{"id":9197,"date":"2026-04-07T00:11:04","date_gmt":"2026-04-06T22:11:04","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=9197"},"modified":"2026-04-07T13:42:54","modified_gmt":"2026-04-07T11:42:54","slug":"vyskumna-cinnost-kc-kb-upjs","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/vyskumna-cinnost-kc-kb-upjs\/","title":{"rendered":"V\u00fdskumn\u00e1 \u010dinnos\u0165 KC KB UPJ\u0160"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"9197\" class=\"elementor elementor-9197\">\n\t\t\t\t<div class=\"elementor-element elementor-element-223f7a4 elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"223f7a4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-372602a elementor-widget elementor-widget-spacer\" data-id=\"372602a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bc807c elementor-widget elementor-widget-heading\" data-id=\"1bc807c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Research work<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c5ef35 elementor-widget elementor-widget-heading\" data-id=\"8c5ef35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">KC KB UPJ\u0160<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da1a107 elementor-widget elementor-widget-spacer\" data-id=\"da1a107\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e6b440a elementor-hidden-desktop elementor-hidden-laptop e-flex e-con-boxed e-con e-parent\" data-id=\"e6b440a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c91527f elementor-widget elementor-widget-spacer\" data-id=\"c91527f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-514fd91 elementor-widget elementor-widget-heading\" data-id=\"514fd91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Research work<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16f0591 elementor-widget elementor-widget-heading\" data-id=\"16f0591\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">KC KB UPJ\u0160<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e664943 elementor-widget elementor-widget-spacer\" data-id=\"e664943\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0dbe076 e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-flex e-con-boxed e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08e91a9 elementor-widget elementor-widget-text-editor\" data-id=\"08e91a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The research activities of the Competence Center for Cybersecurity at UPJ\u0160 (KC KB UPJ\u0160) are focused on connecting theoretical and applied research in the field of information and cybersecurity (KIB). Researchers are engaged in the systematic collection, processing and analysis of data, the designing of new methodologies and the application of advanced analytical approaches (machine learning, data analysis) with the aim of increasing the level of protection of information systems and understanding of cybersecurity threats. Emphasis is placed on the practical usability of the results in the form of tools, methodologies and decision-making support for security practice.<\/p><h2>Research Focuses of the KC KB UPJ\u0160<\/h2><h3><span style=\"color: #ff6600;\"><strong>1. Situational Awareness in Cybersecurity<\/strong><\/span><\/h3><p>A significant part of the research is devoted to modeling and predicting the security situation in cyberspace. The research covers all three levels of situational awareness \u2013 perception, understanding and projection of the future development of security events. Time series methods and neural networks (e.g. LSTM) are mainly used to predict security incidents and trends.<\/p><h3><span style=\"color: #ff6600;\"><strong>2. Application of Machine Learning and Artificial Intelligence in Cybersecurity<\/strong><\/span><\/h3><p>The research includes the implementation of machine learning methods of artificial intelligence in the analysis of security data, including malware detection, behavioral analysis and processing of large data sets. Special attention is paid to the automation of the response to cyber security incidents, the implementation of digital forensic analysis and the detection of cyber threats.<\/p><h3><span style=\"color: #ff6600;\"><strong>3. Analysis of legal aspects of cybersecurity and artificial intelligence<\/strong><\/span><\/h3><p>The research connects technical and legal aspects of cybersecurity, especially in the areas of artificial intelligence regulation, data protection and liability for damages. It focuses on the analysis of EU legal frameworks (e.g. GDPR, NIS2, AI Act) and their application in practice, while identifying areas of legal uncertainty and proposing solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d817e50 elementor-widget elementor-widget-text-editor\" data-id=\"d817e50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Sub-activities of the KC KB UPJ\u0160 in the research area<\/strong><\/h2><h3><strong><span style=\"color: #ff6600;\">1. Scientific publications<\/span><\/strong><\/h3><p>The research activities of the KC KB UPJ\u0160 are presented through scientific publications published in international conferences and journals. Publication outputs cover areas such as cyber situational awareness, time series analysis of security events, digital forensic analysis and application of AI in security.