Honeypots and honeynets: issues of privacy P Sokol, J Míšek, M Husák EURASIP Journal on Information Security 2017, 1-9, 2017 | 62 | 2017 |
Predictive methods in cyber defense: Current experience and research challenges M Husák, V Bartoš, P Sokol, A Gajdoš Future Generation Computer Systems 115, 517-530, 2021 | 42 | 2021 |
Early-stage detection of cyber attacks M Pivarníková, P Sokol, T Bajtoš Information 11 (12), 560, 2020 | 27 | 2020 |
Network intrusion detection with threat agent profiling T Bajtoš, A Gajdoš, L Kleinová, K Lučivjanská, P Sokol Security and Communication Networks 2018 (1), 3614093, 2018 | 23 | 2018 |
Prediction of attacks against honeynet based on time series modeling P Sokol, A Gajdoš Applied Computational Intelligence and Mathematical Methods: Computational …, 2018 | 23 | 2018 |
Dataset of intrusion detection alerts from a sharing platform M Husák, M Žádník, V Bartoš, P Sokol Data in Brief 33, 106530, 2020 | 19 | 2020 |
Classification of malicious emails E Marková, T Bajtoš, P Sokol, T Mézešová 2019 IEEE 15th International Scientific Conference on Informatics, 000279-000284, 2019 | 18 | 2019 |
Definition of attack in the context of low-level interaction server honeypots P Sokol, M Zuzčák, T Sochor Computer Science and its Applications: Ubiquitous Information Technologies …, 2015 | 15 | 2015 |
Data collection and data analysis in honeypots and honeynets P Sokol, P Pekarčík, T Bajtoš Proceedings of the Security and Protection of Information. University of Defence, 2015 | 14 | 2015 |
Multi-stage cyber-attacks detection in the industrial control systems T Bajtoš, P Sokol, T Mézešová Recent developments on industrial control systems resilience, 151-173, 2020 | 12 | 2020 |
Deploying honeypots and honeynets: Issues of liability P Sokol, M Andrejko Computer Networks: 22nd International Conference, CN 2015, Brunów, Poland …, 2015 | 12 | 2015 |
Network security situation awareness forecasting based on statistical approach and neural networks P Sokol, R Staňa, A Gajdoš, P Pekarčík Logic Journal of the IGPL 31 (2), 352-374, 2023 | 11 | 2023 |
Virtual honeypots and detection of telnet botnets T Bajtoš, P Sokol, T Mézešová Proceedings of the Central European Cybersecurity Conference 2018, 1-6, 2018 | 11 | 2018 |
Legal issues of honeynet's generations P Sokol Proceedings of the 2014 6th International Conference on Electronics …, 2014 | 11 | 2014 |
Framework for distributed virtual honeynets P Pisarčík, P Sokol Proceedings of the 7th International Conference on Security of Information …, 2014 | 11 | 2014 |
4th industrial revolution and challenges for european law (with special attention to the concept of digital single market) R Hučková, P Sokol, L Rózenfeldová EU and comparative law issues and challenges series (ECLIC) 2, 201-215, 2018 | 10 | 2018 |
Formal concept analysis approach to understand digital evidence relationships P Sokol, Ľ Antoni, O Krídlo, E Marková, K Kováčová, S Krajči International Journal of Approximate Reasoning 159, 108940, 2023 | 9 | 2023 |
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization P Sokol, L Kleinová, M Husák IEEE EUROCON 2015-International Conference on Computer as a Tool (EUROCON), 1-6, 2015 | 9 | 2015 |
Evaluation of attackers’ skill levels in multi-stage attacks T Mézešová, P Sokol, T Bajtoš Information 11 (11), 537, 2020 | 8 | 2020 |
IP addresses in the context of digital evidence in the criminal and civil case law of the Slovak Republic P Sokol, L Rózenfeldová, K Lučivjanská, J Harašta Forensic Science International: Digital Investigation 32, 300918, 2020 | 7 | 2020 |