{"id":9197,"date":"2026-04-07T00:11:04","date_gmt":"2026-04-06T22:11:04","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=9197"},"modified":"2026-04-07T01:27:12","modified_gmt":"2026-04-06T23:27:12","slug":"vyskumna-cinnost-kc-kb-upjs","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/vyskumna-cinnost-kc-kb-upjs\/","title":{"rendered":"V\u00fdskumn\u00e1 \u010dinnos\u0165 KC KB UPJ\u0160"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"9197\" class=\"elementor elementor-9197\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbe076 elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-flex e-con-boxed e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b46c502 elementor-widget elementor-widget-spacer\" data-id=\"b46c502\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1cbd28 elementor-widget elementor-widget-heading\" data-id=\"b1cbd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">V\u00fdskumn\u00e1 \u010dinnos\u0165<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d96ee1 elementor-widget elementor-widget-heading\" data-id=\"0d96ee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">KC KB UPJ\u0160<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08e91a9 elementor-widget elementor-widget-text-editor\" data-id=\"08e91a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>V\u00fdskumn\u00e1 \u010dinnos\u0165 Kompeten\u010dn\u00e9ho centra kybernetickej bezpe\u010dnosti na UPJ\u0160 (KC KB UPJ\u0160) je zameran\u00e1 na prepojenie teoretick\u00e9ho a aplikovan\u00e9ho v\u00fdskumu v oblasti informa\u010dnej a kybernetickej bezpe\u010dnosti (KIB). V\u00fdskumn\u00edci sa venuj\u00fa systematick\u00e9mu zberu, spracovaniu a anal\u00fdze d\u00e1t, n\u00e1vrhu nov\u00fdch metod\u00edk a aplik\u00e1cii pokro\u010dil\u00fdch analytick\u00fdch pr\u00edstupov (strojov\u00e9 u\u010denie, d\u00e1tov\u00e1 anal\u00fdza) s cie\u013eom zvy\u0161ova\u0165 \u00farove\u0148 ochrany informa\u010dn\u00fdch syst\u00e9mov a porozumenia kybernetick\u00fdm bezpe\u010dnostn\u00fdm hrozb\u00e1m. D\u00f4raz je kladen\u00fd na praktick\u00fa vyu\u017eite\u013enos\u0165 v\u00fdsledkov vo forme n\u00e1strojov, metod\u00edk a rozhodovac\u00edch podpor pre bezpe\u010dnostn\u00fa prax.<\/p><h2>V\u00fdskumn\u00e9 zamerania KC KB UPJ\u0160<\/h2><h3><span style=\"color: #ff6600;\"><strong>1. Situa\u010dn\u00e9 povedomie v kybernetickej bezpe\u010dnosti<\/strong><\/span><\/h3><p>V\u00fdznamn\u00e1 \u010das\u0165 v\u00fdskumu sa venuje modelovaniu a predikcii bezpe\u010dnostnej situ\u00e1cie v kybernetickom priestore. V\u00fdskum pokr\u00fdva v\u0161etky tri \u00farovne situa\u010dn\u00e9ho povedomia \u2013 vn\u00edmanie, porozumenie a projekciu bud\u00faceho v\u00fdvoja bezpe\u010dnostn\u00fdch udalost\u00ed. Vyu\u017e\u00edvaj\u00fa sa najm\u00e4 met\u00f3dy \u010dasov\u00fdch radov a neur\u00f3nov\u00e9 siete (napr. LSTM) na predikciu bezpe\u010dnostn\u00fdch incidentov a trendov.