{"id":4834,"date":"2025-08-29T09:02:02","date_gmt":"2025-08-29T07:02:02","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=4834"},"modified":"2026-04-06T17:10:57","modified_gmt":"2026-04-06T15:10:57","slug":"vyskum_clanky","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/vyskum_clanky\/","title":{"rendered":"vyskum_clanky"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"4834\" class=\"elementor elementor-4834\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbe076 elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-con-full e-flex e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b46c502 elementor-widget elementor-widget-spacer\" data-id=\"b46c502\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1cbd28 elementor-widget elementor-widget-heading\" data-id=\"b1cbd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Older scientific articles<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-362ca88 elementor-widget elementor-widget-spacer\" data-id=\"362ca88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f5f92a5 e-con-full e-flex e-con e-child\" data-id=\"f5f92a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a27c85 elementor-widget elementor-widget-spacer\" data-id=\"1a27c85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-acd91a7 elementor-hidden-desktop elementor-hidden-laptop e-flex e-con-boxed e-con e-parent\" data-id=\"acd91a7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-460bd83 e-con-full e-flex e-con e-child\" data-id=\"460bd83\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1b287a elementor-widget elementor-widget-spacer\" data-id=\"b1b287a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c8981f elementor-widget elementor-widget-heading\" data-id=\"6c8981f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Older scientific articles<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c86bd19 elementor-widget elementor-widget-spacer\" data-id=\"c86bd19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-134a424 e-flex e-con-boxed e-con e-parent\" data-id=\"134a424\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f06fe9 elementor-widget elementor-widget-spacer\" data-id=\"4f06fe9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14d8676 elementor-widget elementor-widget-obfx-posts-grid\" data-id=\"14d8676\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"obfx-posts-grid.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"obfx-grid\"><div class=\"obfx-grid-container obfx-grid-mobile-1 obfx-grid-desktop-3\"><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/liability-regime-of-online-platforms-new-approaches-and-perspectives\/\" title=\"Liability regime of online platforms new approaches and perspectives\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/liability-regime-of-online-platforms-new-approaches-and-perspectives\/\" title=\"Liability regime of online platforms new approaches and perspectives\">\n\t\t\t\t\tLiability regime of online platforms new approaches and perspectives\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Laura R\u00f3zenfeldov\u00e1, Pavol Sokol\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/analysis-of-the-infection-and-the-injection-phases-of-the-telnet-botnets\/\" title=\"Analysis of the Infection and the Injection Phases of the Telnet Botnets\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/analysis-of-the-infection-and-the-injection-phases-of-the-telnet-botnets\/\" title=\"Analysis of the Infection and the Injection Phases of the Telnet Botnets\">\n\t\t\t\t\tAnalysis of the Infection and the Injection Phases of the Telnet Botnets\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Tom\u00e1\u0161 Bajto\u0161, Pavol Sokol, Andrej Gajdo\u0161, Katar\u00edna Lu\u010divajsk\u00e1, Ter\u00e9zia M\u00e9ze\u0161ov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/virtual-honeypots-and-detection-of-telnet-botnets\/\" title=\"Virtual honeypots and detection of telnet botnets\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/virtual-honeypots-and-detection-of-telnet-botnets\/\" title=\"Virtual honeypots and detection of telnet botnets\">\n\t\t\t\t\tVirtual honeypots and detection of telnet botnets\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Tom\u00e1\u0161 Bajto\u0161, Pavol Sokol, Ter\u00e9zia M\u00e9ze\u0161ov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/new-initiatives-and-approaches-in-the-law-of-cookies-in-the-eu\/\" title=\"New Initiatives and Approaches in the Law of Cookies in the EU\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/new-initiatives-and-approaches-in-the-law-of-cookies-in-the-eu\/\" title=\"New Initiatives and Approaches in the Law of Cookies in the EU\">\n\t\t\t\t\tNew Initiatives and Approaches in the Law of Cookies in the EU\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Laura R\u00f3zenfeldov\u00e1, Pavol Sokol\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/4th-industrial-revolution-and-challenges-for-european-law-with-special-attention-to-the-concept-of-digital-single-market\/\" title=\"4th industrial revolution and challenges for european law (with special attention to the concept of digital single market)\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/4th-industrial-revolution-and-challenges-for-european-law-with-special-attention-to-the-concept-of-digital-single-market\/\" title=\"4th industrial revolution and challenges for european law (with special attention to the concept of digital single market)\">\n\t\t\t\t\t4th industrial revolution and challenges for european law (with special attention to the concept of digital single market)\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Regina Hu\u010dkov\u00e1, Pavol Sokol, Laura R\u00f3zenfeldov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/network-intrusion-detection-with-threat-agent-profiling\/\" title=\"Network intrusion detection with threat agent profiling\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/network-intrusion-detection-with-threat-agent-profiling\/\" title=\"Network intrusion detection with threat agent profiling\">\n\t\t\t\t\tNetwork intrusion detection with threat agent