Pavol Sokol

Orcid: 0000-0002-1967-8802

According to our database1, Pavol Sokol authored at least 27 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Processing of IDS alerts in multi-step attacks.
Softw. Impacts, 2024

Bimorphisms and attribute implications in heterogeneous formal contexts.
Int. J. Approx. Reason., 2024

Forensic Artifacts' Analysis using Graph Theory.
Proceedings of the 24th Conference Information Technologies, 2024

2023
Formal concept analysis approach to understand digital evidence relationships.
Int. J. Approx. Reason., August, 2023

Network security situation awareness forecasting based on statistical approach and neural networks.
Log. J. IGPL, March, 2023

Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform.
DTRAP, 2023

2022
Detection of relevant digital evidence in the forensic timelines.
Proceedings of the 14th International Conference on Electronics, 2022

The analysis of digital evidence by Formal concept analysis.
Proceedings of the Sixteenth International Conference on Concept Lattices and Their Applications (CLA 2022) Tallinn, 2022

2021
Predictive methods in cyber defense: Current experience and research challenges.
Future Gener. Comput. Syst., 2021

Analysis and Prediction of Legal Judgements in the Slovak Criminal Proceedings.
Proceedings of the 21st Conference Information Technologies, 2021

2020
Early-Stage Detection of Cyber Attacks.
Inf., 2020

Evaluation of Attackers' Skill Levels in Multi-Stage Attacks.
Inf., 2020

IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic.
Digit. Investig., 2020

Forecasting Security Alerts Based on Time Series.
Proceedings of the Hybrid Artificial Intelligent Systems - 15th International Conference, 2020

2019
Analysis of the Infection and the Injection Phases of the Telnet Botnets.
J. Univers. Comput. Sci., 2019

Evaluation of Attacker Skill Level for Multi-stage Attacks.
Proceedings of the 11th International Conference on Electronics, 2019

2018
Network Intrusion Detection with Threat Agent Profiling.
Secur. Commun. Networks, 2018

Virtual honeypots and detection of telnet botnets.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

2017
Honeypots and honeynets: issues of privacy.
EURASIP J. Inf. Secur., 2017

2016
Lessons Learned from Honeypots - Statistical Analysis of Logins and Passwords.
Proceedings of the Research and Practical Issues of Enterprise Information Systems, 2016

Lessons learned from correlation of honeypots' data and spatial data.
Proceedings of the 8th International Conference on Electronics, 2016

2015
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization.
Proceedings of the IEEE EUROCON 2015, 2015

Definition of Attack in Context of High Level Interaction Honeypots.
Proceedings of the Software Engineering in Intelligent Systems, 2015

Deploying Honeypots and Honeynets: Issues of Liability.
Proceedings of the Computer Networks - 22nd International Conference, 2015

Deploying Honeypots and Honeynets: Issue of Privacy.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Framework for distributed virtual honeynets.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Legal issues of honeynet's generations.
Proceedings of the 6th International Conference on Electronics, 2014


  Loading...