Skip to content
KC KB
  • About the project
    • Náš tím
    • Informácia o konaní aktivít
  • Aktivity
    • Teachers
      • Information security needs to be lived
    • Summer school of cybercriminality
      • Letná škola kyberkriminality 2025
      • Summer School of Cybercriminality 2024
    • CyberSecurityDay
      • CyberSecurityDay 2025 (Rožňava)
      • Jarný CyberSecurityDay 2025
      • Jesenný CyberSecurityDay 2024
      • Summer CyberSecurityDay 2024
      • CyberSecurityDay 2023
      • CyberSecurityDay 2022
  • Education
    • Verejná správa
      • Vzdelávanie verejná správa – laik, odborný zamestnanec, manažér
      • Vzdelávanie verejná správa – informatik, zamestnanec v KB
    • Verejnosť
      • Vzdelávací portál
    • Študenti SŠ
      • KyberTímy
      • Prednášky pre SŠ
    • Študenti VŠ
      • Študijný program AIm – KB
      • Predmety
      • Záverečné práce
  • sk_SKSK
  • Toggle website search
Menu Close
  • About the project
    • Náš tím
    • Informácia o konaní aktivít
  • Aktivity
    • Teachers
      • Information security needs to be lived
    • Summer school of cybercriminality
      • Letná škola kyberkriminality 2025
      • Summer School of Cybercriminality 2024
    • CyberSecurityDay
      • CyberSecurityDay 2025 (Rožňava)
      • Jarný CyberSecurityDay 2025
      • Jesenný CyberSecurityDay 2024
      • Summer CyberSecurityDay 2024
      • CyberSecurityDay 2023
      • CyberSecurityDay 2022
  • Education
    • Verejná správa
      • Vzdelávanie verejná správa – laik, odborný zamestnanec, manažér
      • Vzdelávanie verejná správa – informatik, zamestnanec v KB
    • Verejnosť
      • Vzdelávací portál
    • Študenti SŠ
      • KyberTímy
      • Prednášky pre SŠ
    • Študenti VŠ
      • Študijný program AIm – KB
      • Predmety
      • Záverečné práce
  • sk_SKSK
  • Toggle website search
Read more about the article Classification of malicious emails

Classification of malicious emails

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingClassification of malicious emails
Read more about the article Real-time processing of cybersecurity system data for attacker profiling

Real-time processing of cybersecurity system data for attacker profiling

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingReal-time processing of cybersecurity system data for attacker profiling
Read more about the article A Secure String Class Compliant with PCI DSS

A Secure String Class Compliant with PCI DSS

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingA Secure String Class Compliant with PCI DSS
Read more about the article Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths

Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingExpert Knowledge Elicitation for Skill Level Categorization of Attack Paths
Read more about the article Evaluation of Attacker Skill Level for Multi-stage Attacks

Evaluation of Attacker Skill Level for Multi-stage Attacks

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingEvaluation of Attacker Skill Level for Multi-stage Attacks
Read more about the article Multi-stage Cyber-Attacks Detection in the Industrial Control Systems

Multi-stage Cyber-Attacks Detection in the Industrial Control Systems

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingMulti-stage Cyber-Attacks Detection in the Industrial Control Systems
Read more about the article Legal Issues of Deception Systems in the Industrial Control Systems

Legal Issues of Deception Systems in the Industrial Control Systems

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingLegal Issues of Deception Systems in the Industrial Control Systems
Read more about the article Forecasting security alerts based on time series

Forecasting security alerts based on time series

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingForecasting security alerts based on time series
Read more about the article Early-stage detection of cyber attacks

Early-stage detection of cyber attacks

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingEarly-stage detection of cyber attacks
Read more about the article Analysis and Prediction of Legal Judgements in the Slovak Criminal Proceedings

Analysis and Prediction of Legal Judgements in the Slovak Criminal Proceedings

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingAnalysis and Prediction of Legal Judgements in the Slovak Criminal Proceedings
  • 1
  • 2
  • 3
  • 4
  • …
  • 7
  • Go to the next page

Najnovšie články

  • Liability regime of online platforms new approaches and perspectives
  • Analysis of the Infection and the Injection Phases of the Telnet Botnets
  • Virtual honeypots and detection of telnet botnets
  • New Initiatives and Approaches in the Law of Cookies in the EU
  • 4th industrial revolution and challenges for european law (with special attention to the concept of digital single market)

Najnovšie komentáre

No comments to show.

Archív

  • September 2025
  • August 2025
  • July 2025
  • July 2024
  • July 2023
  • July 2022
  • July 2021
  • July 2020
  • July 2019
  • July 2018
  • July 2017
  • July 2016
  • July 2015
  • July 2014
  • July 2013
  • July 2012
  • July 2011
  • July 2010

Categories

  • Aktuality
  • Bakalárske práce
  • Články
  • Diplomové práce
  • Dizertačné práce
  • Habilitačné práce
  • Nezaradené
  • Rigorózne práce

Univerzita Pavla Jozefa Šafárika v Košiciach
Šrobárova 2, 040 01 Košice
Tím na riešenie počítačových bezpečnostných incidentov (CSIRT-UPJS)
Oznamovanie incidentov: incident@upjs.sk
Facebook: CSIRT UPJS
LinkedIn: CSIRT-UPJS

CSIRT-UPJS © 2025