Skip to content
KC KB
  • About the project
    • Our team
    • Information about activities
  • Activities
    • Teachers
      • Information security needs to be lived
    • Summer school of cybercriminality
      • Summer school of Cybercriminality 2025
      • Summer School of Cybercriminality 2024
    • CyberSecurityDay
      • Autumn CyberSecurityDay 2025
      • Archive CyberSecurityDay 2025
      • Archive CyberSecurityDay 2024
      • Archive CyberSecurityDay 2023
      • Archive CyberSecurityDay 2022
  • Research
    • Datasets
  • Education
    • Public administration
      • Public administration education – layperson, professional employee, manager
      • Public administration education – IT specialist, employee at KB
    • General public
      • Educational portal
      • Reports
    • Highschool students
      • Cyber teams
      • Lectures for students
    • University students
      • Study program AIm – KB
      • Subjects
      • Theses
  • sk_SKSK
  • Toggle website search
Menu Close
  • About the project
    • Our team
    • Information about activities
  • Activities
    • Teachers
      • Information security needs to be lived
    • Summer school of cybercriminality
      • Summer school of Cybercriminality 2025
      • Summer School of Cybercriminality 2024
    • CyberSecurityDay
      • Autumn CyberSecurityDay 2025
      • Archive CyberSecurityDay 2025
      • Archive CyberSecurityDay 2024
      • Archive CyberSecurityDay 2023
      • Archive CyberSecurityDay 2022
  • Research
    • Datasets
  • Education
    • Public administration
      • Public administration education – layperson, professional employee, manager
      • Public administration education – IT specialist, employee at KB
    • General public
      • Educational portal
      • Reports
    • Highschool students
      • Cyber teams
      • Lectures for students
    • University students
      • Study program AIm – KB
      • Subjects
      • Theses
  • sk_SKSK
  • Toggle website search
Read more about the article Lessons Learned from Honeypots – Statistical Analysis of Logins and Passwords
Články

Lessons Learned from Honeypots – Statistical Analysis of Logins and Passwords

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

0 Comments
10. September 2025
Read more about the article Evolution of legal issues of honeynets
Články

Evolution of legal issues of honeynets

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

0 Comments
10. September 2025
Read more about the article Data Collection and Data Analysis in Honeypots and Honeynets
Články

Data Collection and Data Analysis in Honeypots and Honeynets

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

0 Comments
10. September 2025
Read more about the article Study of attack using honeypots and honeynets lessons learned from time-oriented visualization
Články

Study of attack using honeypots and honeynets lessons learned from time-oriented visualization

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

0 Comments
10. September 2025
Read more about the article Deploying Honeypots and Honeynets: Issue of Privacy
Články

Deploying Honeypots and Honeynets: Issue of Privacy

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

0 Comments
10. September 2025
Read more about the article Deploying honeypots and honeynets: Issues of liability
Články

Deploying honeypots and honeynets: Issues of liability

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

0 Comments
10. September 2025
Read more about the article Definition of attack in context of high level interaction honeypots
Články

Definition of attack in context of high level interaction honeypots

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

0 Comments
10. September 2025
Read more about the article Data control in virtual honeynets based on operating system-level virtualization
Články

Data control in virtual honeynets based on operating system-level virtualization

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

0 Comments
10. September 2025
Read more about the article Definition of attack in the context of low-level interaction server honeypots
Články

Definition of attack in the context of low-level interaction server honeypots

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

0 Comments
10. September 2025
Read more about the article Visualization of the active network connections in virtual honeynets
Články

Visualization of the active network connections in virtual honeynets

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

0 Comments
10. September 2025
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • Go to the next page

Categories

  • Aktuality
  • Bakalárske práce
  • Články
  • Diplomové práce
  • Dizertačné práce
  • Habilitačné práce
  • Nezaradené
  • Rigorózne práce

Archív

  • September 2025
  • August 2025
  • July 2025
  • July 2024
  • July 2023
  • July 2022
  • July 2021
  • July 2020
  • July 2019
  • July 2018
  • July 2017
  • July 2016
  • July 2015
  • July 2014
  • July 2013
  • July 2012
  • July 2011
  • July 2010

Pavol Jozef Šafárik University in Košice
Šrobárova 2, 040 01 Košice
Computer Security Incident Response Team (CSIRT-UPJS)
Incident reporting: incident@upjs.sk
Facebook: CSIRT UPJS
LinkedIn: CSIRT-UPJS

CSIRT-UPJS © 2025