<\/p><h3><span style=\"color: #ff6600;\"><strong>2. Aplik\u00e1cia strojov\u00e9ho u\u010denia a umelej inteligencie v kybernetickej bezpe\u010dnosti<\/strong><\/span><\/h3><p>V\u00fdskum zah\u0155\u0148a implement\u00e1ciu met\u00f3d strojov\u00e9ho u\u010denia umelej inteligencie do anal\u00fdzy bezpe\u010dnostn\u00fdch d\u00e1t, vr\u00e1tane detekcie malv\u00e9ru, anal\u00fdzy spr\u00e1vania a spracovania ve\u013ek\u00fdch d\u00e1tov\u00fdch s\u00faborov. Osobitn\u00e1 pozornos\u0165 je venovan\u00e1 automatiz\u00e1cii reakcie na kybernetick\u00e9 bezpe\u010dnostn\u00e9 incidenty, vykon\u00e1vanie digit\u00e1lnej forenznej anal\u00fdzy a detekcii kybernetick\u00fdch hrozieb.<\/p><h3><span style=\"color: #ff6600;\"><strong>3. Anal\u00fdza pr\u00e1vnych aspektov kybernetickej bezpe\u010dnosti a umelej inteligencie<\/strong><\/span><\/h3><p>V\u00fdskum prep\u00e1ja technick\u00e9 a pr\u00e1vne aspekty kybernetickej bezpe\u010dnosti najm\u00e4 v oblasti regul\u00e1cie umelej inteligencie, ochrany osobn\u00fdch \u00fadajov a zodpovednosti za \u0161kody. Zameriava sa na anal\u00fdzu pr\u00e1vnych r\u00e1mcov E\u00da (napr. GDPR, NIS2, AI Act) a ich aplik\u00e1ciu v praxi, pri\u010dom identifikuje oblasti pr\u00e1vnej neistoty a n\u00e1vrhy ich rie\u0161en\u00ed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d817e50 elementor-widget elementor-widget-text-editor\" data-id=\"d817e50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Podaktivity KC KB UPJ\u0160 vo v\u00fdskumnej oblasti<\/strong><\/h2><h3><strong><span style=\"color: #ff6600;\">1. Vedeck\u00e9 publik\u00e1cie<\/span><\/strong><\/h3><p>V\u00fdskumn\u00e9 aktivity KC KB UPJ\u0160 s\u00fa prezentovan\u00e9 prostredn\u00edctvom vedeck\u00fdch publik\u00e1ci\u00ed publikovan\u00fdch v medzin\u00e1rodn\u00fdch konferenci\u00e1ch a \u010dasopisoch. Publika\u010dn\u00e9 v\u00fdstupy pokr\u00fdvaj\u00fa oblasti ako kybernetick\u00e9 situa\u010dn\u00e9 povedomie, anal\u00fdza \u010dasov\u00fdch radov bezpe\u010dnostn\u00fdch udalost\u00ed, digit\u00e1lna forenzn\u00e1 anal\u00fdza \u010di aplik\u00e1cia AI v bezpe\u010dnosti.<\/p><p><strong>Zoznam \u010dl\u00e1nkov<\/strong> sa nach\u00e1dza na <a href=\"https:\/\/cyberawareness.sk\/en\/vedecke-clanky\/\">tomto odkaze<\/a>.<\/p><p><strong>Star\u0161ie \u010dl\u00e1nky<\/strong> \u010dlenov KC KB UPJ\u0160 v oblasti kybernetickej bezpe\u010dnosti, ochrany d\u00e1t a kyberkriminality sa nach\u00e1dzaj\u00fa na <a href=\"https:\/\/cyberawareness.sk\/en\/vyskum_clanky\/\">tomto odkaze<\/a>.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6e6ccb elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a6e6ccb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a198a58 elementor-widget elementor-widget-text-editor\" data-id=\"a198a58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #ff6600;\"><strong>2. Anal\u00fdza aktu\u00e1lnych pr\u00edstupov a trendov vo v\u00fdskume kybernetickej bezpe\u010dnosti (state of the art)<\/strong><\/span><\/h3><p>KC KB UPJ\u0160 systematicky sleduje a analyzuje aktu\u00e1lne pr\u00edstupy a trendy vo v\u00fdskume kybernetickej bezpe\u010dnosti najm\u00e4 v oblasti d\u00e1tovej anal\u00fdzy a umelej inteligencie. V\u00fdsledkom je tvorba preh\u013eadov v\u00fdskumn\u00fdch smerov, identifik\u00e1cia nov\u00fdch v\u00fdziev a formul\u00e1cia v\u00fdskumn\u00fdch t\u00e9m.