest technologies were used, such as acoustic sensors, single-board microcomputers and external devices for processing and storing information received from the environment, which ensures fast and accurate detection of aircraft in the air.