Skip to content
KC KB
  • About the project
    • Náš tím
    • Informácia o konaní aktivít
  • Aktivity
    • Teachers
      • Information security needs to be lived
    • Summer school of cybercriminality
      • Letná škola kyberkriminality 2025
      • Summer School of Cybercriminality 2024
    • CyberSecurityDay
      • CyberSecurityDay 2025 (Rožňava)
      • Jarný CyberSecurityDay 2025
      • Jesenný CyberSecurityDay 2024
      • Summer CyberSecurityDay 2024
      • CyberSecurityDay 2023
      • CyberSecurityDay 2022
  • Education
    • Verejná správa
      • Vzdelávanie verejná správa – laik, odborný zamestnanec, manažér
      • Vzdelávanie verejná správa – informatik, zamestnanec v KB
    • Verejnosť
      • Vzdelávací portál
    • Študenti SŠ
      • KyberTímy
      • Prednášky pre SŠ
    • Študenti VŠ
      • Študijný program AIm – KB
      • Predmety
      • Záverečné práce
  • sk_SKSK
  • Toggle website search
Menu Close
  • About the project
    • Náš tím
    • Informácia o konaní aktivít
  • Aktivity
    • Teachers
      • Information security needs to be lived
    • Summer school of cybercriminality
      • Letná škola kyberkriminality 2025
      • Summer School of Cybercriminality 2024
    • CyberSecurityDay
      • CyberSecurityDay 2025 (Rožňava)
      • Jarný CyberSecurityDay 2025
      • Jesenný CyberSecurityDay 2024
      • Summer CyberSecurityDay 2024
      • CyberSecurityDay 2023
      • CyberSecurityDay 2022
  • Education
    • Verejná správa
      • Vzdelávanie verejná správa – laik, odborný zamestnanec, manažér
      • Vzdelávanie verejná správa – informatik, zamestnanec v KB
    • Verejnosť
      • Vzdelávací portál
    • Študenti SŠ
      • KyberTímy
      • Prednášky pre SŠ
    • Študenti VŠ
      • Študijný program AIm – KB
      • Predmety
      • Záverečné práce
  • sk_SKSK
  • Toggle website search
Read more about the article Digital evidence in virtual honeynets based on operating system level virtualization

Digital evidence in virtual honeynets based on operating system level virtualization

  • Post author:Sophia Horňáková
  • Post published:5. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingDigital evidence in virtual honeynets based on operating system level virtualization
Read more about the article Automated DFIR in Windows operating system

Automated DFIR in Windows operating system

  • Post author:Sophia Horňáková
  • Post published:5. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingAutomated DFIR in Windows operating system
Read more about the article Digitálna forenzná analýza I.

Digitálna forenzná analýza I.

  • Post author:Sophia Horňáková
  • Post published:5. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingDigitálna forenzná analýza I.
Read more about the article Classification of malicious emails

Classification of malicious emails

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingClassification of malicious emails
Read more about the article Real-time processing of cybersecurity system data for attacker profiling

Real-time processing of cybersecurity system data for attacker profiling

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingReal-time processing of cybersecurity system data for attacker profiling
Read more about the article A Secure String Class Compliant with PCI DSS

A Secure String Class Compliant with PCI DSS

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingA Secure String Class Compliant with PCI DSS
Read more about the article Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths

Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingExpert Knowledge Elicitation for Skill Level Categorization of Attack Paths
Read more about the article Evaluation of Attacker Skill Level for Multi-stage Attacks

Evaluation of Attacker Skill Level for Multi-stage Attacks

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingEvaluation of Attacker Skill Level for Multi-stage Attacks
Read more about the article Multi-stage Cyber-Attacks Detection in the Industrial Control Systems

Multi-stage Cyber-Attacks Detection in the Industrial Control Systems

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingMulti-stage Cyber-Attacks Detection in the Industrial Control Systems
Read more about the article Legal Issues of Deception Systems in the Industrial Control Systems

Legal Issues of Deception Systems in the Industrial Control Systems

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingLegal Issues of Deception Systems in the Industrial Control Systems
  • 1
  • 2
  • 3
  • Go to the next page

Najnovšie články

  • Digital evidence in virtual honeynets based on operating system level virtualization
  • Automated DFIR in Windows operating system
  • Digitálna forenzná analýza I.
  • Classification of malicious emails
  • Real-time processing of cybersecurity system data for attacker profiling

Najnovšie komentáre

No comments to show.

Archív

  • September 2025
  • August 2025
  • July 2025
  • July 2024
  • July 2023
  • July 2022
  • July 2021
  • July 2020
  • July 2019
  • July 2018
  • July 2017
  • July 2016
  • July 2015
  • July 2014
  • July 2013
  • July 2012
  • July 2011
  • July 2010

Categories

  • Aktuality
  • Bakalárske práce
  • Články
  • Diplomové práce
  • Dizertačné práce
  • Habilitačné práce
  • Nezaradené
  • Rigorózne práce

Univerzita Pavla Jozefa Šafárika v Košiciach
Šrobárova 2, 040 01 Košice
Tím na riešenie počítačových bezpečnostných incidentov (CSIRT-UPJS)
Oznamovanie incidentov: incident@upjs.sk
Facebook: CSIRT UPJS
LinkedIn: CSIRT-UPJS

CSIRT-UPJS © 2025