<\/p><p>Anal\u00fdza aktu\u00e1lnych pr\u00edstupov a\u00a0trendov v\u00a0oblastiach:<\/p><h4><strong> Situa\u010dn\u00e9 povedomie v\u00a0kybernetickej bezpe\u010dnosti (Cyber Situational Awareness)<\/strong><\/h4><p>V\u00fdskum v tejto oblasti sa zameriava na modelovanie bezpe\u010dnostnej situ\u00e1cie v\u00a0kybernetickom priestore prostredn\u00edctvom troch \u00farovn\u00ed, a to vn\u00edmania, porozumenia a projekcie bud\u00faceho v\u00fdvoja. D\u00f4raz je kladen\u00fd na spracovanie ve\u013ek\u00e9ho objemu heterog\u00e9nnych d\u00e1t (napr. logy, IDS alerty, sie\u0165ov\u00e1 prev\u00e1dzka) a ich transform\u00e1ciu do zrozumite\u013en\u00fdch analytick\u00fdch v\u00fdstupov pre oper\u00e1torov. V\u00fdznamnou v\u00fdskumnou t\u00e9mou je predikcia kybernetick\u00fdch bezpe\u010dnostn\u00fdch incidentov pomocou met\u00f3d ako \u010dasov\u00e9 rady, Bayesovsk\u00e9 siete alebo Markovove modely. V\u00fdskum z\u00e1rove\u0148 reflektuje v\u00fdzvy ako \u201edata overload\u201c, nedostatok kvalitn\u00fdch datasetov a potrebu real-time anal\u00fdzy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6aa6293 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"6aa6293\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_Sietove_situacne_povedomie.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-powerpoint\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm72-60V236c0-6.6 5.4-12 12-12h69.2c36.7 0 62.8 27 62.8 66.3 0 74.3-68.7 66.5-95.5 66.5V404c0 6.6-5.4 12-12 12H132c-6.6 0-12-5.4-12-12zm48.5-87.4h23c7.9 0 13.9-2.4 18.1-7.2 8.5-9.8 8.4-28.5.1-37.8-4.1-4.6-9.9-7-17.4-7h-23.9v52z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prezent\u00e1cia - Situa\u010dn\u00e9 povedomie v\u00a0kybernetickej bezpe\u010dnosti<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_Sietove_situacne_povedomie_clanky.xlsx\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-excel\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm212-240h-28.8c-4.4 0-8.4 2.4-10.5 6.3-18 33.1-22.2 42.4-28.6 57.7-13.9-29.1-6.9-17.3-28.6-57.7-2.1-3.9-6.2-6.3-10.6-6.3H124c-9.3 0-15 10-10.4 18l46.3 78-46.3 78c-4.7 8 1.1 18 10.4 18h28.9c4.4 0 8.4-2.4 10.5-6.3 21.7-40 23-45 28.6-57.7 14.9 30.2 5.9 15.9 28.6 57.7 2.1 3.9 6.2 6.3 10.6 6.3H260c9.3 0 15-10 10.4-18L224 320c.7-1.1 30.3-50.5 46.3-78 4.7-8-1.1-18-10.3-18z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Zoznam \u010dl\u00e1nkov - Situa\u010dn\u00e9 povedomie v\u00a0kybernetickej bezpe\u010dnosti<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c535440 elementor-widget elementor-widget-text-editor\" data-id=\"c535440\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Form\u00e1lna konceptov\u00e1 anal\u00fdza <\/strong><\/h4><p>V\u00fdskum v tejto oblasti sa zameriava na vyu\u017eitie form\u00e1lnej konceptovej anal\u00fdzy (FCA) ako matematick\u00e9ho n\u00e1stroja na identifik\u00e1ciu vz\u0165ahov, vzorcov a anom\u00e1li\u00ed v d\u00e1tach kybernetickej bezpe\u010dnosti. FCA umo\u017e\u0148uje \u0161trukt\u00farova\u0165 digit\u00e1lne stopy, analyzova\u0165 \u010dasov\u00e9 s\u00favislosti a podporova\u0165 rozhodovanie forenzn\u00fdch analytikov. V\u00fdskum zah\u0155\u0148a aj aplik\u00e1cie v detekcii podvodov, anal\u00fdze malv\u00e9ru \u010di phishingov\u00fdch \u00fatokov, pri\u010dom