=Paper= {{Paper |id=Vol-2917/paper46 |storemode=property |title=Economic Crime Detection Using Support Vector Machine Classification |pdfUrl=https://ceur-ws.org/Vol-2917/paper46.pdf |volume=Vol-2917 |authors=Andriy Krysovatyy,Hrystyna Lipyanina-Goncharenko,Svitlana Sachenko,Oksana Desyatnyuk |dblpUrl=https://dblp.org/rec/conf/momlet/KrysovatyyLSD21 }} ==Economic Crime Detection Using Support Vector Machine Classification== https://ceur-ws.org/Vol-2917/paper46.pdf
Economic Crime Detection Using Support Vector Machine
Classification
Andriy Krysovatyy, Hrystyna Lipyanina-Goncharenko, Svitlana Sachenko and Oksana
Desyatnyuk
 West Ukrainian National University, Lvivska Str., 11, Ternopil, 46000, Ukraine

                Abstract.
                Fictitious business – is the creation or acquisition of business entities in order to cover up illegal
                activities or activities that are prohibited. Investigation of economic crime takes a lot of time
                for law enforcement officers, so in this regard, the development of an algorithm for detecting
                a fictitious enterprise based on the classic method of machine learning, namely Support Vector
                Machine Classification, will develop a single software environment for rapid detection of
                economic crimes. To build the method, data from 1,100 companies operating in Ukraine were
                used. The data presented in in the set logical binary values are from 355 fictitious enterprises.
                Modeling of the Support Vector Machine was performed by 3 approaches: linear, polynomial
                and radial. The best results are obtained from classification by polynomial approach. The
                training sample showed evaluation results at 100%, and the test sample showed evaluation at
                99.7%. Also, the confusion matrix showed quite good results.

                Keywords 1
                fictitious enterprises, business entities, classification, machine learning, Support Vector
                Machine Classification.

1. Introduction
    A fictitious enterprise in Ukraine should be understood the following: a business entity that is
registered in violation of the established procedure (legal norms) of registration with state bodies, the
constituent documents of which do not comply with applicable law, or to carry out activities contrary
to law or constituent documents, or violation of the procedure for tax accounting and deadlines for filing
tax returns and financial statements, or violation of the deadlines for submission of information to
government agencies about the change of name, organizational form, form of ownership and location
[1].
    The main reasons for the emergence and existence of economic crime and fictitious entrepreneurship
are: imperfection of legislation governing economic activity, high levels of corruption, bondage of
taxes, control of corrupt individuals in major industries, low professional level of law enforcement
officers in detecting, documenting, investigating these crimes.
    However, the investigation of economic crime often takes a lot of time for law enforcement officers,
so in this regard, the development of an algorithm for detecting a fictitious enterprise based on the
classical method of machine learning, namely Support Vector Machine Classification, will develop a
single software environment that is one of the most promising areas for the rapid detection of economic
crimes.
    This article is devoted to this topic, the rest of which is distributed as follows. Section 2 discusses
the analysis of related work; section 3 presents the algorithm for detecting a fictitious enterprise based


MoMLeT+DS 2021: 3rd International Workshop on Modern Machine Learning Technologies and Data Science, June 5, 2021, Lviv-Shatsk,
Ukraine
EMAIL: rektor@wunu.edu.ua (A. Krysovatyy); xrustya.com@gmail.com (H. Lipyanina-Goncharenko); s_sachenko@yahoo.com (S.
Sachenko); o.desyatnyuk@wunu.edu.ua (O. Desyatnyuk)
ORCID: 0000-0002-5850-8224 (A. Krysovatyy); 0000-0002-2441-6292 (H. Lipyanina-Goncharenko); 0000-0001-8225-1820 (S. Sachenko);
0000-0002-1384-4240 (O. Desyatnyuk)
             ©️ 2021 Copyright for this paper by its authors.
             Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
             CEUR Workshop Proceedings (CEUR-WS.org)
on Support Vector Machine Classification; in section 4 the implementation of the algorithm itself.
Section 5 presents the conclusions of the study.