profiling\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Tom\u00e1\u0161 Bajto\u0161, Andrej Gajdo\u0161, Lenka Kleinov\u00e1, Katar\u00edna Lu\u010divjansk\u00e1, Pavol Sokol\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/prediction-of-attacks-against-honeynet-based-on-time-series-modeling\/\" title=\"Prediction of attacks against honeynet based on time series modeling\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/prediction-of-attacks-against-honeynet-based-on-time-series-modeling\/\" title=\"Prediction of attacks against honeynet based on time series modeling\">\n\t\t\t\t\tPrediction of attacks against honeynet based on time series modeling\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Andrej Gajdo\u0161\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/honeypots-and-honeynets-issues-of-privacy\/\" title=\"Honeypots and honeynets: issues of privacy\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/honeypots-and-honeynets-issues-of-privacy\/\" title=\"Honeypots and honeynets: issues of privacy\">\n\t\t\t\t\tHoneypots and honeynets: issues of privacy\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Jakub M\u00ed\u0161ek, Martin Hus\u00e1k\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/lessons-learned-from-phishing-test\/\" title=\"Lessons learned from phishing test\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/lessons-learned-from-phishing-test\/\" title=\"Lessons learned from phishing test\">\n\t\t\t\t\tLessons learned from phishing test\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Martin Glova, Ter\u00e9zia M\u00e9ze\u0161ov\u00e1, Regina Hu\u010dkov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/lessons-learned-from-correlation-of-honeypots-data-and-spatial-data\/\" title=\"Lessons learned from correlation of honeypots&#8216; data and spatial data\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/lessons-learned-from-correlation-of-honeypots-data-and-spatial-data\/\" title=\"Lessons learned from correlation of honeypots&#8216; data and spatial data\">\n\t\t\t\t\tLessons learned from correlation of honeypots&#8216; data and spatial data\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Veronika Kop\u010dov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/lessons-learned-from-honeypots-statistical-analysis-of-logins-and-passwords\/\" title=\"Lessons Learned from Honeypots &#8211; Statistical Analysis of Logins and Passwords\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/lessons-learned-from-honeypots-statistical-analysis-of-logins-and-passwords\/\" title=\"Lessons Learned from Honeypots &#8211; Statistical Analysis of Logins and Passwords\">\n\t\t\t\t\tLessons Learned from Honeypots &#8211; Statistical Analysis of Logins and Passwords\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Veronika Kop\u010dov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/evolution-of-legal-issues-of-honeynets\/\" title=\"Evolution of legal issues of honeynets\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/evolution-of-legal-issues-of-honeynets\/\" title=\"Evolution of legal issues of honeynets\">\n\t\t\t\t\tEvolution of legal issues of honeynets\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, J\u00e1n Host\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/data-collection-and-data-analysis-in-honeypots-and-honeynets\/\" title=\"Data Collection and Data Analysis in Honeypots and Honeynets\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/data-collection-and-data-analysis-in-honeypots-and-honeynets\/\" title=\"Data Collection and Data Analysis in Honeypots and Honeynets\">\n\t\t\t\t\tData Collection and Data Analysis in Honeypots and Honeynets\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Patrik Pekar\u010d\u00edk, Tom\u00e1\u0161 Bajto\u0161\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/study-of-attack-using-honeypots-and-honeynets-lessons-learned-from-time-oriented-visualization\/\" title=\"Study of attack using honeypots and honeynets lessons learned from time-oriented visualization\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/study-of-attack-using-honeypots-and-honeynets-lessons-learned-from-time-oriented-visualization\/\" title=\"Study of attack using honeypots and honeynets lessons learned from time-oriented visualization\">\n\t\t\t\t\tStudy of attack using honeypots and honeynets lessons learned from time-oriented visualization\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Patrik Pekar\u010d\u00edk, Tom\u00e1\u0161 Bajto\u0161\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/deploying-honeypots-and-honeynets-issue-of-privacy\/\" title=\"Deploying Honeypots and Honeynets: Issue of Privacy\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/deploying-honeypots-and-honeynets-issue-of-privacy\/\" title=\"Deploying Honeypots and Honeynets: Issue of Privacy\">\n\t\t\t\t\tDeploying Honeypots and Honeynets: Issue of Privacy\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Martin Hus\u00e1k, Franti\u0161ek Lipt\u00e1k\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/deploying-honeypots-and-honeynets-issues-of-liability\/\" title=\"Deploying honeypots and honeynets: Issues of liability\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/deploying-honeypots-and-honeynets-issues-of-liability\/\" title=\"Deploying honeypots and honeynets: Issues of liability\">\n\t\t\t\t\tDeploying honeypots and honeynets: Issues of liability\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Maro\u0161 Andrejko\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/definition-of-attack-in-context-of-high-level-interaction-honeypots-2\/\" title=\"Definition of attack in context of high level interaction honeypots\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/definition-of-attack-in-context-of-high-level-interaction-honeypots-2\/\" title=\"Definition of attack in context of high level interaction honeypots\">\n\t\t\t\t\tDefinition of attack in context of high level interaction honeypots\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Matej Zuz\u010d\u00e1k, Tom\u00e1\u0161 Sochor\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/definition-of-attack-in-context-of-high-level-interaction-honeypots\/\" title=\"Data