Skip to content
KC KB UPJŠ
  • About us
    • About the project
    • Our team
    • Information about activities
    • Collaboration abroad
  • Professional work
    • Methodological activities in the field of KIB
    • Expert activities in the field of KIB
    • Professional advice in the preparation of projects in the field of KIB
    • Reports from the KIB field
  • Research work
    • Scientific articles
    • Datasets
  • Education
    • Public administration
      • Public administration education – layperson, professional employee, manager
      • Public administration education – IT specialist, employee at KB
    • General public
      • Educational portal
      • Media campaign
      • Information security needs to be lived
    • Highschool students
      • Cyber teams
      • CyberSecurityDay
      • Lectures for students
    • University students
      • Study program AIm – KB
      • Summer school of cybercriminality
      • Courses
      • Theses
  • sk_SKSK
  • Toggle website search
Menu Close
  • About us
    • About the project
    • Our team
    • Information about activities
    • Collaboration abroad
  • Professional work
    • Methodological activities in the field of KIB
    • Expert activities in the field of KIB
    • Professional advice in the preparation of projects in the field of KIB
    • Reports from the KIB field
  • Research work
    • Scientific articles
    • Datasets
  • Education
    • Public administration
      • Public administration education – layperson, professional employee, manager
      • Public administration education – IT specialist, employee at KB
    • General public
      • Educational portal
      • Media campaign
      • Information security needs to be lived
    • Highschool students
      • Cyber teams
      • CyberSecurityDay
      • Lectures for students
    • University students
      • Study program AIm – KB
      • Summer school of cybercriminality
      • Courses
      • Theses
  • sk_SKSK
  • Toggle website search
Read more about the article A Secure String Class Compliant with PCI DSS
Články

A Secure String Class Compliant with PCI DSS

Authors: Katarína Amrichová, Terézia Mézešová

0 Comments
4. September 2025
Read more about the article Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths
Články

Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths

Authors: Terézia Mézešová, Hayretdin Bahsi

0 Comments
4. September 2025
Read more about the article Evaluation of Attacker Skill Level for Multi-stage Attacks
Články

Evaluation of Attacker Skill Level for Multi-stage Attacks

Authors: Tomáš Bajtoš, Pavol Sokol, Terézia Mézešová

0 Comments
4. September 2025
Read more about the article Multi-stage Cyber-Attacks Detection in the Industrial Control Systems
Články

Multi-stage Cyber-Attacks Detection in the Industrial Control Systems

Authors: Tomáš Bajtoš, Pavol Sokol, Terézia Mézešová

0 Comments
4. September 2025
Read more about the article Legal Issues of Deception Systems in the Industrial Control Systems
Články

Legal Issues of Deception Systems in the Industrial Control Systems

Authors: Pavol Sokol, Radoslav Benko, Laura Rózenfeldová

0 Comments
4. September 2025
Read more about the article Forecasting security alerts based on time series
Články

Forecasting security alerts based on time series

Authors: Patrik Pekarčík, Andrej Gajdoš, Pavol Sokol

0 Comments
4. September 2025
Read more about the article Early-stage detection of cyber attacks
Články

Early-stage detection of cyber attacks

Authors: Martina Pivarníková, Pavol Sokol, Tomáš Bajtoš

0 Comments
4. September 2025
Read more about the article Analysis and Prediction of Legal Judgements in the Slovak Criminal Proceedings
Články

Analysis and Prediction of Legal Judgements in the Slovak Criminal Proceedings

Authors: Dávid Varga, Zoltán Szoplák, Stanislav Krajči, Pavol Sokol, Peter Gurský

0 Comments
4. September 2025
Read more about the article Network Security Situation Awareness Forecasting Based on Neural Networks
Články

Network Security Situation Awareness Forecasting Based on Neural Networks

Authors: Richard Staňa, Patrik Pekarčík, Andrej Gajdoš, Pavol Sokol

0 Comments
4. September 2025
Read more about the article Malicious Emails Classification Based on Machine Learning
Články

Malicious Emails Classification Based on Machine Learning

Authors: Eva Marková, Tomáš Bajtoš, Pavol Sokol, Terézia Mézešová, Patrik Pekarčík

0 Comments
4. September 2025
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 15
  • Go to the next page

Categories

  • News
  • Bachelor's theses
  • Články
  • Diploma theses
  • Dissertation
  • Habilitation works
  • Kampaň
  • Nezaradené
  • Rigorous work

Archive

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • February 2025
  • July 2024
  • July 2023
  • July 2022
  • July 2021
  • July 2020
  • July 2019
  • July 2018
  • July 2017
  • July 2016
  • July 2015
  • July 2014
  • July 2013
  • July 2012
  • July 2011
  • July 2010

Pavol Jozef Šafárik University in Košice
Šrobárova 2, 040 01 Košice
Computer Security Incident Response Team (CSIRT-UPJS)
Incident reporting: incident@upjs.sk, +421 55 234 1111
Website: https://csirt.upjs.sk/
Facebook: CSIRT UPJS
LinkedIn: CSIRT-UPJS

CSIRT-UPJS © 2025