d\u00f4raz je kladen\u00fd na interpretovate\u013enos\u0165 v\u00fdsledkov. Aktu\u00e1lne trendy smeruj\u00fa k roz\u0161\u00edreniam FCA (napr. fuzzy FCA alebo kombin\u00e1cia s TF-IDF a met\u00f3dami strojov\u00e9ho u\u010denia) pre spracovanie komplexn\u00fdch a ve\u013ekoobjemov\u00fdch d\u00e1t<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8cec1c elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"d8cec1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_KB_FCA.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-powerpoint\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm72-60V236c0-6.6 5.4-12 12-12h69.2c36.7 0 62.8 27 62.8 66.3 0 74.3-68.7 66.5-95.5 66.5V404c0 6.6-5.4 12-12 12H132c-6.6 0-12-5.4-12-12zm48.5-87.4h23c7.9 0 13.9-2.4 18.1-7.2 8.5-9.8 8.4-28.5.1-37.8-4.1-4.6-9.9-7-17.4-7h-23.9v52z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prezent\u00e1cia - Form\u00e1lna konceptov\u00e1 anal\u00fdza<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_KB_FCA_clanky.xlsx\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-excel\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm212-240h-28.8c-4.4 0-8.4 2.4-10.5 6.3-18 33.1-22.2 42.4-28.6 57.7-13.9-29.1-6.9-17.3-28.6-57.7-2.1-3.9-6.2-6.3-10.6-6.3H124c-9.3 0-15 10-10.4 18l46.3 78-46.3 78c-4.7 8 1.1 18 10.4 18h28.9c4.4 0 8.4-2.4 10.5-6.3 21.7-40 23-45 28.6-57.7 14.9 30.2 5.9 15.9 28.6 57.7 2.1 3.9 6.2 6.3 10.6 6.3H260c9.3 0 15-10 10.4-18L224 320c.7-1.1 30.3-50.5 46.3-78 4.7-8-1.1-18-10.3-18z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Zoznam \u010dl\u00e1nkov - Form\u00e1lna konceptov\u00e1 anal\u00fdza<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89fe488 elementor-widget elementor-widget-text-editor\" data-id=\"89fe488\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Umelej inteligencia a ve\u013ek\u00e9 jazykov\u00e9 modely v kybernetickej bezpe\u010dnosti<\/strong><\/h4><p>V\u00fdskum v tejto oblasti sa orientuje na vyu\u017eitie pokro\u010dil\u00fdch techn\u00edk umelej inteligencie najm\u00e4 hlbok\u00e9ho u\u010denia a transformerov\u00fdch architekt\u00far pri detekcii a anal\u00fdze kybernetick\u00fdch bezpe\u010dnostn\u00fdch hrozieb. Modern\u00e9 pr\u00edstupy umo\u017e\u0148uj\u00fa spracovanie r\u00f4znych typov d\u00e1t (bin\u00e1rne s\u00fabory, API volania, sie\u0165ov\u00e1 komunik\u00e1cia) a zachytenie komplexn\u00fdch vz\u0165ahov medzi nimi. V\u00fdznamn\u00fdm trendom je prechod od ru\u010dne navrhovan\u00fdch pr\u00edznakov k end-to-end modelom a vyu\u017eitie \u201eself-supervised learningu\u201c. V\u00fdskum z\u00e1rove\u0148 rie\u0161i ot\u00e1zky efektivity, interpretovate\u013enosti a \u0161k\u00e1lovate\u013enosti modelov pri praktickom nasaden\u00ed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c29b88 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"3c29b88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_KB_LLMs.