control in virtual honeynets based on operating system-level virtualization\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/definition-of-attack-in-context-of-high-level-interaction-honeypots\/\" title=\"Data control in virtual honeynets based on operating system-level virtualization\">\n\t\t\t\t\tData control in virtual honeynets based on operating system-level virtualization\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, J\u00e1n Host, Michal Vasko\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/definition-of-attack-in-the-context-of-low-level-interaction-server-honeypots\/\" title=\"Definition of attack in the context of low-level interaction server honeypots\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/definition-of-attack-in-the-context-of-low-level-interaction-server-honeypots\/\" title=\"Definition of attack in the context of low-level interaction server honeypots\">\n\t\t\t\t\tDefinition of attack in the context of low-level interaction server honeypots\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Matej Zuz\u010d\u00e1k, Tom\u00e1\u0161 Sochor\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/visualization-of-the-active-network-connections-in-virtual-honeynets\/\" title=\"Visualization of the active network connections in virtual honeynets\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/visualization-of-the-active-network-connections-in-virtual-honeynets\/\" title=\"Visualization of the active network connections in virtual honeynets\">\n\t\t\t\t\tVisualization of the active network connections in virtual honeynets\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Ter\u00e9zia M\u00e9ze\u0161ov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/legal-issues-of-honeynets-generations\/\" title=\"Legal issues of honeynet&#8217;s generations\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/legal-issues-of-honeynets-generations\/\" title=\"Legal issues of honeynet&#8217;s generations\">\n\t\t\t\t\tLegal issues of honeynet&#8217;s generations\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/real-time-processing-of-cybersecurity-system-data-for-attacker-profiling-copy-3\/\" title=\"Framework for distributed virtual honeynets\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/real-time-processing-of-cybersecurity-system-data-for-attacker-profiling-copy-3\/\" title=\"Framework for distributed virtual honeynets\">\n\t\t\t\t\tFramework for distributed virtual honeynets\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Peter Pisar\u010d\u00edk\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/05\/real-time-processing-of-cybersecurity-system-data-for-attacker-profiling-copy-2\/\" title=\"Digital evidence in virtual honeynets based on operating system level virtualization\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/05\/real-time-processing-of-cybersecurity-system-data-for-attacker-profiling-copy-2\/\" title=\"Digital evidence in virtual honeynets based on operating system level virtualization\">\n\t\t\t\t\tDigital evidence in virtual honeynets based on operating system level virtualization\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Peter Pisar\u010d\u00edk\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/05\/automated-dfir-in-windows-operating-system\/\" title=\"Automated DFIR in Windows operating system\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/05\/automated-dfir-in-windows-operating-system\/\" title=\"Automated DFIR in Windows operating system\">\n\t\t\t\t\tAutomated DFIR in Windows operating system\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Eva Markov\u00e1, Sophia Petra Kri\u0161\u00e1kov\u00e1, Pavol Sokol\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/05\/real-time-processing-of-cybersecurity-system-data-for-attacker-profiling-copy\/\" title=\"Digit\u00e1lna forenzn\u00e1 anal\u00fdza I.\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/05\/real-time-processing-of-cybersecurity-system-data-for-attacker-profiling-copy\/\" title=\"Digit\u00e1lna forenzn\u00e1 anal\u00fdza I.\">\n\t\t\t\t\tDigit\u00e1lna forenzn\u00e1 anal\u00fdza I.\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthori: Tom\u00e1\u0161 Bajto\u0161, Pavol Sokol, Ladislav Ba\u010do\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/classification-of-malicious-emails\/\" title=\"Classification of malicious emails\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/classification-of-malicious-emails\/\" title=\"Classification of malicious emails\">\n\t\t\t\t\tClassification of malicious emails\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Eva Markov\u00e1, Tom\u00e1\u0161 Bajto\u0161, Pavol Sokol, Ter\u00e9zia M\u00e9ze\u0161ov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/real-time-processing-of-cybersecurity-system-data-for-attacker-profiling\/\" title=\"Real-time processing of cybersecurity system data for attacker profiling\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/real-time-processing-of-cybersecurity-system-data-for-attacker-profiling\/\" title=\"Real-time processing of cybersecurity system data for attacker profiling\">\n\t\t\t\t\tReal-time processing of cybersecurity system data for attacker profiling\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Patrik Pekar\u010d\u00edk, Tom\u00e1\u0161 Keke\u0148\u00e1k, Pavol Sokol, Ter\u00e9zia M\u00e9ze\u0161ov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/a-secure-string-class-compliant-with-pci-dss\/\" title=\"A Secure String Class Compliant with PCI DSS\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/a-secure-string-class-compliant-with-pci-dss\/\" title=\"A Secure String Class Compliant with PCI DSS\">\n\t\t\t\t\tA Secure String Class Compliant with PCI DSS\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Katar\u00edna Amrichov\u00e1, Ter\u00e9zia M\u00e9ze\u0161ov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/expert-knowledge-elicitation-for-skill-level-categorization-of-attack-paths\/\" title=\"Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/expert-knowledge-elicitation-for-skill-level-categorization-of-attack-paths\/\" title=\"Expert Knowledge