{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T05:04:10Z","timestamp":1773983050805,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T00:00:00Z","timestamp":1726704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T00:00:00Z","timestamp":1726704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,19]]},"DOI":"10.1109\/acit62333.2024.10712462","type":"proceedings-article","created":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T17:51:15Z","timestamp":1729101075000},"page":"370-375","source":"Crossref","is-referenced-by-count":3,"title":["Modeling Country Economic Security: a Machine Learning Approach"],"prefix":"10.1109","author":[{"given":"Olha","family":"Kovalchuk","sequence":"first","affiliation":[{"name":"West Ukrainian National University,Theory of Law and Constitutionalism Department,Ternopil,UKRAINE"}]},{"given":"Kateryna","family":"Berezka","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Applied Mathematics,Ternopil,UKRAINE"}]},{"given":"Ludmila","family":"Babala","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Economic Cybernetics and Informatics,Ternopil,UKRAINE"}]},{"given":"Roman","family":"Ivanytskyy","sequence":"additional","affiliation":[{"name":"Ternopil Volodymyr Hnatiuk National Pedagogical University,Department of Physics and Mathematics,Ternopil,UKRAINE"}]},{"given":"Nataliia","family":"Karpyshyn","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of International Relations and Diplomacy,Ternopil,UKRAINE"}]},{"given":"Natalia","family":"Zhuk","sequence":"additional","affiliation":[{"name":"National Academy of the Security Service of Ukraine,Department of Financial and Economic Security Educational and Scientific Humanitarian Institute,Kyiv,UKRAINE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/systems11020070"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/su12083326"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/risks11030060"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/en17051001"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.7249\/RR4287","article-title":"Relationships between the Economy and National Security; Analysis and Considerations for Economic Security Policy in the Netherlands","author":"Retter","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.58183\/pjps.03042022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.esr.2019.100409"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/acit58437.2023.10275672"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/en15020658"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/su15076072"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/en13102502"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/economies7030085"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.15611\/eada.2019.4.03"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/5584750"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/su14127387"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/su15097136"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8842770"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/su15032089"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/su12187692"},{"issue":"1","key":"ref20","article-title":"Statistical Modeling of Determinants Influencing Economic Security in the Context of Sustainable Development and National Security","volume-title":"Proceedings of International Conference on Applied Innovation in IT","volume":"12","author":"Kovalchuk"},{"key":"ref21","first-page":"96","article-title":"Economic Security in The State National Security System","author":"Hnatenko","year":"2020","journal-title":"Polish Political Science Yearbook"},{"key":"ref22","article-title":"Economic security parameters in the conditions of increasing information risks and threats","volume-title":"CEUR Workshop Proceedings, CPITS-II-2021: Cybersecurity Providing in Information and Telecommunication Systems","author":"Sunduk"},{"key":"ref23","article-title":"Measurement of economic insecurity in the European Union between 2005 and 2020","volume-title":"37th IARIW General Conference","author":"Mogyor\u00f3si"},{"key":"ref24","article-title":"Employment to Population Ratio","journal-title":"World Economics"},{"key":"ref25","volume-title":"The World Bank","year":"2024"},{"key":"ref26","article-title":"Wikipedia","year":"2024"},{"key":"ref27","article-title":"Investment as percent of GDP by country: the latest data","year":"2024","journal-title":"Trading Economics"},{"key":"ref28","article-title":"Net migration rate","journal-title":"The Word Factbook"},{"key":"ref29","article-title":"Resource Consumption by Country 2024","journal-title":"World Population Review"},{"key":"ref30","article-title":"Safety Index by Country 2023","year":"2023","journal-title":"Numbeo"},{"key":"ref31","article-title":"Countries Ranked by Safety","journal-title":"Wisevoter"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/economies11070182"},{"key":"ref33","article-title":"Human Development Index 2022","volume-title":"Human Development Report"},{"key":"ref34","article-title":"15 Must-Know Machine Learning Algorithms. A comprehensive guide for machine learning","author":"Y\u0131ld\u0131r\u0131m","year":"2021","journal-title":"Towards Data Science"},{"key":"ref35","volume-title":"RapidMiner Documentation","year":"2023"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.24425\/ijet.2023.144365"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.35774\/jee2022.03.242"}],"event":{"name":"2024 14th International Conference on Advanced Computer Information Technologies (ACIT)","location":"Ceske Budejovice, Czech Republic","start":{"date-parts":[[2024,9,19]]},"end":{"date-parts":[[2024,9,21]]}},"container-title":["2024 14th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10712446\/10712447\/10712462.pdf?arnumber=10712462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T05:36:49Z","timestamp":1729143409000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10712462\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,19]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/acit62333.2024.10712462","relation":{},"subject":[],"published":{"date-parts":[[2024,9,19]]}}}