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-powerpoint\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm72-60V236c0-6.6 5.4-12 12-12h69.2c36.7 0 62.8 27 62.8 66.3 0 74.3-68.7 66.5-95.5 66.5V404c0 6.6-5.4 12-12 12H132c-6.6 0-12-5.4-12-12zm48.5-87.4h23c7.9 0 13.9-2.4 18.1-7.2 8.5-9.8 8.4-28.5.1-37.8-4.1-4.6-9.9-7-17.4-7h-23.9v52z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Prezent\u00e1cia - Umelej inteligencia a ve\u013ek\u00e9 jazykov\u00e9 modely v kybernetickej bezpe\u010dnosti<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_KB_LLMs_clanky.xlsx\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-excel\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm212-240h-28.8c-4.4 0-8.4 2.4-10.5 6.3-18 33.1-22.2 42.4-28.6 57.7-13.9-29.1-6.9-17.3-28.6-57.7-2.1-3.9-6.2-6.3-10.6-6.3H124c-9.3 0-15 10-10.4 18l46.3 78-46.3 78c-4.7 8 1.1 18 10.4 18h28.9c4.4 0 8.4-2.4 10.5-6.3 21.7-40 23-45 28.6-57.7 14.9 30.2 5.9 15.9 28.6 57.7 2.1 3.9 6.2 6.3 10.6 6.3H260c9.3 0 15-10 10.4-18L224 320c.7-1.1 30.3-50.5 46.3-78 4.7-8-1.1-18-10.3-18z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Zoznam \u010dl\u00e1nkov - Umelej inteligencia a ve\u013ek\u00e9 jazykov\u00e9 modely v kybernetickej bezpe\u010dnosti<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-258bb20 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"258bb20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cffe949 elementor-widget elementor-widget-text-editor\" data-id=\"cffe949\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #ff6600;\"><strong>3. D\u00e1tov\u00e9 sady pre v\u00fdskum v oblasti kybernetickej bezpe\u010dnosti<\/strong><\/span><\/h3><p>KC KB UPJ\u0160 sa akt\u00edvne podie\u013ea na tvorbe a spr\u00edstup\u0148ovan\u00ed d\u00e1tov\u00fdch s\u00e1d pre v\u00fdskum kybernetickej bezpe\u010dnosti vr\u00e1tane d\u00e1t z honeypotov a bezpe\u010dnostn\u00fdch senzorov. Tieto datasety umo\u017e\u0148uj\u00fa realistick\u00e9 experimentovanie, testovanie detek\u010dn\u00fdch algoritmov a valid\u00e1ciu v\u00fdskumn\u00fdch pr\u00edstupov. Z\u00e1rove\u0148 rie\u0161ia jeden z k\u013e\u00fa\u010dov\u00fdch probl\u00e9mov v\u00fdskumu \u2013 nedostatok kvalitn\u00fdch a anotovan\u00fdch d\u00e1t pre anal\u00fdzu bezpe\u010dnostn\u00fdch incidentov.<\/p><p><strong>D\u00e1tov\u00e9 sady<\/strong> s\u00fa dostupn\u00e9 na <a href=\"https:\/\/cyberawareness.sk\/en\/datasety-2\/\">tomto odkaze.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff525af elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ff525af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2de1c84 elementor-widget elementor-widget-text-editor\" data-id=\"2de1c84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><strong><span style=\"color: #ff6600;\">4. Projekty doktorandov (VVGS UPJ\u0160)<\/span><\/strong><\/h3><p>V r\u00e1mci grantovej sch\u00e9my VVGS UPJ\u0160 s\u00fa podporovan\u00e9 v\u00fdskumn\u00e9 aktivity doktorandov a mlad\u00fdch vedeck\u00fdch pracovn\u00edkov, ktor\u00e9 tematicky nadv\u00e4zuj\u00fa na v\u00fdskumn\u00e9 oblasti KC KB UPJ\u0160.<\/p><p><strong>Popis v\u00fdzvy<\/strong> sa nach\u00e1dza na <a href=\"https:\/\/portal.ccvapp.upjs.sk\/grant-call\/580\/view_history_grant_calls\">tomto odkaze<\/a>.\u00a0<\/p><p><strong>Zoznam v\u00fdziev<\/strong> sa nach\u00e1dza na <a href=\"https:\/\/portal.ccvapp.upjs.sk\/history-grant-calls\/vvgs-kc-kb\">tomto odkaze<\/a>.