Author
Listed:
- Andrii Shyshatskyi
(Taras Shevchenko Kyiv National University, Ukraine)
- Taras Hurskyi
(Research Institute of Military Intelligence, Ukraine)
- Yevhenii Vdovytskyi
(The National University of Defense of Ukraine named after Ivan Chernyakhovskyi, Ukraine)
- Roman Vozniak
(The National University of Defense of Ukraine named after Ivan Chernyakhovskyi, Ukraine)
- Oleksii Nalapko
(Central Scientifically-Research Institute of Armaments and Military Equipments of the Armed Forces of Ukraine, Ukraine)
- Halyna Andriishena
(Taras Shevchenko Kyiv National University, Ukraine)
- Lyubov Shabanova-Kushnarenko
(National Technical University «Kharkiv Polytechnic Institute», Ukraine)
- Nadiia Protas
(Poltava State Agrarian University, Ukraine)
- Yuliia Vakulenko
(Poltava State Agrarian University, Ukraine)
- Serhii Pyvovarchuk
(Military Institute of Telecommunications and Information Technologies named after Heroes of Kruty, Ukraine)
Abstract
As a result of Russian aggression against Ukraine, some fundamental theses regarding the nature of hybrid military operations will require clarification and even revision. First of all, this refers to the widespread perception of the asymmetric nature of hybrid threats as those used by a weaker opponent against a party with significantly greater military, technological and human potential. This, in turn, requires the use of modern and proven mathematical apparatus, which is capable of processing a large array of various types of data in a short period of time with a given reliability of making management decisions. The object of research is the system of strategic management of national security. The subject of the research is the method of detection and identification of hybrid challenges and threats in the national security management system. In the research, the method of detection and identification of hybrid challenges and threats in the national security management system was developed. The novelty of the research: – a destructive effect on the system of national security management by adding an appropriate correction factor; – the use of an improved procedure of deep learning of the database of the system of detection and identification of hybrid challenges and threats to the national security of the state; – a mechanism for resolving conflicting cases of classification is used due to additional training, adaptation of detectors to the type and intensity of the hybrid challenge and threat to the national security of the state; – the procedure for automatically calculating the detector activation threshold and the universality of the structure of their representation due to the hierarchy and flexibility for the available hardware resources of the detection and identification system. It is advisable to implement the specified method in algorithmic and software while studying the state of the national security system.
Suggested Citation
Andrii Shyshatskyi & Taras Hurskyi & Yevhenii Vdovytskyi & Roman Vozniak & Oleksii Nalapko & Halyna Andriishena & Lyubov Shabanova-Kushnarenko & Nadiia Protas & Yuliia Vakulenko & Serhii Pyvovarchuk, 2023.
"Development of method for the identification of hybrid challenges and threats in the national security management system,"
Technology audit and production reserves, PC TECHNOLOGY CENTER, vol. 2(2 (70)), pages 26-29, April.
Handle:
RePEc:baq:taprar:v:1:y:2023:i:1:p:26-29
DOI: 10.15587/2706-5448.2023.276544
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:baq:taprar:v:1:y:2023:i:1:p:26-29. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Iryna Prudius (email available below). General contact details of provider: https://journals.uran.ua/tarp/issue/archive .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.