2. Related work
   Paper [3] forms the basis for the analysis of the interaction of legal and illegal entities: the definition
of the terms “international crime” and “cross-border crime”; separates for analytical purposes
“enterprise crime” from “political crime”. Organized crime focuses on the “model” of the enterprise,
which is really [4] an approach to the study of organized crime, based on the idea that legal and illegal
business are quite similar. Based on the paradigm of organized crime, paper [5] presents the concept of
criminal entrepreneurship, the work developed a research model that links the degree of
entrepreneurship with the stage of organized crime growth. The article [6] has the application of known
theories of organized crime, such as agency theory, alliance theory, network theory, resource-based
theory and other organizational theories to shed light on criminal organizations. Theoretical and applied
aspects of the impact of criminal activity on the economic security of business structures have been
studied [7]; the structural and dynamic tendency of the main threats to the economic security of
enterprises on the basis of the application of integrated assessment depending on partial indicators is
studied; the peculiarities of the multi-vector mechanism of counteracting crime with the help of
economic security of enterprises are substantiated as the base of measures set choosing.
   The study [8] considered the measure of corporate tax evasion, which reduces both financial and
taxable income, which is called tax evasion. Simulation analyzes, transformations of US LIFO / FIFO
inventory methods, and samples from private and public firms are used to confirm the results. The
results indicate that the measure of compliance with tax avoidance successfully records transactions
that comply with the accounting tax. As expected, it was found that the degree of participation of state-
owned firms in compliance with tax evasion systematically changes depending on the pressure on the
capital market.
   It has been studied [2] as illegal mining, which is very common in Colombia, to overcome the
problem of measuring illegal activity, a new data set has been built using machine learning methods on
the satellite images functions. The study [9] listed opportunities in the virtual environment through ICT,
such as FinTrack software, etc. to prevent financial crime. Face recognition plays a central role in many
security programs [10], which are used to establish a huge system of social credit to control the entire
population.
   A generalized structure of a high-performance adaptive system for detecting cyberattacks based on
neural networks and artificial immune systems has been developed [15, 28]. Various data from machine
learning technologies applied to crime data to monitor the impact of the economic crisis on crime in
India have been investigated in [16]. Possibilities of detailed study of data from huge repositories,
analysis of various socio-economic factors related to crime incidents, detection of deviations,
classification of patterns and development of effective computational models for crime prediction using
data analysis and machine learning have been studied [17]. The proposed [18] system is tested for the
problem of predicting crimes using data, and experimental results show that the proposed system
provides better results and search for possible solutions and patterns of crime. The experiment [19-21]
collected data on the crime scenario from the police, which were then simulated on the data set using
machine learning algorithms to predict some attributes.
   The researches [11, 23, 24] present a modern, structured and well-organized review of one-class
support classifiers. The study [12] used the methods of vector support machines (SVM) and neural
networks, where the SVM model received the highest efficiency among the classifiers for each data set.
Research [13] provides an understanding of the use of stochastic gradient descent algorithms for large
data applications, for example, to accelerate SVM or controlled regression on a large scale, or to
increase the effectiveness of online learning or real-time forecasting (control). [22, 29] proposed an
approach to machine learning for crime detection and crime location, through Twitter posts and vector-
based filtering to eliminate noise.
   It should be noted that the above-mentioned works do not describe the detection of fictitious
enterprises with the help of information technology. Accordingly, the aim of this article is to develop a
method of detecting a fictitious enterprise based on Support Vector Machine Classification, which will
further develop a software environment for public sector employees to prevent economic crimes and
quickly track fictitious enterprises.
   There are several close analogues to the purpose of the study [5, 6, 17], which analyze the applied
area, but they do not investigate the use of information technology in this matter and further software
development.

