Skip to content
KC KB
  • About the project
    • Náš tím
    • Informácia o konaní aktivít
  • Aktivity
    • Teachers
      • Information security needs to be lived
    • Summer school of cybercriminality
      • Letná škola kyberkriminality 2025
      • Summer School of Cybercriminality 2024
    • CyberSecurityDay
      • CyberSecurityDay 2025 (Rožňava)
      • Jarný CyberSecurityDay 2025
      • Jesenný CyberSecurityDay 2024
      • Summer CyberSecurityDay 2024
      • CyberSecurityDay 2023
      • CyberSecurityDay 2022
  • Education
    • Verejná správa
      • Vzdelávanie verejná správa – laik, odborný zamestnanec, manažér
      • Vzdelávanie verejná správa – informatik, zamestnanec v KB
    • Verejnosť
      • Vzdelávací portál
    • Študenti SŠ
      • KyberTímy
      • Prednášky pre SŠ
    • Študenti VŠ
      • Študijný program AIm – KB
      • Predmety
      • Záverečné práce
  • sk_SKSK
  • Toggle website search
Menu Close
  • About the project
    • Náš tím
    • Informácia o konaní aktivít
  • Aktivity
    • Teachers
      • Information security needs to be lived
    • Summer school of cybercriminality
      • Letná škola kyberkriminality 2025
      • Summer School of Cybercriminality 2024
    • CyberSecurityDay
      • CyberSecurityDay 2025 (Rožňava)
      • Jarný CyberSecurityDay 2025
      • Jesenný CyberSecurityDay 2024
      • Summer CyberSecurityDay 2024
      • CyberSecurityDay 2023
      • CyberSecurityDay 2022
  • Education
    • Verejná správa
      • Vzdelávanie verejná správa – laik, odborný zamestnanec, manažér
      • Vzdelávanie verejná správa – informatik, zamestnanec v KB
    • Verejnosť
      • Vzdelávací portál
    • Študenti SŠ
      • KyberTímy
      • Prednášky pre SŠ
    • Študenti VŠ
      • Študijný program AIm – KB
      • Predmety
      • Záverečné práce
  • sk_SKSK
  • Toggle website search
Read more about the article Multi-stage Cyber-Attacks Detection in the Industrial Control Systems

Multi-stage Cyber-Attacks Detection in the Industrial Control Systems

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingMulti-stage Cyber-Attacks Detection in the Industrial Control Systems
Read more about the article Legal Issues of Deception Systems in the Industrial Control Systems

Legal Issues of Deception Systems in the Industrial Control Systems

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingLegal Issues of Deception Systems in the Industrial Control Systems
Read more about the article Forecasting security alerts based on time series

Forecasting security alerts based on time series

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingForecasting security alerts based on time series
Read more about the article Early-stage detection of cyber attacks

Early-stage detection of cyber attacks

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingEarly-stage detection of cyber attacks
Read more about the article Analysis and Prediction of Legal Judgements in the Slovak Criminal Proceedings

Analysis and Prediction of Legal Judgements in the Slovak Criminal Proceedings

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingAnalysis and Prediction of Legal Judgements in the Slovak Criminal Proceedings
Read more about the article Network Security Situation Awareness Forecasting Based on Neural Networks

Network Security Situation Awareness Forecasting Based on Neural Networks

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingNetwork Security Situation Awareness Forecasting Based on Neural Networks
Read more about the article Malicious Emails Classification Based on Machine Learning

Malicious Emails Classification Based on Machine Learning

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingMalicious Emails Classification Based on Machine Learning
Read more about the article The analysis of digital evidence by Formal concept analysis

The analysis of digital evidence by Formal concept analysis

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingThe analysis of digital evidence by Formal concept analysis
Read more about the article Detection of relevant digital evidence in the forensic timelines

Detection of relevant digital evidence in the forensic timelines

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingDetection of relevant digital evidence in the forensic timelines
Read more about the article Cybersecurity Contracts: A Critical Review

Cybersecurity Contracts: A Critical Review

  • Post author:Vanda Matušíková
  • Post published:4. September 2025
  • Post category:Články
  • Post comments:0 Comments

Autor: Mgr. Eva Marková Školiteľ: RNDr. JUDr. Pavol Sokol, PhD.

Continue ReadingCybersecurity Contracts: A Critical Review
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • Go to the next page

Najnovšie články

  • Liability regime of online platforms new approaches and perspectives
  • Analysis of the Infection and the Injection Phases of the Telnet Botnets
  • Virtual honeypots and detection of telnet botnets
  • New Initiatives and Approaches in the Law of Cookies in the EU
  • 4th industrial revolution and challenges for european law (with special attention to the concept of digital single market)

Najnovšie komentáre

No comments to show.

Archív

  • September 2025
  • August 2025
  • July 2025
  • July 2024
  • July 2023
  • July 2022
  • July 2021
  • July 2020
  • July 2019
  • July 2018
  • July 2017
  • July 2016
  • July 2015
  • July 2014
  • July 2013
  • July 2012
  • July 2011
  • July 2010

Categories

  • Aktuality
  • Bakalárske práce
  • Články
  • Diplomové práce
  • Dizertačné práce
  • Habilitačné práce
  • Nezaradené
  • Rigorózne práce

Univerzita Pavla Jozefa Šafárika v Košiciach
Šrobárova 2, 040 01 Košice
Tím na riešenie počítačových bezpečnostných incidentov (CSIRT-UPJS)
Oznamovanie incidentov: incident@upjs.sk
Facebook: CSIRT UPJS
LinkedIn: CSIRT-UPJS

CSIRT-UPJS © 2025