Skip to content
KC KB
  • About the project
    • Náš tím
    • Informácia o konaní aktivít
  • Aktivity
    • Teachers
      • Information security needs to be lived
    • Summer school of cybercriminality
      • Letná škola kyberkriminality 2025
      • Summer School of Cybercriminality 2024
    • CyberSecurityDay
      • CyberSecurityDay 2025 (Rožňava)
      • Jarný CyberSecurityDay 2025
      • Jesenný CyberSecurityDay 2024
      • Summer CyberSecurityDay 2024
      • CyberSecurityDay 2023
      • CyberSecurityDay 2022
  • Education
    • Verejná správa
      • Vzdelávanie verejná správa – laik, odborný zamestnanec, manažér
      • Vzdelávanie verejná správa – informatik, zamestnanec v KB
    • Verejnosť
      • Vzdelávací portál
    • Študenti SŠ
      • KyberTímy
      • Prednášky pre SŠ
    • Študenti VŠ
      • Študijný program AIm – KB
      • Predmety
      • Záverečné práce
  • sk_SKSK
  • Toggle website search
Menu Close
  • About the project
    • Náš tím
    • Informácia o konaní aktivít
  • Aktivity
    • Teachers
      • Information security needs to be lived
    • Summer school of cybercriminality
      • Letná škola kyberkriminality 2025
      • Summer School of Cybercriminality 2024
    • CyberSecurityDay
      • CyberSecurityDay 2025 (Rožňava)
      • Jarný CyberSecurityDay 2025
      • Jesenný CyberSecurityDay 2024
      • Summer CyberSecurityDay 2024
      • CyberSecurityDay 2023
      • CyberSecurityDay 2022
  • Education
    • Verejná správa
      • Vzdelávanie verejná správa – laik, odborný zamestnanec, manažér
      • Vzdelávanie verejná správa – informatik, zamestnanec v KB
    • Verejnosť
      • Vzdelávací portál
    • Študenti SŠ
      • KyberTímy
      • Prednášky pre SŠ
    • Študenti VŠ
      • Študijný program AIm – KB
      • Predmety
      • Záverečné práce
  • sk_SKSK
  • Toggle website search
Read more about the article Forensic Artifacts’ Analysis using Graph Theory

Forensic Artifacts’ Analysis using Graph Theory

  • Post author:Vanda Matušíková
  • Post published:2. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingForensic Artifacts’ Analysis using Graph Theory
Read more about the article Processing of IDS alerts in multi-step attacks

Processing of IDS alerts in multi-step attacks

  • Post author:Vanda Matušíková
  • Post published:2. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingProcessing of IDS alerts in multi-step attacks
Read more about the article Personal data protection enforcement under GDPR—the Slovak experience

Personal data protection enforcement under GDPR—the Slovak experience

  • Post author:Vanda Matušíková
  • Post published:2. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingPersonal data protection enforcement under GDPR—the Slovak experience
Read more about the article Dataset of Windows operating system forensics artefacts

Dataset of Windows operating system forensics artefacts

  • Post author:Vanda Matušíková
  • Post published:2. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingDataset of Windows operating system forensics artefacts
Read more about the article IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic

IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic

  • Post author:Vanda Matušíková
  • Post published:30. August 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingIP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic
Read more about the article Dataset of intrusion detection alerts from a sharing platform

Dataset of intrusion detection alerts from a sharing platform

  • Post author:Vanda Matušíková
  • Post published:30. August 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingDataset of intrusion detection alerts from a sharing platform
Read more about the article Predictive methods in cyber defense: Current experience and research challenges

Predictive methods in cyber defense: Current experience and research challenges

  • Post author:Vanda Matušíková
  • Post published:30. August 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingPredictive methods in cyber defense: Current experience and research challenges
Read more about the article Formal concept analysis approach to understand digital evidence relationships

Formal concept analysis approach to understand digital evidence relationships

  • Post author:Katarína Regeciová
  • Post published:9. July 2024
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingFormal concept analysis approach to understand digital evidence relationships
  • Go to the previous page
  • 1
  • 2
  • 3

Najnovšie články

  • Digital evidence in virtual honeynets based on operating system level virtualization
  • Automated DFIR in Windows operating system
  • Digitálna forenzná analýza I.
  • Classification of malicious emails
  • Real-time processing of cybersecurity system data for attacker profiling

Najnovšie komentáre

No comments to show.

Archív

  • September 2025
  • August 2025
  • July 2025
  • July 2024
  • July 2023
  • July 2022
  • July 2021
  • July 2020
  • July 2019
  • July 2018
  • July 2017
  • July 2016
  • July 2015
  • July 2014
  • July 2013
  • July 2012
  • July 2011
  • July 2010

Categories

  • Aktuality
  • Bakalárske práce
  • Články
  • Diplomové práce
  • Dizertačné práce
  • Habilitačné práce
  • Nezaradené
  • Rigorózne práce

Univerzita Pavla Jozefa Šafárika v Košiciach
Šrobárova 2, 040 01 Košice
Tím na riešenie počítačových bezpečnostných incidentov (CSIRT-UPJS)
Oznamovanie incidentov: incident@upjs.sk
Facebook: CSIRT UPJS
LinkedIn: CSIRT-UPJS

CSIRT-UPJS © 2025