3. Materials and methods
     The above-described factors in the study lead to mass shadowing of the Ukrainian economy [30].
Accordingly, there is an urgent need to develop special state programs to combat crime in the economic
sphere (public procurement, use of state budget funds, taxation of economic entities, works, services at
the expense of the state budget, etc.), certain areas of the national economy.
     In order to properly organize the activities of law enforcement agencies to detect, promptly verify
and investigate crimes committed using the capabilities of economic entities with signs of fictitiousness,
it is necessary to determine their characteristics and features of the content of criminal activity and types
of such entities. In such case the developed method may be used (Fig. 1.) to identify a fictitious
enterprise on the basis of Support Vector Machine Classification, which will allow to quickly make
decisions about the performance of an individual enterprise.
                                      Request to identify a fictitious enterprise 1



                               User data entry: ID,           2                 Data collection:
                               Company, Address,                                                        3
                                                                    EDR, P, PO, K, VKK, L, K205, ZMI, ZD,
                             FAddress1 Faddressn,
                               KVEDPIPKER1                           TovZ, SP, A, E, F, AR, ZR, KR, LB,
                                PIPKERn, Foto                                  NM, NS, FR, FC


                                       Comparison of parameters:           4
                          FR, Address, FAddress1      FAddressn -> Foto = FF,
                                                                                                    Internet:
                                           A->SP = A&SP
                                                                                                  relevant data
                                                                                                     sources
                                                          5
                                           Storage base           Conversion to binary values6



                                                       Adding -> Fit               7
          Print: Count, mean, std,         and assigning it 0 if the enterprise is
          min, 25%, 50%, 75%,                     fictitious, otherwise 1
          max
                                            Output of statistical indicators and   8
          Plot: Density                        visualization of parameters

                                                                                   9             Test sample      10
                                         Division of data into two groups: training
                                                   set 80%, test set 20%


                                      Support Vector Machine Classification :                                  11

                   -linear approach
                   - polynomial approach
                   - radial approach

         Print: accuracy
                                                                              12
                                                Evaluation of each model based
         Plot: boxplot алгоритм                        on a test sample
         порівняння


Figure 1: Schematic representation of the fictitious enterprise detection method based on Support
Vector Machine Classification
    At the first stage (block 1) the user needs to submit a request to identify a fictitious enterprise.
    To build a method based on Support Vector Machine Classification, it is first needed to obtain a set
of data on which the Support Vector Machine Classification algorithm will be formed. In future research
it is planned to develop ready-made software. Accordingly, the required data to be entered (block 2)
directly by the user into the system (Table 1): company code (generated automatically in the system),
legal address, physical address, codes of economic activities, names of managers (maybe several),
photos of equipment with geolocation. All these parameters can be supplemented with new ones and
generalize the existing ones, the algorithm is easily adapted.
    Based on the data entered by the user, the analysis of the following parameters (Table 2) (block 3)
and search for appropriate values from sources of information created using the appropriate API and
photo processing method of pattern recognition, which is the purpose of further research.

Table 1.
User-entered data
 Parameter                         Name                                                Data type
 ID                                Company code                                        int64
 Company                           The company name                                    object
 Address                           Legal address                                       object
 FAddress1,… FAddressn             Physical address                                    object
 KVED                              Code of economic activity                           object
 PIPKER1,… PIPKERn                 Surnames of managers                                object
 Foto                              Photo of equipment with geolocation                 object.jpg