\u00a0<\/p><p><strong>Zoznam podporen\u00fdch projektov<\/strong> sa nach\u00e1dza na <a href=\"https:\/\/portal.ccvapp.upjs.sk\/projects\/vvgs-kc-kb\">tomto odkaze<\/a>.\u00a0Projekty sa zameriavaj\u00fa na:<\/p><ul><li>pr\u00e1vne aspekty AI a kybernetickej bezpe\u010dnosti vr\u00e1tane ochrany osobn\u00fdch \u00fadajov a\u00a0zodpovednosti,<\/li><li>v\u00fdskum dezinform\u00e1ci\u00ed a hybridn\u00fdch hrozieb v informa\u010dnom priestore a ich dopad na kybernetick\u00fa bezpe\u010dnos\u0165,<\/li><li>aplik\u00e1ciu form\u00e1lnej konceptovej anal\u00fdzy na d\u00e1ta z\u00a0oblasti kybernetickej bezpe\u010dnosti s cie\u013eom identifikova\u0165 vzory a anom\u00e1lie v\u00a0hl\u00e1seniach (alertoch) detek\u010dn\u00fdch syst\u00e9mov (napr. IDS).<\/li><\/ul><h4><strong>Popis podporen\u00fdch projektov <\/strong><\/h4><p><strong>Pr\u00e1vne aspekty umelej inteligencie a kybernetickej bezpe\u010dnosti: Ochrana osobn\u00fdch \u00fadajov a zodpovednos\u0165 v \u010dase kybernetick\u00fdch hrozieb<\/strong><\/p><p>Projekt bol zameran\u00fd na anal\u00fdzu pr\u00e1vnych aspektov vyu\u017e\u00edvania umelej inteligencie v kontexte kybernetickej bezpe\u010dnosti najm\u00e4 z poh\u013eadu ochrany osobn\u00fdch \u00fadajov a zodpovednosti za \u0161kody sp\u00f4soben\u00e9 AI syst\u00e9mami. Hlavn\u00fdm v\u00fdstupom bola vedeck\u00e1 publik\u00e1cia, ktor\u00e1 systematicky analyzuje pr\u00e1vne r\u00e1mce Eur\u00f3pskej \u00fanie, vr\u00e1tane AI Act, GDPR a smernice NIS2. V\u00fdskum identifikoval viacer\u00e9 oblasti pr\u00e1vnej neistoty, napr\u00edklad ot\u00e1zky zodpovednosti za auton\u00f3mne syst\u00e9my alebo konflikt medzi ochranou osobn\u00fdch \u00fadajov a potrebami tr\u00e9novania AI modelov. V\u00fdsledky boli prezentovan\u00e9 na odborn\u00fdch podujatiach a v r\u00e1mci medzin\u00e1rodnej vedeckej mobility, \u010d\u00edm prispeli k ich valid\u00e1cii a \u0161\u00edreniu v akademickej komunite. Projekt z\u00e1rove\u0148 posilnil interdisciplin\u00e1rny v\u00fdskum na rozhran\u00ed pr\u00e1va a technol\u00f3gi\u00ed a vytvoril z\u00e1klad pre \u010fal\u0161ie vedeck\u00e9 aktivity v tejto oblasti. Publikovan\u00fd \u010dl\u00e1nok &#8211; <b>Pr\u00e1vne aspekty umelej inteligencie a kyberbezpe\u010dnosti: ochrana osobn\u00fdch \u00fadajov a zodpovednos\u0165 v \u00e9re kybernetick\u00fdch hrozieb<\/b> (<a href=\"https:\/\/unibook.upjs.sk\/img\/cms\/2026\/Pr%C3%A1vF\/poe-2025.pdf\">odkaz na \u010dl\u00e1nok<\/a>).<\/p><p><strong>V\u00fdzvy informa\u010dnej bezpe\u010dnosti: Dezinform\u00e1cie ako n\u00e1stroj hybridn\u00e9ho p\u00f4sobenia<\/strong><\/p><p>Projekt sa zameriaval na v\u00fdskum dezinforma\u010dn\u00fdch kampan\u00ed a ich \u00falohy v r\u00e1mci hybridn\u00fdch hrozieb v informa\u010dnom priestore. V\u00fdskum umo\u017enil identifikova\u0165 dominantn\u00e9 narat\u00edvy, analyzova\u0165 faktory ovplyv\u0148uj\u00face \u0161\u00edrenie dezinform\u00e1ci\u00ed a odhali\u0165 hlavn\u00e9 zranite\u013enosti informa\u010dn\u00e9ho prostredia v krajin\u00e1ch strednej a v\u00fdchodnej Eur\u00f3py a Pobaltia. V\u00fdznamn\u00fdm v\u00fdsledkom bolo aj komparat\u00edvne hodnotenie pr\u00edstupov jednotliv\u00fdch \u0161t\u00e1tov k ochrane informa\u010dn\u00e9ho priestoru. Projekt prispel k roz\u0161\u00edreniu odborn\u00e9ho poznania prostredn\u00edctvom vedeck\u00e9ho \u010dl\u00e1nku a nadviazania medzin\u00e1rodnej spolupr\u00e1ce, vr\u00e1tane v\u00fdskumn\u00fdch ciest a odborn\u00fdch konzult\u00e1ci\u00ed. Z\u00edskan\u00e9 poznatky poskytuj\u00fa z\u00e1klad pre n\u00e1vrh efekt\u00edvnej\u0161\u00edch obrann\u00fdch mechanizmov proti hybridn\u00fdm informa\u010dn\u00fdm hrozb\u00e1m.