Elicitation for Skill Level Categorization of Attack Paths\">\n\t\t\t\t\tExpert Knowledge Elicitation for Skill Level Categorization of Attack Paths\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Ter\u00e9zia M\u00e9ze\u0161ov\u00e1, Hayretdin Bahsi\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/evaluation-of-attacker-skill-level-for-multi-stage-attacks\/\" title=\"Evaluation of Attacker Skill Level for Multi-stage Attacks\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/evaluation-of-attacker-skill-level-for-multi-stage-attacks\/\" title=\"Evaluation of Attacker Skill Level for Multi-stage Attacks\">\n\t\t\t\t\tEvaluation of Attacker Skill Level for Multi-stage Attacks\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Tom\u00e1\u0161 Bajto\u0161, Pavol Sokol, Ter\u00e9zia M\u00e9ze\u0161ov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/multi-stage-cyber-attacks-detection-in-the-industrial-control-systems\/\" title=\"Multi-stage Cyber-Attacks Detection in the Industrial Control Systems\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/multi-stage-cyber-attacks-detection-in-the-industrial-control-systems\/\" title=\"Multi-stage Cyber-Attacks Detection in the Industrial Control Systems\">\n\t\t\t\t\tMulti-stage Cyber-Attacks Detection in the Industrial Control Systems\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Tom\u00e1\u0161 Bajto\u0161, Pavol Sokol, Ter\u00e9zia M\u00e9ze\u0161ov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/legal-issues-of-deception-systems-in-the-industrial-control-systems\/\" title=\"Legal Issues of Deception Systems in the Industrial Control Systems\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/legal-issues-of-deception-systems-in-the-industrial-control-systems\/\" title=\"Legal Issues of Deception Systems in the Industrial Control Systems\">\n\t\t\t\t\tLegal Issues of Deception Systems in the Industrial Control Systems\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Radoslav Benko, Laura R\u00f3zenfeldov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/forecasting-security-alerts-based-on-time-series\/\" title=\"Forecasting security alerts based on time series\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/forecasting-security-alerts-based-on-time-series\/\" title=\"Forecasting security alerts based on time series\">\n\t\t\t\t\tForecasting security alerts based on time series\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Patrik Pekar\u010d\u00edk, Andrej Gajdo\u0161, Pavol Sokol\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/early-stage-detection-of-cyber-attacks-2\/\" title=\"Early-stage detection of cyber attacks\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/early-stage-detection-of-cyber-attacks-2\/\" title=\"Early-stage detection of cyber attacks\">\n\t\t\t\t\tEarly-stage detection of cyber attacks\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Martina Pivarn\u00edkov\u00e1, Pavol Sokol, Tom\u00e1\u0161 Bajto\u0161\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/analysis-and-prediction-of-legal-judgements-in-the-slovak-criminal-proceedings\/\" title=\"Analysis and Prediction of Legal Judgements in the Slovak Criminal Proceedings\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/analysis-and-prediction-of-legal-judgements-in-the-slovak-criminal-proceedings\/\" title=\"Analysis and Prediction of Legal Judgements in the Slovak Criminal Proceedings\">\n\t\t\t\t\tAnalysis and Prediction of Legal Judgements in the Slovak Criminal Proceedings\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: D\u00e1vid Varga, Zolt\u00e1n Szopl\u00e1k, Stanislav Kraj\u010di, Pavol Sokol, Peter Gursk\u00fd\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/network-security-situation-awareness-forecasting-based-on-neural-networks\/\" title=\"Network Security Situation Awareness Forecasting Based on Neural Networks\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/network-security-situation-awareness-forecasting-based-on-neural-networks\/\" title=\"Network Security Situation Awareness Forecasting Based on Neural Networks\">\n\t\t\t\t\tNetwork Security Situation Awareness Forecasting Based on Neural Networks\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Richard Sta\u0148a, Patrik Pekar\u010d\u00edk, Andrej Gajdo\u0161, Pavol Sokol\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/malicious-emails-classification-based-on-machine-learning\/\" title=\"Malicious Emails Classification Based on Machine Learning\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/malicious-emails-classification-based-on-machine-learning\/\" title=\"Malicious Emails Classification Based on Machine Learning\">\n\t\t\t\t\tMalicious Emails Classification Based on Machine Learning\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Eva Markov\u00e1, Tom\u00e1\u0161 Bajto\u0161, Pavol Sokol, Ter\u00e9zia M\u00e9ze\u0161ov\u00e1, Patrik Pekar\u010d\u00edk\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/the-analysis-of-digital-evidence-by-formal-concept-analysis\/\" title=\"The analysis of digital evidence by Formal concept analysis\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/the-analysis-of-digital-evidence-by-formal-concept-analysis\/\" title=\"The analysis of digital evidence by Formal concept analysis\">\n\t\t\t\t\tThe analysis of digital evidence by Formal concept analysis\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, \u013dubom\u00edr Antoni, Ondrej Kr\u00eddlo, Eva Markov\u00e1, Krist\u00edna Kov\u00e1\u010dov\u00e1, Stanislav Kraj\u010di\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/detection-of-relevant-digital-evidence-in-the-forensic-timelines\/\" title=\"Detection of relevant digital evidence in the forensic timelines\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/detection-of-relevant-digital-evidence-in-the-forensic-timelines\/\" title=\"Detection of relevant digital evidence in the forensic timelines\">\n\t\t\t\t\tDetection of relevant digital evidence in the forensic timelines\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Eva Markov\u00e1, Pavol Sokol, Krist\u00edna