Table 2.
Data collection on open data of Ukraine
  Para-                          Explanation                         Data
                                                                                    Data source
  meter                                                              type
 ID        Company code                                             int64
 fit       Determining the fictitiousness of the enterprise.        bool
 EDR       Availability of a register of legal entities and         bool    https://usr.minjust.gov.ua/
           individuals in a single database
 P         Availability of VAT, SSC and a single tax in the         bool    https://cabinet.sfs.gov.ua/c
           database                                                         abinet/faces/public/reestr.j
                                                                            spx
 PO       Carrying out timely payment of taxes                      bool    https://cabinet.sfs.gov.ua/c
                                                                            abinet/faces/public/reestr.j
                                                                            spx
 K        Availability of settlements with co-agents                bool    https://youcontrol.com.ua/
                                                                            landing_002/
 VKK      Information on the presence of company executives bool            https://public.nazk.gov.ua/
          in the state register of declarations
 L        Availability of licenses in accordance with the NACE bool         http://irc.gov.ua/ua/Poshu
                                                                            k-v-YeLR.html
 K205     The presence of criminal cases under Art. 205 of the bool         http://www.reyestr.court.g
          Criminal Code of Ukraine                                          ov.ua/
 ZMI      Presence of mentions of company executives with bool              http://dzmi.informjust.ua/
          keywords: criminal case, corruption, offshore
          accounts, etc.
 ZD       Availability of land at the legal or physical address bool        http://map.land.gov.ua/kad
                                                                            astrova-karta
 TovZ     Availability of registered trademarks and services, bool          http://www.uipv.org/ua/ba
          database of industrial marks, database of inventions              ses2.html
          and other databases of the Institute of Industrial
          Property of Ukraine
 SP       Availability of issued motor third party insurance bool           https://mail.mtibu.kiev.ua/
          policies, MTIBU policy check, motor third party                   Login.aspx?ReturnUrl=/Cbd
          database, search by state car number, check of the                /MTSBU_Pages/Tree.aspx
 Para-                           Explanation                          Data
                                                                                       Data source
 meter                                                                type
           status of the Green Card policy for cars owned by the
           company
 A         The presence of cars and their owners issued to the bool           https://igov.org.ua/service/
           company.                                                           1397/general
 A&SP      Coincidence of registered cars with insurance policies bool
 E         Availability in the database of exporters              bool        http://ukrexport.gov.ua/rus
                                                                              /ukr_export_exporters/?co
                                                                              untry=ukr
 F         Availability in the stock market database                  bool    http://www.nssmc.gov.ua/f
                                                                              und/registers
 AR        The presence of cars and their owners registered for       bool    http://wanted.mvs.gov.ua/
           the company is wanted                                              searchtransport/
 ZR        The presence of weapons of the owners of the               bool    http://wanted.mvs.gov.ua/
           company is wanted                                                  searchorj/
 KR        The presence of cultural values of the owners of the       bool    http://wanted.mvs.gov.ua/
           company is wanted                                                  searchart/
 LB        Availability of building licenses in the company           bool    http://dabi.gov.ua/license/l
                                                                              ist.php
 NM        The presence of real estate in the company                 bool    https://kap.minjust.gov.ua/
                                                                              services?keywords=&produ
                                                                              ct_id=1&usertype
 NS        Availability of the company's website               bool           www.google.com
 FR        Availability of equipment, recognition of equipment bool           Photo of equipment with
           by the available photo and determination of                        geolocation
           compliance of geolocation with the production
           address
 FC        Availability of the company's social networks and bool             Facebook.com
           affiliates