\u00a0<\/p><p><strong>Aplik\u00e1cia met\u00f3d form\u00e1lnej konceptovej anal\u00fdzy na d\u00e1tach z oblasti kybernetickej bezpe\u010dnosti<\/strong><\/p><p>Projekt bol zameran\u00fd na aplik\u00e1ciu met\u00f3d form\u00e1lnej konceptovej anal\u00fdzy (FCA) na d\u00e1ta z oblasti kybernetickej bezpe\u010dnosti s cie\u013eom identifikova\u0165 vzory, z\u00e1vislosti a anom\u00e1lie v IDS alertoch. V\u00fdskum pracoval s datasetom CIC-IDS2017 a vyu\u017e\u00edval n\u00e1stroj Snort s r\u00f4znymi sadami pravidiel na generovanie a anal\u00fdzu alertov. V\u00fdznamn\u00fdm pr\u00ednosom bolo roz\u0161\u00edrenie klasick\u00e9ho pr\u00edstupu FCA o met\u00f3du zre\u0165azovania atrib\u00fatov\u00fdch implik\u00e1ci\u00ed, ktor\u00e1 umo\u017e\u0148uje prep\u00e1ja\u0165 poznatky z viacer\u00fdch d\u00e1tov\u00fdch kontextov. V\u00fdsledky uk\u00e1zali, \u017ee FCA je vhodn\u00fdm n\u00e1strojom nielen na extrakciu znalost\u00ed, ale aj na podporu situa\u010dn\u00e9ho povedomia a identifik\u00e1ciu anom\u00e1lnych javov v bezpe\u010dnostn\u00fdch d\u00e1tach. V\u00fdstupom projektu bol vedeck\u00fd \u010dl\u00e1nok prezentovan\u00fd na medzin\u00e1rodnej konferencii, pri\u010dom v\u00fdsledky boli z\u00e1rove\u0148 diskutovan\u00e9 v zahrani\u010dnom akademickom prostred\u00ed, \u010d\u00edm sa podporila ich \u010fal\u0161ia valid\u00e1cia a rozvoj. Publikovan\u00fd \u010dl\u00e1nok &#8211; <strong>Formal Concept Analysis as a Framework for Cyber Situational Awareness<\/strong> (<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/11280113\">odkaz na \u010dl\u00e1nok<\/a>).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>V\u00fdskumn\u00e1 \u010dinnos\u0165 KC KB UPJ\u0160 V\u00fdskumn\u00e1 \u010dinnos\u0165 Kompeten\u010dn\u00e9ho centra kybernetickej bezpe\u010dnosti na UPJ\u0160 (KC KB UPJ\u0160) je zameran\u00e1 na prepojenie teoretick\u00e9ho a aplikovan\u00e9ho v\u00fdskumu v oblasti informa\u010dnej a kybernetickej bezpe\u010dnosti (KIB). V\u00fdskumn\u00edci sa venuj\u00fa systematick\u00e9mu zberu, spracovaniu a anal\u00fdze d\u00e1t, n\u00e1vrhu nov\u00fdch metod\u00edk a aplik\u00e1cii pokro\u010dil\u00fdch analytick\u00fdch pr\u00edstupov (strojov\u00e9 u\u010denie, d\u00e1tov\u00e1 anal\u00fdza) s cie\u013eom zvy\u0161ova\u0165 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-9197","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/9197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=9197"}],"version-history":[{"count":19,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/9197\/revisions"}],"predecessor-version":[{"id":9229,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/9197\/revisions\/9229"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=9197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}