Kov\u00e1\u0107ov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/cybersecurity-contracts-a-critical-review\/\" title=\"Cybersecurity Contracts: A Critical Review\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/cybersecurity-contracts-a-critical-review\/\" title=\"Cybersecurity Contracts: A Critical Review\">\n\t\t\t\t\tCybersecurity Contracts: A Critical Review\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Regina Hu\u010dkov\u00e1, Laura Bach\u0148\u00e1kov\u00e1 R\u00f3zenfeldov\u00e1, Pavol Sokol, So\u0148a Bri\u0161k\u00e1rov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/network-security-situation-awareness-forecasting-based-on-statistical-approach-and-neural-networks\/\" title=\"Network security situation awareness forecasting based on statistical approach and neural networks\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/network-security-situation-awareness-forecasting-based-on-statistical-approach-and-neural-networks\/\" title=\"Network security situation awareness forecasting based on statistical approach and neural networks\">\n\t\t\t\t\tNetwork security situation awareness forecasting based on statistical approach and neural networks\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Richard Sta\u0148a, Andrej Gajdo\u0161, Patrik Pekar\u010d\u00edk\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/lessons-learned-from-automated-sharing-of-intrusion-detection-alerts-the-case-of-the-sabu-platform\/\" title=\"Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/04\/lessons-learned-from-automated-sharing-of-intrusion-detection-alerts-the-case-of-the-sabu-platform\/\" title=\"Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform\">\n\t\t\t\t\tLessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Martin Hus\u00e1k, Pavol Sokol, Martin \u017d\u00e1dn\u00edk, V\u00e1clav Barto\u0161, Martin Hor\u00e1k\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/02\/forensic-artifacts-analysis-using-graph-theory\/\" title=\"Forensic Artifacts\u2019 Analysis using Graph Theory\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/02\/forensic-artifacts-analysis-using-graph-theory\/\" title=\"Forensic Artifacts\u2019 Analysis using Graph Theory\">\n\t\t\t\t\tForensic Artifacts\u2019 Analysis using Graph Theory\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Sophia Petra Kri\u0161\u00e1kov\u00e1, Pavol Sokol, Rastislav Krivo\u0161-Bellu\u0161\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/02\/processing-of-ids-alerts-in-multi-step-attacks\/\" title=\"Processing of IDS alerts in multi-step attacks\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/02\/processing-of-ids-alerts-in-multi-step-attacks\/\" title=\"Processing of IDS alerts in multi-step attacks\">\n\t\t\t\t\tProcessing of IDS alerts in multi-step attacks\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Tom\u00e1\u0161 Bajto\u0161, Pavol Sokol, Franti\u0161ek Kurimsk\u00fd\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/02\/personal-data-protection-enforcement-under-gdpr-the-slovak-experience\/\" title=\"Personal data protection enforcement under GDPR\u2014the Slovak experience\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/02\/personal-data-protection-enforcement-under-gdpr-the-slovak-experience\/\" title=\"Personal data protection enforcement under GDPR\u2014the Slovak experience\">\n\t\t\t\t\tPersonal data protection enforcement under GDPR\u2014the Slovak experience\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Laura Bach\u0148\u00e1kov\u00e1 R\u00f3zenfeldov\u00e1 , Pavol Sokol , Regina Hu\u010dkov\u00e1 , Mat\u00fa\u0161 Mesar\u010d\u00edk\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/02\/dataset-of-windows-operating-system-forensics-artefacts\/\" title=\"Dataset of Windows operating system forensics artefacts\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/09\/02\/dataset-of-windows-operating-system-forensics-artefacts\/\" title=\"Dataset of Windows operating system forensics artefacts\">\n\t\t\t\t\tDataset of Windows operating system forensics artefacts\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Eva Markov\u00e1, Pavol Sokol, Sophia Petra Kri\u0161\u00e1kov\u00e1, Krist\u00edna Kov\u00e1\u010dov\u00e1\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/08\/30\/ip-addresses-in-the-context-of-digital-evidence-in-the-criminal-and-civil-case-law-of-the-slovak-republic\/\" title=\"IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/08\/30\/ip-addresses-in-the-context-of-digital-evidence-in-the-criminal-and-civil-case-law-of-the-slovak-republic\/\" title=\"IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic\">\n\t\t\t\t\tIP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Laura R\u00f3zenfeldov\u00e1, Katar\u00edna Lu\u010divjansk\u00e1, Jakub Hara\u0161ta\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/08\/30\/dataset-of-intrusion-detection-alerts-from-a-sharing-platform\/\" title=\"Dataset of intrusion detection alerts from a sharing platform\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/08\/30\/dataset-of-intrusion-detection-alerts-from-a-sharing-platform\/\" title=\"Dataset of intrusion detection alerts from a sharing platform\">\n\t\t\t\t\tDataset of intrusion detection alerts from a sharing platform\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Martin Hus\u00e1k, Martin \u017d\u00e1dn\u00edk, V\u00e1clav Barto\u0161\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2025\/08\/30\/predictive-methods-in-cyber-defense-current-experience-and-research-challenges\/\" title=\"Predictive methods in cyber defense: Current experience and research challenges\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2025\/08\/30\/predictive-methods-in-cyber-defense-current-experience-and-research-challenges\/\" title=\"Predictive methods in cyber defense: Current experience and research challenges\">\n\t\t\t\t\tPredictive methods in cyber defense: Current experience and research challenges\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, Martin Hus\u00e1k, V\u00e1clav Barto\u0161, Andrej Gajdo\u0161\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><div class=\"obfx-grid-wrapper\"><article class=\"obfx-grid-col\"><div class=\"obfx-grid-col-image\" style=\"\"><a href=\"https:\/\/cyberawareness.sk\/en\/2024\/07\/09\/formal-concept-analysis-approach-to-understand-digital-evidence-relationships\/\" title=\"Formal concept analysis approach to understand digital evidence relationships\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg\" class=\"img-responsive wp-post-image\" alt=\"article pic\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-scaled.jpg 2560w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-300x200.