    Next, a comparison of data (block 4) with each other, namely: FR with Foto, to determine whether
the geolocation coincides with one of the addresses of the company and whether the photo shows the
relevant equipment; SP with A to check whether the registered car companies match the insurance
policies.
    Then all the data are transferred to the storage database (block 5) after which the data is converted
into binary values (block 6).
    Add the fit parameter (block 7), which shows the value relative to whether the company is fictitious
or not. Of course, machine learning algorithms operate on numerical values, so we assign the
corresponding discrete values 0 or 1.
    It is needed always display the basic statistical characteristics of each numerical feature to verify
that all data are displayed correctly. Accordingly, we display (block 8): the number of values, the
average value, the minimal and maximal values. The std line shows the standard deviation (which
measures how scattered the values are). 25%, 50% and 75% of the rows show the corresponding
percentages of values in the corresponding parameter. With the correct visualization of the data, it is
clear trends and patterns, the ratio of variables, which allows very well notice the trends in the figures.
Therefore, graphs of data density are also displayed.
    Before data investigation based on machine learning, one of the most important steps should be to
distribute the data (block 9). The data are divided into two groups: training set 80%, test set 20%. The
training kit should be used to build machine learning models. The test kit (block 10) should be used to
see how well the model works on unfamiliar data.
    Next, we classify the data using the method of the classical method of machine learning Support
Vector Machine Classification (block 11) [25, 26]. For the purpose of fictitious enterprises selection, it
is necessary to solve the problem of binary classification. Initially, the algorithm is trained on objects
(block 10) from the training sample, for which the class labels are known in advance. Next, the already
learned algorithm predicts the class label for each object from the deferred test sample. Class labels can
take the values 𝑌 = {−1, +1}.Object – is a vector with N signs х= (х1 , х2 , … , х𝑛 ) in the 𝑅n space.
When learning, the algorithm must construct a simple function 𝐹(𝑥) = 𝑦, where the argument 𝑥 is an
object from the 𝑅n space and gives a label of class i. The main goal of Support Vector Machine (SVM)
as a classifier is to find the equation that divides the hyperplane [14] 𝑤1 𝑥1 + 𝑤2 𝑥2 + ⋯ + 𝑤𝑛 𝑥𝑛 +
𝑤0 = 0 in 𝑅n space, which would divide the two classes optimally. General view of the transformation
𝐹 of an object 𝑥 into a label of class 𝑌: 𝐹(𝑥) = 𝑠𝑖𝑔𝑛(𝑤 𝑇𝑥 − 𝑏). And denote 𝑤 =
 (𝑤1 , 𝑤2 , … , 𝑤𝑛 ), 𝑏 = −𝑤0. After adjusting the weights of the algorithm 𝑤 and 𝑏 w and b, all objects
that fall on one side of the constructed hyperplane will be defined as the first class, and objects that fall
on the other side – the second class. Inside the function 𝑠𝑖𝑔𝑛() is a linear combination of object features
with algorithm weights, that is why SVM refers to linear algorithms. The hyperplane partition can be
constructed in different ways, but in SVM the weights 𝑤 and 𝑏 are adjusted so that the class objects lie
as far as possible from the hyperplane distribution. In other words, the algorithm maximizes the gap
(Margin) between the hyperplane and the objects of the classes that are closest to it (Fig. 2). Such objects
are called reference vectors. If we consider the positive and negative sides of SVM, the positive thing
is that: SVM works well with a space of features of large size, with data of small volume; SVM
maximizes the separation of the hyperplane and objects, which reduces the number of classification
errors; also, the algorithm is reduced to solving the problem of quadratic programming in the 3D
domain, which makes it possible to divide the hyperplane with certain hyperparameters of the
algorithm. The disadvantages of this method include the fact that: it takes a long time to learn, especially
for large data sets; instability to noise.




                          Support vector




Figure 2: Classification hyperplane of SVM

    Support Vector Machine should be carried out in three main approaches: linear, polynomial and
radial approaches. Also, it is necessary to display the Confusion Matrix. The confusion matrix is
deciphered as follows:
    •   The target variable has two values: Positive or Negative;
    •   These columns are the actual values of the target variable;
    •   These strings represent the predicted values of the target variable.
    Next, we evaluate the model (block 12) based on the classical method of machine learning Support
Vector Machine, which can be quite complex. Usually, the model is estimated on the basis of the error
rate. However, this method is not very reliable, because the accuracy obtained for one test set can be
very different from the accuracy obtained for another test set. The key to a fair comparison of machine
learning algorithms is to ensure that each algorithm is evaluated equally on the same data.
4. Experimental results and discussion
    Python was chosen as programming language, as this programming language works best with
machine-based data analysis. The following libraries were used for analysis: pandas, numpy,
train_test_split, SVC and cross_val_score.
    To build the method, data from 1,100 companies operating in Ukraine were used. The data are
presented in logical binary values (Fig. 3.). There are 355 fictitious enterprises in the set (Fig. 4).




 Figure 3: Data structure                            Figure 4: The number of fictitious enterprises in
                                                     the set

   The degree of dependence between the indicators with the definition of a fictitious enterprise is
presented in the form of a correlation matrix (Fig. 5). The matrix shows that the fit indicator has a low
correlation with other parameters, so it is difficult to clearly determine the dependence on individual
parameters of whether the company is conducting economic crime or not. Therefore, it is advisable to
use machine learning algorithms that will more accurately determine economic crime. To do this,
modeling using the method of classical machine learning Support Vector Machine.