<\/p><p><strong>List of articles<\/strong> can be found <a href=\"https:\/\/cyberawareness.sk\/en\/vedecke-clanky\/\">at this link<\/a>.<\/p><p><strong>Older articles<\/strong> by members of the KC KB UPJ\u0160 in the field of cybersecurity, data protection and cybercrime can be found <a href=\"https:\/\/cyberawareness.sk\/en\/vyskum_clanky\/\">at this link<\/a>.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6e6ccb elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a6e6ccb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a198a58 elementor-widget elementor-widget-text-editor\" data-id=\"a198a58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #ff6600;\"><strong>2. Analysis of current approaches and trends in cybersecurity research (state of the art)<\/strong><\/span><\/h3><p>The KC KB UPJ\u0160 systematically monitors and analyses current approaches and trends in cybersecurity research, especially in the field of data analysis and artificial intelligence. The result is the creation of overviews of research directions, identification of new challenges and formulation of research topics.<\/p><p>Analysis of current approaches and trends in the areas of:<\/p><h4><strong> Cyber \u200b\u200bSituational Awareness<\/strong><\/h4><p>Research in this area focuses on modeling the security situation in cyberspace through three levels, namely perception, understanding and projection of future developments. The emphasis is on processing large volumes of heterogeneous data (e.g. logs, IDS alerts, network traffic) and transforming them into understandable analytical outputs for operators. An important research topic is the prediction of cyber security incidents using methods such as time series, Bayesian networks or Markov models. The research also reflects challenges such as \"data overload\", the lack of quality datasets and the need for real-time analysis.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6aa6293 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"6aa6293\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_Sietove_situacne_povedomie.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-powerpoint\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm72-60V236c0-6.6 5.4-12 12-12h69.2c36.7 0 62.8 27 62.8 66.3 0 74.3-68.7 66.5-95.5 66.5V404c0 6.6-5.4 12-12 12H132c-6.6 0-12-5.4-12-12zm48.5-87.4h23c7.9 0 13.9-2.4 18.1-7.2 8.5-9.8 8.4-28.5.1-37.8-4.1-4.6-9.9-7-17.4-7h-23.9v52z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Presentation - Situational Awareness in Cybersecurity<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_Sietove_situacne_povedomie_clanky.xlsx\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-excel\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm212-240h-28.8c-4.4 0-8.4 2.4-10.5 6.3-18 33.1-22.2 42.4-28.6 57.7-13.9-29.1-6.9-17.3-28.6-57.7-2.1-3.9-6.2-6.3-10.6-6.3H124c-9.3 0-15 10-10.4 18l46.3 78-46.3 78c-4.7 8 1.1 18 10.4 18h28.9c4.4 0 8.4-2.4 10.5-6.3 21.7-40 23-45 28.6-57.7 14.9 30.2 5.9 15.9 28.6 57.7 2.1 3.9 6.2 6.3 10.6 6.3H260c9.3 0 15-10 10.4-18L224 320c.7-1.1 30.3-50.5 46.3-78 4.7-8-1.1-18-10.3-18z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">List of Articles - Situational Awareness in Cybersecurity<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c535440 elementor-widget elementor-widget-text-editor\" data-id=\"c535440\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Formal Concept Analysis <\/strong><\/h4><p>Research in this area focuses on the use of formal concept analysis (FCA) as a mathematical tool for identifying relationships, patterns, and anomalies in cybersecurity data. FCA allows for the structuring of digital traces, the analysis of temporal relationships, and the support of forensic analysts' decision-making. Research also includes applications in fraud detection, malware analysis, and phishing attacks, with an emphasis on the interpretability of results. Current trends are towards extensions of FCA (e.g. fuzzy FCA or combination with TF-IDF and machine learning methods) for processing complex and large-scale data<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8cec1c elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"d8cec1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_KB_FCA.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-powerpoint\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm72-60V236c0-6.6 5.4-12 12-12h69.2c36.7 0 62.8 27 62.8 66.3 0 74.3-68.7 66.5-95.5 66.5V404c0 6.6-5.4 12-12 12H132c-6.6 0-12-5.4-12-12zm48.5-87.4h23c7.9 0 13.9-2.4 18.1-7.2 8.5-9.8 8.4-28.5.1-37.8-4.1-4.6-9.9-7-17.4-7h-23.9v52z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Presentation - Formal Concept Analysis<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_KB_FCA_clanky.xlsx\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-excel\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm212-240h-28.8c-4.4 0-8.4 2.4-10.5 6.3-18 33.1-22.2 42.4-28.6 57.7-13.9-29.1-6.9-17.3-28.6-57.7-2.1-3.9-6.2-6.3-10.6-6.3H124c-9.3 0-15 10-10.4 18l46.3 78-46.3 78c-4.7 8 1.1 18 10.4 18h28.9c4.4 0 8.4-2.4 10.5-6.3 21.7-40 23-45 28.6-57.7 14.9 30.2 5.9 15.9 28.6 57.7 2.1 