Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Jakub Čegan"'
Publikováno v:
2021 IEEE International Conference on Cyber Security and Resilience (CSR)
CSR
CSR
The Cyber Range Focus Group (CRFG) is established in the context of the four Horizon 2020 pilots contributing to the establishment of a European Cybersecurity Competence Network, with the purpose to horizontally coordinate the activities related to c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b6429d35dd3fe14b41f4ba125ec8b45e
https://is.muni.cz/publication/1795818
https://is.muni.cz/publication/1795818
Autor:
Valdemar Svabensky, Jan Vykopal, Radek Ošlejšek, Karolína Dočkalová Burská, Jakub Čegan, Vit Rusnak
Publikováno v:
IEEE Transactions on Visualization and Computer Graphics
Hands-on training is an effective way to practice theoretical cybersecurity concepts and increase participants’ skills. In this article, we discuss the application of visual analytics principles to the design, execution, and evaluation of training
Autor:
Jan Vykopal, Jakub Čegan
Publikováno v:
SIGCSE
Cyber defence exercises (CDX) represent a popular form of hands-on security training. Learners are usually divided into several teams that have to defend or attack virtual IT infrastructure (red vs. blue teams). CDXs are prepared for learners whose l
Autor:
Daniel Kouril, Tomáš Rebok, Jan Vykopal, Tomas Jirsik, Jakub Čegan, Martin Drašar, Martin Vizváry
Publikováno v:
NOMS
Proceedings of the Network Operations and Management Symposium (NOMS 2014)
Proceedings of the Network Operations and Management Symposium (NOMS 2014)
Cyber attacks have become ubiquitous and in order to face current threats it is important to understand them. Studying attacks in a real environment however, is not viable and therefore it is necessary to find other methods how to examine the nature
Autor:
Jakub Čegan, Martin Husák
Publikováno v:
Availability, Reliability and Security (ARES), 2014 Ninth International Conference on
ARES
ARES
We present a comprehensive framework for automatic phishing incident processing and work in progress concerning automatic phishing detection and reporting. Our work is based upon the automatic phishing incident processing tool PhiGARo which locates u
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3a0e23b2c9461344faaeb422a5d54515
https://is.muni.cz/publication/1197056
https://is.muni.cz/publication/1197056