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1024x683.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-768x512.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-1536x1024.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-2048x1365.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/07\/article-pic-18x12.jpg 18w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/div><div class=\"obfx-grid-col-content\">\t\t\t<h3 class=\"entry-title obfx-grid-title\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/en\/2024\/07\/09\/formal-concept-analysis-approach-to-understand-digital-evidence-relationships\/\" title=\"Formal concept analysis approach to understand digital evidence relationships\">\n\t\t\t\t\tFormal concept analysis approach to understand digital evidence relationships\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<div class=\"entry-content obfx-grid-content\">\n\t\t\t\tAuthors: Pavol Sokol, \u013dubom\u00edr Antoni, Ondrej Kr\u00eddlo, Eva Markov\u00e1, Krist\u00edna Kov\u00e1\u010dov\u00e1, Stanislav Kraj\u010di\t\t\t<\/div>\n\t\t\t<\/div><\/article><\/div><\/div><!-- .obfx-grid-container --><\/div><!-- .obfx-grid -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9669b0f elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"9669b0f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2deb26c elementor-widget elementor-widget-spacer\" data-id=\"2deb26c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c380e37 elementor-widget elementor-widget-heading\" data-id=\"c380e37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Other expert activities \n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83f04e8 elementor-widget elementor-widget-text-editor\" data-id=\"83f04e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cie\u013eom v\u00fdskumu na Pr\u00edrodovedeckej fakulte Univerzity Pavla Jozefa \u0160af\u00e1rika v Ko\u0161iciach (PF UPJ\u0160) v r\u00e1mci projektu Kompeten\u010dn\u00e9ho centra kybernetickej bezpe\u010dnosti (KC KB UPJ\u0160) je:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f66174a elementor-widget elementor-widget-ucaddon_circle_number_widget\" data-id=\"f66174a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_circle_number_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Number Box -->\n<style>\/* widget: Number Box *\/\n\n#uc_circle_number_widget_elementor_f66174a .circle_number_widget_layout\n{\n  display:flex;\n       align-items:center;\n  }\n#uc_circle_number_widget_elementor_f66174a .circle_number_widget\n{\n  display:inline-flex;\n  align-items:center;\n  justify-content:center;\n  position:relative;\n  transform:rotate(deg);\n    }\n\n#uc_circle_number_widget_elementor_f66174a .circle_number_text\n{\n  transform:rotate(-deg);\n}\n\n\n\n\n\n#uc_circle_number_widget_elementor_f66174a .ue-number-container, #uc_circle_number_widget_elementor_f66174a .ue-spacing\n{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n.circle_number_widget\n{\n  font-size:32px;\n}\n.ue-title\n{\n  font-size:21px;\n}\n\n\n@keyframes pulseuc_circle_number_widget_elementor_f66174a {\n\t 0% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n\t\n\t70% {\n\t\ttransform: scale(1);\n\t\tbox-shadow: 0 0 0 20px #b6b6b6;\n\t}\n\t\n\t100% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n}\n\n<\/style>\n\n<div id=\"uc_circle_number_widget_elementor_f66174a\" class=\"circle_number_widget_container\">\n  \n        <div class=\"circle_number_widget_layout\">\n      \n    <div class=\"ue-number-container\"> \n    <div class=\"circle_number_widget\">\n      <div class=\"circle_number_text\">1<\/div>\n    <\/div>\n    <\/div>\n    \n          <div class=\"ue-spacing\"><\/div>\n        \n    <div class=\"ue-widget-content\">\n    <div class=\"ue-title\">1.\tZv\u00fd\u0161enie bezpe\u010dnostn\u00e9ho povedomia. <\/div>    <div class=\"ue-description\">Zv\u00fd\u0161i\u0165 informovanos\u0165 zamestnancov verejnej spr\u00e1vy, \u0161tudentov vysok\u00fdch a stredn\u00fdch \u0161k\u00f4l o kybernetickej bezpe\u010dnosti.<\/div>    <\/div>\n  \n  \n    <\/div>\n    <\/div>\n<!-- end Number Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aaaa440 elementor-widget elementor-widget-ucaddon_circle_number_widget\" data-id=\"aaaa440\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_circle_number_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Number Box -->\n<style>\/* widget: Number Box *\/\n\n#uc_circle_number_widget_elementor_aaaa440 .circle_number_widget_layout\n{\n  display:flex;\n       align-items:center;\n  }\n#uc_circle_number_widget_elementor_aaaa440 .circle_number_widget\n{\n  display:inline-flex;\n  align-items:center;\n  justify-content:center;\n  position:relative;\n  transform:rotate(deg);\n    }\n\n#uc_circle_number_widget_elementor_aaaa440 .circle_number_text\n{\n  transform:rotate(-deg);\n}\n\n\n\n\n\n#uc_circle_number_widget_elementor_aaaa440 .ue-number-container, #uc_circle_number_widget_elementor_aaaa440 .ue-spacing\n{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n.circle_number_widget\n{\n  font-size:32px;\n}\n.ue-title\n{\n  font-size:21px;\n}\n\n\n@keyframes pulseuc_circle_number_widget_elementor_aaaa440 {\n\t 0% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n\t\n\t70% {\n\t\ttransform: scale(1);\n\t\tbox-shadow: 0 0 0 20px #b6b6b6;\n\t}\n\t\n\t100% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n}\n\n<\/style>\n\n<div id=\"uc_circle_number_widget_elementor_aaaa440\" class=\"circle_number_widget_container\">\n  \n        <div class=\"circle_number_widget_layout\">\n      \n    <div class=\"ue-number-container\"> \n    <div class=\"circle_number_widget\">\n      <div class=\"circle_number_text\">2<\/div>\n    <\/div>\n    <\/div>\n    \n          <div class=\"ue-spacing\"><\/div>\n        \n    <div class=\"ue-widget-content\">\n    <div class=\"ue-title\">2.