3.9 6.2 6.3 10.6 6.3H260c9.3 0 15-10 10.4-18L224 320c.7-1.1 30.3-50.5 46.3-78 4.7-8-1.1-18-10.3-18z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">List of articles - Formal Concept Analysis<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89fe488 elementor-widget elementor-widget-text-editor\" data-id=\"89fe488\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Artificial Intelligence and Large Language Models in Cybersecurity<\/strong><\/h4><p>Research in this area focuses on the use of advanced artificial intelligence techniques, especially deep learning and transformer architectures, in the detection and analysis of cyber security threats. Modern approaches allow the processing of various types of data (binary files, API calls, network communication) and the capture of complex relationships between them. A significant trend is the transition from manually designed features to end-to-end models and the use of \"self-supervised learning\". Research also addresses the issues of efficiency, interpretability and scalability of models in practical deployment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c29b88 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"3c29b88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_KB_LLMs.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-powerpoint\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm72-60V236c0-6.6 5.4-12 12-12h69.2c36.7 0 62.8 27 62.8 66.3 0 74.3-68.7 66.5-95.5 66.5V404c0 6.6-5.4 12-12 12H132c-6.6 0-12-5.4-12-12zm48.5-87.4h23c7.9 0 13.9-2.4 18.1-7.2 8.5-9.8 8.4-28.5.1-37.8-4.1-4.6-9.9-7-17.4-7h-23.9v52z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Presentation - Artificial Intelligence and Large Language Models in Cybersecurity<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_KB_LLMs_clanky.xlsx\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-excel\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm212-240h-28.8c-4.4 0-8.4 2.4-10.5 6.3-18 33.1-22.2 42.4-28.6 57.7-13.9-29.1-6.9-17.3-28.6-57.7-2.1-3.9-6.2-6.3-10.6-6.3H124c-9.3 0-15 10-10.4 18l46.3 78-46.3 78c-4.7 8 1.1 18 10.4 18h28.9c4.4 0 8.4-2.4 10.5-6.3 21.7-40 23-45 28.6-57.7 14.9 30.2 5.9 15.9 28.6 57.7 2.1 3.9 6.2 6.3 10.6 6.3H260c9.3 0 15-10 10.4-18L224 320c.7-1.1 30.3-50.5 46.3-78 4.7-8-1.1-18-10.3-18z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">List of articles - Artificial Intelligence and Large Language Models in Cybersecurity<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-258bb20 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"258bb20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cffe949 elementor-widget elementor-widget-text-editor\" data-id=\"cffe949\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #ff6600;\"><strong>3. Datasets for cybersecurity research<\/strong><\/span><\/h3><p>KC KB UPJ\u0160 is actively involved in the creation and provision of datasets for cybersecurity research, including data from honeypots and security sensors. These datasets enable realistic experimentation, testing of detection algorithms and validation of research approaches. At the same time, they solve one of the key problems of research \u2013 the lack of high-quality and annotated data for security incident analysis.<\/p><p><strong>Datasets<\/strong> are available <a href=\"https:\/\/cyberawareness.sk\/en\/datasety-2\/\">at this link.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff525af elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ff525af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2de1c84 elementor-widget elementor-widget-text-editor\" data-id=\"2de1c84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><strong><span style=\"color: #ff6600;\">4. PhD projects (VVGS UPJ\u0160)<\/span><\/strong><\/h3><p>The VVGS UPJ\u0160 grant scheme supports research activities of PhD students and young scientists that are thematically related to the research areas of KC KB UPJ\u0160.<\/p><p><strong>Description of the call<\/strong> can be found <a href=\"https:\/\/portal.ccvapp.upjs.sk\/grant-call\/580\/view_history_grant_calls\">at this link<\/a>.\u00a0<\/p><p><strong>List of calls<\/strong> can be found <a href=\"https:\/\/portal.ccvapp.upjs.sk\/history-grant-calls\/vvgs-kc-kb\">at this link<\/a>.\u00a0<\/p><p><strong>List of supported projects<\/strong> can be found <a href=\"https:\/\/portal.ccvapp.upjs.sk\/projects\/vvgs-kc-kb\">at this link<\/a>The projects focus on:<\/p><ul><li>legal aspects of AI and cybersecurity, including data protection and liability,<\/li><li>research into disinformation and hybrid threats in the information space and their impact on cybersecurity,<\/li><li>application of formal concept analysis to cybersecurity data to identify patterns and anomalies in alerts from detection systems (e.g. IDS).