Персона:
Леонов, Павел Юрьевич

Загружается...
Profile Picture
Email Address
Birth Date
Научные группы
Организационные подразделения
Организационная единица
Институт финансовых технологий и экономической безопасности
Институт финансовых технологий и экономической безопасности (ИФТЭБ) Национального исследовательского ядерного университета "МИФИ" готовит кадры в интересах национальной системы по противодействию легализации (отмыванию) доходов, полученных преступным путем, и финансированию терроризма (ПОД/ФТ). Междисциплинарность образования позволит выпускникам ИФТЭБ НИЯУ МИФИ легко адаптироваться на современном рынке труда и в бизнес-среде.
Статус
Фамилия
Леонов
Имя
Павел Юрьевич
Имя

Результаты поиска

Теперь показываю 1 - 10 из 18
  • Публикация
    Открытый доступ
    The use of artificial intelligence technology in the process of creating an ATM service model
    (2020) Leonov, P.; Sviridenko, A.; Leonova, E.; Epifanov, M.; Nikiforova, E.; Леонов, Павел Юрьевич; Епифанов, Михаил Александрович
    © 2020 The Authors. Published by Elsevier B.V.On the basis of the research of statistics on ATM operations with the technology of cash recycling, which contains records on collection, as well as on depositing and withdrawing cash, an analytical model has been developed to reduce the number of cash collection while ensuring a sufficient number of banknotes to meet the demand of the bank's customers in a timely manner.
  • Публикация
    Только метаданные
    A Bayesian Network-Based Model for Fraud Risk Assessment
    (2024) Leonov, P. Y.; Sushkov, V. M.; Stanislav V. Vishnevsky.; Romanovsky, V. A.; Леонов, Павел Юрьевич; Сушков, Виктор Михайлович; Романовский, Валентин Андреевич
  • Публикация
    Только метаданные
    Testing for Benford’s Law as a Response to the Risks of Material Misstatement Due to Fraud
    (2024) Sushkov, V. M.; Leonov, P. Y.; Сушков, Виктор Михайлович; Леонов, Павел Юрьевич
  • Публикация
    Открытый доступ
    Visual analysis in identifying a typical indicators of financial statements as an element of artificial intelligence technology in audit
    (2020) Leonova, E.; Leonov, P.; Kozhina, A.; Epifanov, M.; Sviridenko, A.; Леонов, Павел Юрьевич; Епифанов, Михаил Александрович
    © 2020 The Authors. Published by Elsevier B.V.The use of analytical tools on the example of specific financial statements by checking it for the signs of manipulating data elements has allowed us to expand the range of the most effective analytical procedures for assessing the organization's involvement in questionable transactions.
  • Публикация
    Только метаданные
    K-Means Method as a Tool of Big Data Analysis in Risk-Oriented Audit
    (2019) Suyts, V. P.; Leonov, P. Y.; Kotelyanets, O. S.; Ivanov, N. V.; Леонов, Павел Юрьевич
    © 2019, Springer Nature Switzerland AG.Considering the modern risk-oriented approach to auditing, environmental instability, as well as the lack of clear recommendations for conducting selective surveys, improving sampling methods is relevant, updating and new development of methodological tools for conducting selective audits are required; the article substantiates the use of the K-means method as a selective method for constructing an audit sample, special attention was paid to the professional judgment of the auditor and his need to apply K-means clustering.
  • Публикация
    Только метаданные
    Development of a Model for Identifying High-Risk Operations for AML/CFT Purposes
    (2019) Suyts, V. P.; Leonov, P. Y.; Kotelyanets, O. S.; Ivanov, N. V.; Леонов, Павел Юрьевич
    © 2019, Springer Nature Switzerland AG.The article has a high practical significance, which is that the described model of processing and clustering data on banking operations has significantly accelerated the process of identifying suspicious (high risk) among them and creating a portrait of a client of a credit institution based on its cashless payments (including his counterparties).
  • Публикация
    Только метаданные
    The main social engineering techniques aimed at hacking information systems
    (2021) Leonov, P. Y.; Vorobyev, A. V.; Ezhova, A. A.; Kotelyanets, O. S.; Zavalishina, A. K.; Morozov, N. V.; Леонов, Павел Юрьевич; Завалишина, Александра Константиновна; Морозов, Николай Владимирович