Figure 5: Correlation matrix
    Modeling of the Support Vector Machine was performed by 3 approaches: linear (Fig. 6),
polynomial (Fig. 7) and radial (Fig. 8). Other approaches also exist, but are used less frequent.
    We will first consider the linear approach (Fig. 6), the evaluation of the simulation was performed
on a test sample and training. The training sample showed evaluation results at 98.05%, and the test
sample showed evaluation at 97.88%. The standard deviation is 98% for both samples.
    An important result is the Confusion Matrix. The different values of the Confusion matrix will be as
follows for the training sample:
    •    True positive (TP) = 143; this means that 143 indicators of positive class data are correctly
    classified by the model;
    •    True negative (TN) = 612; this means that 612 data points of negative class were correctly
    classified by the model;
    •    False positive (FP) = 15; this means that 15 indicators of negative class data were incorrectly
    classified as models belonging to the positive class;
    •    False negative (FN) = 0; this means that 0 data indicators of the positive class were incorrectly
    classified as models belonging to the negative class.
    For the test calibration, the confusion matrix shows that 158 and 268 indicators of correctly defined
positive and negative class, respectively, 7 indicators of incorrectly defined negative class and 0
indicators of data of positive class were incorrect.




Figure 6: Simulation Support Vector Machine linear approach

    Next, consider the polynomial approach (Fig. 7). The training sample showed evaluation results at
100%, and the test sample showed evaluation at 99.7%. The standard deviation is close to 100% for
both samples. For the training calibration, the confusion matrix shows that 158 and 612 indicators of
correctly defined positive and negative class, respectively, and 0 indicators are incorrectly defined. In
the test sample, the confusion matrix showed that 61 and 268 indicators were defined correctly in the
positive and negative classes, respectively, and 1 indicator was determined incorrectly.
    The last approach is radial (Fig. 8), which showed not very good results. The training sample showed
evaluation results at 79.8%, and the test sample showed evaluation at 81.21%. The standard deviation
is close to 80% for both samples. For the training calibration, the confusion matrix shows that 158
indicators are incorrectly defined, 612 indicators are correctly defined and 0 indicators are defined
correctly and incorrectly. In the test sample, the confusion matrix showed that 268 indicators were
defined correctly, but 62 indicators were determined incorrectly.
Figure 7: Modeling Support Vector Machine by polynomial approach




Figure 8: Simulation of Support Vector Machine radial approach

   When considering 3 approaches of the Support Vector Machine, the best results are obtained when
classifying by the polynomial approach. The training sample showed evaluation results at 100%, and
the test sample showed evaluation at 99.7%. Also, the confusion matrix showed quite good results.
   Thus, returning to the analogues discussed above [5, 6, 17], the developed method makes it possible
to develop a single software environment for public sector employees to prevent economic crimes and
quickly track fictitious enterprises.

5. Conclusions
   A method of detecting a fictitious enterprise based on the Support Vector Machine is proposed,
which allows to quickly track fictitious enterprises, which is useful for public sector employees to
prevent economic crimes.
    The developed method is implemented on the basis of data of 1100 companies that conducted
economic activity in Ukraine and 355 of which were defined as fictitious. The results of experimental
studies showed that when considering 3 approaches of the Support Vector Machine, the best results
were obtained when classifying the polynomial approach, where the training sample showed evaluation
results at 100%, and the test sample showed evaluation at 99.7%. The confusion matrix for the training
set shows that 158 and 612 indicators of correctly defined positive and negative class, respectively, and
0 indicators are incorrectly defined. In the test sample, the confusion matrix showed that 61 and 268
indicators were defined correctly in the positive and negative classes, respectively, and 1 indicator was
determined incorrectly.
    In further scientific research it is planned to conduct a more detailed analysis of the detection of
fictitious enterprises based on the methods: Gaussian Naive Bayes, Logistic Regression.