\tVzdel\u00e1vanie odborn\u00edkov.<\/div>    <div class=\"ue-description\">Vychov\u00e1va\u0165 nov\u00fdch kvalifikovan\u00fdch odborn\u00edkov v oblasti informa\u010dnej a kybernetickej bezpe\u010dnosti (KIB) prostredn\u00edctvom vytvorenia \u0161tudijn\u00e9ho pl\u00e1nu magistersk\u00e9ho programu aplikovanej informatiky so zameran\u00edm na KIB a \u0161kolen\u00ed pre verejn\u00fd sektor.<\/div>    <\/div>\n  \n  \n    <\/div>\n    <\/div>\n<!-- end Number Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6383c5f elementor-widget elementor-widget-ucaddon_circle_number_widget\" data-id=\"6383c5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_circle_number_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Number Box -->\n<style>\/* widget: Number Box *\/\n\n#uc_circle_number_widget_elementor_6383c5f .circle_number_widget_layout\n{\n  display:flex;\n       align-items:center;\n  }\n#uc_circle_number_widget_elementor_6383c5f .circle_number_widget\n{\n  display:inline-flex;\n  align-items:center;\n  justify-content:center;\n  position:relative;\n  transform:rotate(deg);\n    }\n\n#uc_circle_number_widget_elementor_6383c5f .circle_number_text\n{\n  transform:rotate(-deg);\n}\n\n\n\n\n\n#uc_circle_number_widget_elementor_6383c5f .ue-number-container, #uc_circle_number_widget_elementor_6383c5f .ue-spacing\n{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n.circle_number_widget\n{\n  font-size:32px;\n}\n.ue-title\n{\n  font-size:21px;\n}\n\n\n@keyframes pulseuc_circle_number_widget_elementor_6383c5f {\n\t 0% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n\t\n\t70% {\n\t\ttransform: scale(1);\n\t\tbox-shadow: 0 0 0 20px #b6b6b6;\n\t}\n\t\n\t100% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n}\n\n<\/style>\n\n<div id=\"uc_circle_number_widget_elementor_6383c5f\" class=\"circle_number_widget_container\">\n  \n        <div class=\"circle_number_widget_layout\">\n      \n    <div class=\"ue-number-container\"> \n    <div class=\"circle_number_widget\">\n      <div class=\"circle_number_text\">3<\/div>\n    <\/div>\n    <\/div>\n    \n          <div class=\"ue-spacing\"><\/div>\n        \n    <div class=\"ue-widget-content\">\n    <div class=\"ue-title\">3.\tV\u00fdskum kybernetick\u00fdch hrozieb.<\/div>    <div class=\"ue-description\">Identifikova\u0165 a analyzova\u0165 kybernetick\u00e9 hrozby, navrhova\u0165 adekv\u00e1tne reakcie a posil\u0148ova\u0165 v\u00fdskumn\u00fd potenci\u00e1l publikovan\u00edm vedeck\u00fdch v\u00fdstupov a vytv\u00e1ran\u00edm nov\u00fdch v\u00fdskumn\u00fdch spolupr\u00e1c.Identifikova\u0165 a analyzova\u0165 kybernetick\u00e9 hrozby, navrhova\u0165 adekv\u00e1tne reakcie a posil\u0148ova\u0165 v\u00fdskumn\u00fd potenci\u00e1l publikovan\u00edm vedeck\u00fdch v\u00fdstupov a vytv\u00e1ran\u00edm nov\u00fdch v\u00fdskumn\u00fdch spolupr\u00e1c.<\/div>    <\/div>\n  \n  \n    <\/div>\n    <\/div>\n<!-- end Number Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d83f9e elementor-widget elementor-widget-ucaddon_circle_number_widget\" data-id=\"2d83f9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_circle_number_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Number Box -->\n<style>\/* widget: Number Box *\/\n\n#uc_circle_number_widget_elementor_2d83f9e .circle_number_widget_layout\n{\n  display:flex;\n       align-items:center;\n  }\n#uc_circle_number_widget_elementor_2d83f9e .circle_number_widget\n{\n  display:inline-flex;\n  align-items:center;\n  justify-content:center;\n  position:relative;\n  transform:rotate(deg);\n    }\n\n#uc_circle_number_widget_elementor_2d83f9e .circle_number_text\n{\n  transform:rotate(-deg);\n}\n\n\n\n\n\n#uc_circle_number_widget_elementor_2d83f9e .ue-number-container, #uc_circle_number_widget_elementor_2d83f9e .ue-spacing\n{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n.circle_number_widget\n{\n  font-size:32px;\n}\n.ue-title\n{\n  font-size:21px;\n}\n\n\n@keyframes pulseuc_circle_number_widget_elementor_2d83f9e {\n\t 0% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n\t\n\t70% {\n\t\ttransform: scale(1);\n\t\tbox-shadow: 0 0 0 20px #b6b6b6;\n\t}\n\t\n\t100% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n}\n\n<\/style>\n\n<div id=\"uc_circle_number_widget_elementor_2d83f9e\" class=\"circle_number_widget_container\">\n  \n        <div class=\"circle_number_widget_layout\">\n      \n    <div class=\"ue-number-container\"> \n    <div class=\"circle_number_widget\">\n      <div class=\"circle_number_text\">4<\/div>\n    <\/div>\n    <\/div>\n    \n          <div class=\"ue-spacing\"><\/div>\n        \n    <div class=\"ue-widget-content\">\n    <div class=\"ue-title\">4.\tZv\u00fd\u0161enie operat\u00edvnej bezpe\u010dnosti.<\/div>    <div class=\"ue-description\">Poskytova\u0165 expertn\u00e9 \u010dinnosti prostredn\u00edctvom CSIRT t\u00edmu pre r\u00fdchlej\u0161iu reakciu na kybernetick\u00e9 incidenty vo verejnej spr\u00e1ve.\n\n\n\n<\/div>    <\/div>\n  \n  \n    <\/div>\n    <\/div>\n<!-- end Number Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3be5ea7 elementor-widget elementor-widget-ucaddon_circle_number_widget\" data-id=\"3be5ea7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_circle_number_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Number Box -->\n<style>\/* widget: Number Box *\/\n\n#uc_circle_number_widget_elementor_3be5ea7 .circle_number_widget_layout\n{\n  display:flex;\n       align-items:center;\n  }\n#uc_circle_number_widget_elementor_3be5ea7 .circle_number_widget\n{\n  display:inline-flex;\n  align-items:center;\n  justify-content:center;\n  position:relative;\n  transform:rotate(deg);\n    }\n\n#uc_circle_number_widget_elementor_3be5ea7 .circle_number_text\n{\n  transform:rotate(-deg);\n}\n\n\n\n\n\n#uc_circle_number_widget_elementor_3be5ea7 .ue-number-container, #uc_circle_number_widget_elementor_3be5ea7 .ue-spacing\n{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n.circle_number_widget\n{\n  font-size:32px;\n}\n.ue-title\n{\n  font-size:21px;\n}\n\n\n@keyframes pulseuc_circle_number_widget_elementor_3be5ea7 {\n\t 0% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n\t\n\t70% {\n\t\ttransform: scale(1);\n\t\tbox-shadow: 0 0 0 20px #b6b6b6;\n\t}\n\t\n\t100% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n}\n\n<\/style>\n\n<div id=\"uc_circle_number_widget_elementor_3be5ea7\" class=\"circle_number_widget_container\">\n  \n        <div class=\"circle_number_widget_layout\">\n      \n    <div class=\"ue-number-container\"> \n    <div class=\"circle_number_widget\">\n      <div class=\"circle_number_text\">5<\/div>\n    <\/div>\n    <\/div>\n    \n          <div class=\"ue-spacing\"><\/div>\n        \n    <div class=\"ue-widget-content\">\n    <div class=\"ue-title\">5.