    © 2021 IEEE.This article examines the main methods of phishing (a type of online fraud in which an attacker wants to obtain authentication data from a victim) as a social engineering tool. Social engineering attack is the most common attack method used by attackers. Methods of social engineering aimed at hacking information systems are described in the article. Such phishing attacks as vishing (phishing with the implementation of a telephone conversation), smishing (carried out by scammers by sending SMS messages), spear phishing (aimed at a specific person or group of persons), whaling (aimed at the management of organizations), clone phishing (can be aimed at a large audience). These attacks expose confidential information and spread malicious software to victims' personal devices. The user (person) himself was identified as the most vulnerable element of the information security system, and social engineers are aimed at their rash actions. The phishing technique is the most widespread in the world practice for stealing the login-password combination; for its varieties, the basic schemes of interaction between the user and the attacker are described.
  • Публикация
    Открытый доступ
    Development of a trade model based on distributed ledger technology for the EAEU
    (2021) Melkonyan, S. E.; Galoyan, N. A.; Norkina, A. N.; Leonov, P. Y.; Мелконян, Сережа Ервандович; Галоян, Натали Альбертовна; Норкина, Анна Николаевна; Леонов, Павел Юрьевич
    © 2020 Elsevier B.V.. All rights reserved.The article reveals problems in the trade between EAEU countries, proposing the solution. Such processes as globalization and digitalization are caused by the technological advance influencing trade among EAEU countries. Some of the problems have been identified relatively recently, and some have been discovered long time ago, however, they have not found a proper solution. The existing shortcomings in the activities of the EAEU pose a significant threat to the security of the member States. The authors of the article stress the solution to the current problems faced by members of EAEU, offering the implementation of blockchain technologies. New model of trading platform, from the authors' stand point, will allow member States to solve current problems and to prevent illegal actions.
  • Публикация
    Открытый доступ
    Formation of transfer pricing risk management competencies as an integral element of training specialists in economic security
    (2021) Leonov, P. Y.; Bolot, A.; Norkina, A. N.; Леонов, Павел Юрьевич; Норкина, Анна Николаевна
    © 2020 Elsevier B.V.. All rights reserved.The article discusses the following competencies, should have a specialist in economic security. Today, it is important for an economic security specialist to develop professional skills in the field of transfer pricing risk management. In this regard, analytical competences are of particular relevance. The proposed competencies form the knowledge and skills of future specialists. Among the necessary requirements for specialists are established: the ability to apply analytical knowledge in various fields; identify, suppress and investigate offenses related to the economic sphere; collect, document and analyze information related to economic security. The development of these skills allows, among other things, to strengthen control over the establishment of transfer prices and to make the economic security of the state more stable.
  • Публикация
    Только метаданные
    Developing a Tool to Analyze the Use of Social Media to Identify New Types of Digital Financial Assets
    (2022) Leonov, P. Y.; Mikheeva, A. V.; Elkina, D. Y.; Musin, N. M.; Norkina, A. N.; Леонов, Павел Юрьевич; Елкина, Дарья Юрьевна; Норкина, Анна Николаевна
    This article examines the created method of identifying new digital financial assets in the Telegram social network. The importance and relevance of this topic is due to both a noticeable increase in the number of users of social networks and an increase in public interest in digital financial assets and digital currencies, especially cryptocurrencies. The object of the study is the popular Telegram messenger's channels about the cryptocurrency. The main part of the article describes the developed algorithm consisting of four main steps, such as Data Collection, Pre-processing the received data, Analyzing the data obtained, Results interpretation. Python is chosen as the software for the implementation of the algorithm. In addition, the authors demonstrate the carrying out of the created algorithm in practice using the example Bitcoin and Ethereum. In the result, the developed tools allow an analyst to pay attention to a specific cryptocurrency in time, which is often mentioned in the Telegram messenger in order to prevent possible operations of money laundering and terrorist financing. © 2022 IEEE.