6. References
[1] Yu. Piliukov, Ю. Fictitious entrepreneurship in Ukraine. The concept and connection with other
     economic crimes. Actual problems of jurisprudence, 1 (2019): 140-144. (in Ukrainian)
[2] S. Saavedra, & M. Romero, Local incentives and national tax evasion: The response of illegal
     mining to a tax reform in Colombia, SIEPR Discussion Paper No. 17-009, Stanford Institute for
     Economic Policy Research, (2017). https://siepr.stanford.edu/sites/default/files/publications/17-
     009_0.pdf.
[3] N. Passas, Cross-border crime and the interface between legal and illegal actors, Security Journal
     16 (2003) 19–37. doi:10.1057/palgrave.sj.8340123.
[4] D. Liddick, The enterprise “model” of organized crime: Assessing theoretical propositions, Justice
     Quarterly 16 (1999) 403–430. doi:10.1080/07418829900094191.
[5] P. Gottschalk, Illegal entrepreneurialism as determinant of organised business crime maturity,
     International Journal of Business and Systems Research 3 (2009) 297. doi:
     10.1504/ijbsr.2009.026185.
[6] P. Gottschalk, How criminal organisations work: Some theoretical perspectives, The Police
     Journal: Theory, Practice and Principles 81 (2008) 46–61. doi: 10.1350/pojo.2008.81.1.400.
[7] O. Vivchar, The influence of crime activity on economic security of enterprise structures in post-
     conflict conditions: identification of threats and mechanisms of antiaction, Actual Problems of
     Law, 1 (2019) 113-119. (in Ukrainian) doi: 10.35774/app2019.01.113.
[8] B. Badertscher, S. Katz, S. O. Rego, & R. J. Wilson, Conforming tax avoidance and capital market
     pressure, The Accounting Review 94 (2019) 1-30. doi: 10.2308/accr-52359.
[9] K. Olowu, & P. Gabasa, Financial crime, ICT & E-governance: Libraries role, Advances in Social
     Sciences Research Journal 7 (2020) 609-612. https://doi.org/10.14738/assrj.71.7476.
[10] R.T. Kreutzer, M. Sirrenberg, Fields of application of artificial intelligence – Security sector and
     military sector, in: Understanding Artificial Intelligence. Management for Professionals, Springer,
     Cham, 2020, pp. 225-233. https://doi.org/10.1007/978-3-030-25271-7_9.
[11] S. Alam, S. K. Sonbhadra, S. Agarwal, & P. Nagabhushan, One-class support vector classifiers: A
     survey, Knowledge-Based Systems, (2020) 105754. doi: 10.1016/j.knosys.2020.105754.
[12] N. L. Costa, L. A. G. Llobodanin, I. A. Castro, & R. Barbosa, Using support vector machines and
     neural networks to classify Merlot wines from South America, Information Processing in
     Agriculture 6 (2018) 265-278. doi: 10.1016/j.inpa.2018.10.003.
[13] W. He, & Y. Liu, To regularize or not: Revisiting SGD with simple algorithms and experimental
     studies, Expert Systems with Applications 112 (2018) 1–14. doi: 10.1016/j.eswa.2018.06.026.
[14] A. Blumer, A. Ehrenfeucht, D. Haussler, & M. K. Warmuth, Learnability and the Vapnik-
     Chervonenkis dimension, Journal of the ACM 36 (1989) 929–965. doi: 10.1145/76359.76371.
[15] Komar, M., Golovko, V., Sachenko, A., Bezobrazov, S. Intelligent system for detection of
     networking intrusion. Proceedings of the 6th IEEE International Conference on Intelligent Data
     Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS'2011, pp.
     374-377
[16] Komar, M., Kochan, V., Dubchak, L., Sachenko, A., Golovko, V., Bezobrazov, S., Romanets, I.
     High performance adaptive system for cyber attacks detection, in: Proceedings of the 2017 9th
     IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems:
     Technology and Applications (IDAACS) (2017) 853-858. doi: 10.1109/IDAACS.2017.8095208.
[17] M. Mittal, L.M. Goyal, J.K. Sethi, et al., Monitoring the impact of economic crisis on crime in
     India      using     machine      learning,    Comput      Econ     53     (2019)      1467–1485.
     https://doi.org/10.1007/s10614-018-9821-x.