\tMedzin\u00e1rodn\u00e1 spolupr\u00e1ca a konzult\u00e1cie.<\/div>    <div class=\"ue-description\">Realizova\u0165 spolupr\u00e1cu s medzin\u00e1rodn\u00fdmi akademick\u00fdmi partnermi a podporova\u0165 pr\u00edpravu projektov v oblasti KIB.<\/div>    <\/div>\n  \n  \n    <\/div>\n    <\/div>\n<!-- end Number Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be8ade6 elementor-widget elementor-widget-ucaddon_circle_number_widget\" data-id=\"be8ade6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_circle_number_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Number Box -->\n<style>\/* widget: Number Box *\/\n\n#uc_circle_number_widget_elementor_be8ade6 .circle_number_widget_layout\n{\n  display:flex;\n       align-items:center;\n  }\n#uc_circle_number_widget_elementor_be8ade6 .circle_number_widget\n{\n  display:inline-flex;\n  align-items:center;\n  justify-content:center;\n  position:relative;\n  transform:rotate(deg);\n    }\n\n#uc_circle_number_widget_elementor_be8ade6 .circle_number_text\n{\n  transform:rotate(-deg);\n}\n\n\n\n\n\n#uc_circle_number_widget_elementor_be8ade6 .ue-number-container, #uc_circle_number_widget_elementor_be8ade6 .ue-spacing\n{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n.circle_number_widget\n{\n  font-size:32px;\n}\n.ue-title\n{\n  font-size:21px;\n}\n\n\n@keyframes pulseuc_circle_number_widget_elementor_be8ade6 {\n\t 0% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n\t\n\t70% {\n\t\ttransform: scale(1);\n\t\tbox-shadow: 0 0 0 20px #b6b6b6;\n\t}\n\t\n\t100% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n}\n\n<\/style>\n\n<div id=\"uc_circle_number_widget_elementor_be8ade6\" class=\"circle_number_widget_container\">\n  \n        <div class=\"circle_number_widget_layout\">\n      \n    <div class=\"ue-number-container\"> \n    <div class=\"circle_number_widget\">\n      <div class=\"circle_number_text\">6<\/div>\n    <\/div>\n    <\/div>\n    \n          <div class=\"ue-spacing\"><\/div>\n        \n    <div class=\"ue-widget-content\">\n    <div class=\"ue-title\">6.\tVzdel\u00e1vacie a osvetov\u00e9 aktivity.<\/div>    <div class=\"ue-description\">Vytv\u00e1ra\u0165 a modifikova\u0165 predmety, realizova\u0165 \u0161kolenia, podporova\u0165 KyberT\u00edmy na stredn\u00fdch \u0161kol\u00e1ch a organizova\u0165 kampane na zv\u00fd\u0161enie bezpe\u010dnostn\u00e9ho povedomia.<\/div>    <\/div>\n  \n  \n    <\/div>\n    <\/div>\n<!-- end Number Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7596ce5 elementor-widget elementor-widget-ucaddon_circle_number_widget\" data-id=\"7596ce5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_circle_number_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Number Box -->\n<style>\/* widget: Number Box *\/\n\n#uc_circle_number_widget_elementor_7596ce5 .circle_number_widget_layout\n{\n  display:flex;\n       align-items:center;\n  }\n#uc_circle_number_widget_elementor_7596ce5 .circle_number_widget\n{\n  display:inline-flex;\n  align-items:center;\n  justify-content:center;\n  position:relative;\n  transform:rotate(deg);\n    }\n\n#uc_circle_number_widget_elementor_7596ce5 .circle_number_text\n{\n  transform:rotate(-deg);\n}\n\n\n\n\n\n#uc_circle_number_widget_elementor_7596ce5 .ue-number-container, #uc_circle_number_widget_elementor_7596ce5 .ue-spacing\n{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n.circle_number_widget\n{\n  font-size:32px;\n}\n.ue-title\n{\n  font-size:21px;\n}\n\n\n@keyframes pulseuc_circle_number_widget_elementor_7596ce5 {\n\t 0% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n\t\n\t70% {\n\t\ttransform: scale(1);\n\t\tbox-shadow: 0 0 0 20px #b6b6b6;\n\t}\n\t\n\t100% {\n\t\ttransform: scale(0.95);\n\t\tbox-shadow: 0 0 0 0 #b6b6b6;\n\t}\n}\n\n<\/style>\n\n<div id=\"uc_circle_number_widget_elementor_7596ce5\" class=\"circle_number_widget_container\">\n  \n        <div class=\"circle_number_widget_layout\">\n      \n    <div class=\"ue-number-container\"> \n    <div class=\"circle_number_widget\">\n      <div class=\"circle_number_text\">7<\/div>\n    <\/div>\n    <\/div>\n    \n          <div class=\"ue-spacing\"><\/div>\n        \n    <div class=\"ue-widget-content\">\n    <div class=\"ue-title\">7.\tPosilnenie CSIRT t\u00edmu<\/div>    <div class=\"ue-description\">Vybavi\u0165 a vzdel\u00e1va\u0165 univerzitn\u00fd CSIRT t\u00edm na poskytovanie expertn\u00fdch slu\u017eieb pre akreditovan\u00e9 CSIRT t\u00edmy na Slovensku.<\/div>    <\/div>\n  \n  \n    <\/div>\n    <\/div>\n<!-- end Number Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Star\u0161ie vedeck\u00e9 \u010dl\u00e1nky Star\u0161ie vedeck\u00e9 \u010dl\u00e1nky Liability regime of online platforms new approaches and perspectives Autor: Mgr. Eva Markov\u00e1 \u0160kolite\u013e: RNDr. JUDr. Pavol Sokol, PhD. Analysis of the Infection and the Injection Phases of the Telnet Botnets Autor: Mgr. Eva Markov\u00e1 \u0160kolite\u013e: RNDr. JUDr. Pavol Sokol, PhD. Virtual honeypots and detection of telnet botnets Autor: [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-4834","page","type-page","status-publish","hentry","entry","has-media"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=4834"}],"version-history":[{"count":44,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4834\/revisions"}],"predecessor-version":[{"id":9104,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4834\/revisions\/9104"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=4834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}