Skip to content
KC KB
  • About the project
    • Náš tím
    • Informácia o konaní aktivít
  • Aktivity
    • Teachers
      • Information security needs to be lived
    • Summer school of cybercriminality
      • Letná škola kyberkriminality 2025
      • Summer School of Cybercriminality 2024
    • CyberSecurityDay
      • CyberSecurityDay 2025 (Rožňava)
      • Jarný CyberSecurityDay 2025
      • Jesenný CyberSecurityDay 2024
      • Summer CyberSecurityDay 2024
      • CyberSecurityDay 2023
      • CyberSecurityDay 2022
  • Education
    • Verejná správa
      • Vzdelávanie verejná správa – laik, odborný zamestnanec, manažér
      • Vzdelávanie verejná správa – informatik, zamestnanec v KB
    • Verejnosť
      • Vzdelávací portál
    • Študenti SŠ
      • KyberTímy
      • Prednášky pre SŠ
    • Študenti VŠ
      • Študijný program AIm – KB
      • Predmety
      • Záverečné práce
  • sk_SKSK
  • Toggle website search
Menu Close
  • About the project
    • Náš tím
    • Informácia o konaní aktivít
  • Aktivity
    • Teachers
      • Information security needs to be lived
    • Summer school of cybercriminality
      • Letná škola kyberkriminality 2025
      • Summer School of Cybercriminality 2024
    • CyberSecurityDay
      • CyberSecurityDay 2025 (Rožňava)
      • Jarný CyberSecurityDay 2025
      • Jesenný CyberSecurityDay 2024
      • Summer CyberSecurityDay 2024
      • CyberSecurityDay 2023
      • CyberSecurityDay 2022
  • Education
    • Verejná správa
      • Vzdelávanie verejná správa – laik, odborný zamestnanec, manažér
      • Vzdelávanie verejná správa – informatik, zamestnanec v KB
    • Verejnosť
      • Vzdelávací portál
    • Študenti SŠ
      • KyberTímy
      • Prednášky pre SŠ
    • Študenti VŠ
      • Študijný program AIm – KB
      • Predmety
      • Záverečné práce
  • sk_SKSK
  • Toggle website search
Read more about the article Forensic Artifacts’ Analysis using Graph Theory

Forensic Artifacts’ Analysis using Graph Theory

  • Post author:Vanda Matušíková
  • Post published:2. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingForensic Artifacts’ Analysis using Graph Theory
Read more about the article Processing of IDS alerts in multi-step attacks

Processing of IDS alerts in multi-step attacks

  • Post author:Vanda Matušíková
  • Post published:2. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingProcessing of IDS alerts in multi-step attacks
Read more about the article Personal data protection enforcement under GDPR—the Slovak experience

Personal data protection enforcement under GDPR—the Slovak experience

  • Post author:Vanda Matušíková
  • Post published:2. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingPersonal data protection enforcement under GDPR—the Slovak experience
Read more about the article Dataset of Windows operating system forensics artefacts

Dataset of Windows operating system forensics artefacts

  • Post author:Vanda Matušíková
  • Post published:2. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingDataset of Windows operating system forensics artefacts
Read more about the article IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic

IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic

  • Post author:Vanda Matušíková
  • Post published:30. August 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingIP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic
Read more about the article Dataset of intrusion detection alerts from a sharing platform

Dataset of intrusion detection alerts from a sharing platform

  • Post author:Vanda Matušíková
  • Post published:30. August 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingDataset of intrusion detection alerts from a sharing platform
Read more about the article Predictive methods in cyber defense: Current experience and research challenges

Predictive methods in cyber defense: Current experience and research challenges

  • Post author:Vanda Matušíková
  • Post published:30. August 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingPredictive methods in cyber defense: Current experience and research challenges
Read more about the article Letná škola kyberkriminality 2025

Letná škola kyberkriminality 2025

  • Post author:Vanda Matušíková
  • Post published:12. July 2025
  • Post category:Aktuality
  • Post comments:0 Comments

Continue ReadingLetná škola kyberkriminality 2025
Read more about the article Okrúhle stoly – CZ – máj

Okrúhle stoly – CZ – máj

  • Post author:Katarína Regeciová
  • Post published:4. July 2025
  • Post category:Aktuality
  • Post comments:0 Comments

Continue ReadingOkrúhle stoly – CZ – máj
Read more about the article Formal concept analysis approach to understand digital evidence relationships

Formal concept analysis approach to understand digital evidence relationships

  • Post author:Katarína Regeciová
  • Post published:9. July 2024
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingFormal concept analysis approach to understand digital evidence relationships
  • 1
  • 2
  • 3
  • 4
  • …
  • 9
  • Go to the next page

Najnovšie články

  • Forensic Artifacts’ Analysis using Graph Theory
  • Processing of IDS alerts in multi-step attacks
  • Personal data protection enforcement under GDPR—the Slovak experience
  • Dataset of Windows operating system forensics artefacts
  • IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic

Najnovšie komentáre

No comments to show.

Archív

  • September 2025
  • August 2025
  • July 2025
  • July 2024
  • July 2023
  • July 2022
  • July 2021
  • July 2020
  • July 2019
  • July 2018
  • July 2017
  • July 2016
  • July 2015
  • July 2014
  • July 2013
  • July 2012
  • July 2011
  • July 2010

Categories

  • Aktuality
  • Bakalárske práce
  • Články
  • Diplomové práce
  • Dizertačné práce
  • Habilitačné práce
  • Nezaradené
  • Rigorózne práce

Univerzita Pavla Jozefa Šafárika v Košiciach
Šrobárova 2, 040 01 Košice
Tím na riešenie počítačových bezpečnostných incidentov (CSIRT-UPJS)
Oznamovanie incidentov: incident@upjs.sk
Facebook: CSIRT UPJS
LinkedIn: CSIRT-UPJS

CSIRT-UPJS © 2025