[18] P. Saravanan, J. Selvaprabu, L. Arun Raj, A. Abdul Azeez Khan, K. Javubar Sathick, Survey on
     crime analysis and prediction using data mining and machine learning techniques, in: N. Zhou, S.
     Hemamalini (Eds.), Advances in Smart Grid Technology, volume 688 of Lecture Notes in
     Electrical Engineering, Springer, Singapore, (2021) 435-448. doi: 10.1007/978-981-15-7241-
     8_31.
[19] R. Kumar, B. Nagpal, Analysis and prediction of crime patterns using big data, Int. J. Inf. Tecnol.
     11 (2019) 799–805. https://doi.org/10.1007/s41870-018-0260-7.
[20] A. A. Biswas and S. Basak, Forecasting the trends and patterns of crime in Bangladesh using
     machine learning model, in: Proceedings of the 2019 2nd IEEE International Conference on
     Intelligent Communication and Computational Techniques (ICCT) (2019) 114-118. doi:
     10.1109/ICCT46177.2019.8969031.
[21] L. G. Alves, H. V. Ribeiro, & F. A. Rodrigues, Crime prediction through urban metrics and
     statistical learning, Physica A: Statistical Mechanics and its Applications 505 (2018) 435-443.
     https://doi.org/10.1016/j.physa.2018.03.084
[22] S. Kim, P. Joshi, P. S. Kalsi and P. Taheri, Crime analysis through machine learning, in:
     Proceedings of the 2018 IEEE 9th Annual Information Technology, Electronics and Mobile
     Communication Conference (IEMCON) (2018) 415-420. doi: 10.1109/IEMCON.2018.8614828.
[23] S. P. C. W. Sandagiri, B. T. G. S. Kumara and B. Kuhaneswaran, Detecting crimes related Twitter
     posts using SVM based two stages filtering, in: Proceedings of the 2020 IEEE 15th International
     Conference on Industrial and Information Systems (ICIIS) (2020) 506-510. doi:
     10.1109/ICIIS51140.2020.9342698.
[24] H. Lipyanina, V. Maksymovych, A. Sachenko, T. Lendyuk, A. Fomenko, I. Kit, Assessing the
     investment risk of virtual IT company based on machine learning, in: S. Babichev, D. Peleshko,
     O. Vynokurova (Eds.), Data Stream Mining & Processing, DSMP 2020, volume 1158 of
     Communications in Computer and Information Science, Springer, Cham, (2020) 167-187. doi:
     10.1007/978-3-030-61656-4_11.
[25] R. Gramyak, H. Lipyanina-Goncharenko, A. Sachenko, T. Lendyuk, and D. Zahorodnia,
     Intelligent method of a competitive product choosing based on the emotional feedbacks coloring,
     in: Proceedings of the 2nd International Workshop on Intelligent Information Technologies &
     Systems of Information Security with CEUR-WS (IntelITSIS 2021), Khmelnytskyi, Ukraine,
     March 24–26 2853 (2021) 346-357. http://ceur-ws.org/Vol-2853/paper31.pdf
 [26] Cherrat, E. M., Alaoui, R., & Bouzahir, H. SCORE FUSION OF FINGER VEIN AND FACE
     FOR HUMAN RECOGNITION BASED ON CONVOLUTIONAL NEURAL NETWORK
     MODEL.          International     Journal     of     Computing,      19(1)     (2020)        11-19.
     https://doi.org/10.47839/ijc.19.1.1688
 [27] Jonaitis, D., Raudonis, V., & Lipnickas, A. APPLICATION OF NUMERICAL
     INTELLIGENCE METHODS FOR THE AUTOMATIC QUALITY GRADING OF AN
     EMBRYO DEVELOPMENT. International Journal of Computing, 15(3) (2016) 177-183.
     https://doi.org/10.47839/ijc.15.3.850
 [28] Golovko, V., Komar, M., Sachenko, A. Principles of neural network artificial immune system
     design to detect attacks on computers. Modern Problems of Radio Engineering,
     Telecommunications and Computer Science - Proceedings of the 10th International Conference,
     TCSET'2010, 237
     Lipyanina, H., Sachenko, A., Lendyuk, T., Nadvynychny, S., Grodskyi, S. Decision tree based
     targeting model of customer interaction with business page. CEUR Workshop Proceedings 2608
     (2020) 1001-1012
 [29] Gozhyj, A., Kalinina, I., Vysotska, V., Sachenko, S., Kovalchuk, R. Qualitative and quantitative
     characteristics analysis for information security risk assessment in e-commerce systems. CEUR
     Workshop Proceedings, 2762 (2020) 177–190