<\/li><\/ul><h4><strong>Description of supported projects <\/strong><\/h4><p><strong>Legal aspects of artificial intelligence and cybersecurity: Data protection and liability in the time of cyber threats<\/strong><\/p><p>The project focused on analyzing the legal aspects of the use of artificial intelligence in the context of cybersecurity, especially from the perspective of data protection and liability for damage caused by AI systems. The main output was a scientific publication that systematically analyzes the legal frameworks of the European Union, including the AI \u200b\u200bAct, GDPR and the NIS2 Directive. The research identified several areas of legal uncertainty, such as issues of liability for autonomous systems or the conflict between data protection and the needs of training AI models. The results were presented at professional events and within the framework of international scientific mobility, thus contributing to their validation and dissemination in the academic community. The project also strengthened interdisciplinary research at the interface of law and technology and created a basis for further scientific activities in this area. Published article \u2013 <b>Legal aspects of artificial intelligence and cybersecurity: data protection and liability in the era of cyber threats<\/b> (<a href=\"https:\/\/unibook.upjs.sk\/img\/cms\/2026\/Pr%C3%A1vF\/poe-2025.pdf\">link to article<\/a>).<\/p><p><strong>Challenges of information security: Disinformation as a tool of hybrid action<\/strong><\/p><p>The project focused on researching disinformation campaigns and their role within hybrid threats in the information space. The research made it possible to identify dominant narratives, analyze factors influencing the spread of disinformation and reveal the main vulnerabilities of the information environment in the countries of Central and Eastern Europe and the Baltics. A significant result was also a comparative assessment of the approaches of individual states to the protection of the information space. The project contributed to the expansion of professional knowledge through a scientific article and the establishment of international cooperation, including research trips and expert consultations. The knowledge gained provides a basis for designing more effective defense mechanisms against hybrid information threats.\u00a0<\/p><p><strong>Application of formal concept analysis methods to cybersecurity data<\/strong><\/p><p>The project focused on researching disinformation campaigns and their role within hybrid threats in the information space. The research made it possible to identify dominant narratives, analyze factors influencing the spread of disinformation and reveal the main vulnerabilities of the information environment in the countries of Central and Eastern Europe and the Baltics. A significant result was also a comparative assessment of the approaches of individual states to the protection of the information space. The project contributed to the expansion of professional knowledge through a scientific article and the establishment of international cooperation, including research trips and expert consultations. The knowledge gained provides a basis for designing more effective defense mechanisms against hybrid information threats.\n\nApplication of formal concept analysis methods to cybersecurity data\n\nThe project focused on applying formal concept analysis (FCA) methods to cybersecurity data in order to identify patterns, dependencies and anomalies in IDS alerts. The research worked with the CIC-IDS2017 dataset and used the Snort tool with various rule sets for generating and analyzing alerts. A significant contribution was the extension of the classic FCA approach to the attribute implication chaining method, which allows linking knowledge from multiple data contexts. The results showed that FCA is a suitable tool not only for knowledge extraction, but also for supporting situational awareness and identifying anomalous phenomena in security data. The project output was a scientific article presented at an international conference, while the results were also discussed in a foreign academic environment, which supported their further validation and development. Published article \u2013 <strong>Formal Concept Analysis as a Framework for Cyber Situational Awareness<\/strong> (<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/11280113\">link to article<\/a>).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>V\u00fdskumn\u00e1 \u010dinnos\u0165 KC KB UPJ\u0160 V\u00fdskumn\u00e1 \u010dinnos\u0165 KC KB UPJ\u0160 V\u00fdskumn\u00e1 \u010dinnos\u0165 Kompeten\u010dn\u00e9ho centra kybernetickej bezpe\u010dnosti na UPJ\u0160 (KC KB UPJ\u0160) je zameran\u00e1 na prepojenie teoretick\u00e9ho a aplikovan\u00e9ho v\u00fdskumu v oblasti informa\u010dnej a kybernetickej bezpe\u010dnosti (KIB). V\u00fdskumn\u00edci sa venuj\u00fa systematick\u00e9mu zberu, spracovaniu a anal\u00fdze d\u00e1t, n\u00e1vrhu nov\u00fdch metod\u00edk a aplik\u00e1cii pokro\u010dil\u00fdch analytick\u00fdch pr\u00edstupov (strojov\u00e9 u\u010denie, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-9197","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/9197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=9197"}],"version-history":[{"count":31,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/9197\/revisions"}],"predecessor-version":[{"id":9353,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/9197\/revisions\/9353"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=9197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}