Skip to content
KC KB UPJŠ
  • About us
    • About the project
    • Our team
    • Information about activities
    • Collaboration abroad
  • Professional work
    • Methodological activities in the field of KIB
    • Expert activities in the field of KIB
    • Professional advice in the preparation of projects in the field of KIB
    • Reports from the KIB field
  • Research work
    • Scientific articles
    • Datasets
  • Education
    • Public administration
      • Public administration education – layperson, professional employee, manager
      • Public administration education – IT specialist, employee at KB
    • General public
      • Educational portal
      • Media campaign
      • Information security needs to be lived
    • Highschool students
      • Cyber teams
      • CyberSecurityDay
      • Lectures for students
    • University students
      • Study program AIm – KB
      • Summer school of cybercriminality
      • Courses
      • Theses
  • sk_SKSK
  • Toggle website search
Menu Close
  • About us
    • About the project
    • Our team
    • Information about activities
    • Collaboration abroad
  • Professional work
    • Methodological activities in the field of KIB
    • Expert activities in the field of KIB
    • Professional advice in the preparation of projects in the field of KIB
    • Reports from the KIB field
  • Research work
    • Scientific articles
    • Datasets
  • Education
    • Public administration
      • Public administration education – layperson, professional employee, manager
      • Public administration education – IT specialist, employee at KB
    • General public
      • Educational portal
      • Media campaign
      • Information security needs to be lived
    • Highschool students
      • Cyber teams
      • CyberSecurityDay
      • Lectures for students
    • University students
      • Study program AIm – KB
      • Summer school of cybercriminality
      • Courses
      • Theses
  • sk_SKSK
  • Toggle website search
Read more about the article Data control in virtual honeynets based on operating system-level virtualization
Články

Data control in virtual honeynets based on operating system-level virtualization

Authors: Pavol Sokol, Ján Host, Michal Vasko

0 Comments
10. September 2025
Read more about the article Definition of attack in the context of low-level interaction server honeypots
Články

Definition of attack in the context of low-level interaction server honeypots

Authors: Pavol Sokol, Matej Zuzčák, Tomáš Sochor

0 Comments
10. September 2025
Read more about the article Visualization of the active network connections in virtual honeynets
Články

Visualization of the active network connections in virtual honeynets

Authors: Pavol Sokol, Terézia Mézešová

0 Comments
10. September 2025
Read more about the article Legal issues of honeynet’s generations
Články

Legal issues of honeynet’s generations

Authors: Pavol Sokol

0 Comments
10. September 2025
Read more about the article Framework for distributed virtual honeynets
Články

Framework for distributed virtual honeynets

Authors: Pavol Sokol, Peter Pisarčík

0 Comments
10. September 2025
Read more about the article Digital evidence in virtual honeynets based on operating system level virtualization
Články

Digital evidence in virtual honeynets based on operating system level virtualization

Authors: Pavol Sokol, Peter Pisarčík

0 Comments
5. September 2025
Read more about the article Automated DFIR in Windows operating system
Články

Automated DFIR in Windows operating system

Authors: Eva Marková, Sophia Petra Krišáková, Pavol Sokol

0 Comments
5. September 2025
Read more about the article Digitálna forenzná analýza I.
Články

Digitálna forenzná analýza I.

Authori: Tomáš Bajtoš, Pavol Sokol, Ladislav Bačo

0 Comments
5. September 2025
Read more about the article Classification of malicious emails
Články

Classification of malicious emails

Authors: Eva Marková, Tomáš Bajtoš, Pavol Sokol, Terézia Mézešová

0 Comments
4. September 2025
Read more about the article Real-time processing of cybersecurity system data for attacker profiling
Články

Real-time processing of cybersecurity system data for attacker profiling

Authors: Patrik Pekarčík, Tomáš Kekeňák, Pavol Sokol, Terézia Mézešová

0 Comments
4. September 2025
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 15
  • Go to the next page

Categories

  • News
  • Bachelor's theses
  • Články
  • Diploma theses
  • Dissertation
  • Habilitation works
  • Kampaň
  • Nezaradené
  • Rigorous work

Archive

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • February 2025
  • July 2024
  • July 2023
  • July 2022
  • July 2021
  • July 2020
  • July 2019
  • July 2018
  • July 2017
  • July 2016
  • July 2015
  • July 2014
  • July 2013
  • July 2012
  • July 2011
  • July 2010

Pavol Jozef Šafárik University in Košice
Šrobárova 2, 040 01 Košice
Computer Security Incident Response Team (CSIRT-UPJS)
Incident reporting: incident@upjs.sk, +421 55 234 1111
Website: https://csirt.upjs.sk/
Facebook: CSIRT UPJS
LinkedIn: CSIRT-UPJS

CSIRT-UPJS © 2025