default search action
Pavol Sokol
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j11]L'ubomír Antoni, Peter Elias, Ján Gunis, Dominika Kotlárová, Stanislav Krajci, Ondrej Krídlo, Pavol Sokol, Lubomír Snajder:
Bimorphisms and attribute implications in heterogeneous formal contexts. Int. J. Approx. Reason. 172: 109245 (2024) - [j10]Tomás Bajtos, Pavol Sokol, Frantisek Kurimský:
Processing of IDS alerts in multi-step attacks. Softw. Impacts 19: 100622 (2024) - 2023
- [j9]Pavol Sokol, Richard Stana, Andrej Gajdos, Patrik Pekarcík:
Network security situation awareness forecasting based on statistical approach and neural networks. Log. J. IGPL 31(2): 352-374 (2023) - [j8]Pavol Sokol, L'ubomír Antoni, Ondrej Krídlo, Eva Marková, Kristína Kovácová, Stanislav Krajci:
Formal concept analysis approach to understand digital evidence relationships. Int. J. Approx. Reason. 159: 108940 (2023) - 2021
- [j7]Martin Husák, Václav Bartos, Pavol Sokol, Andrej Gajdos:
Predictive methods in cyber defense: Current experience and research challenges. Future Gener. Comput. Syst. 115: 517-530 (2021) - 2020
- [j6]Pavol Sokol, Laura Rózenfeldová, Katarína Lucivjanská, Jakub Harasta:
IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic. Digit. Investig. 32 Supplement: 300918 (2020) - [j5]Terézia Mézesová, Pavol Sokol, Tomás Bajtos:
Evaluation of Attackers' Skill Levels in Multi-Stage Attacks. Inf. 11(11): 537 (2020) - [j4]Martina Pivarníková, Pavol Sokol, Tomás Bajtos:
Early-Stage Detection of Cyber Attacks. Inf. 11(12): 560 (2020) - 2019
- [j3]Tomás Bajtos, Pavol Sokol, Andrej Gajdos, Katarína Lucivjanská, Terézia Mézesová:
Analysis of the Infection and the Injection Phases of the Telnet Botnets. J. Univers. Comput. Sci. 25(11): 1417-1436 (2019) - 2018
- [j2]Tomás Bajtos, Andrej Gajdos, Lenka Kleinova, Katarína Lucivjanská, Pavol Sokol:
Network Intrusion Detection with Threat Agent Profiling. Secur. Commun. Networks 2018: 3614093:1-3614093:17 (2018) - 2017
- [j1]Pavol Sokol, Jakub Mísek, Martin Husák:
Honeypots and honeynets: issues of privacy. EURASIP J. Inf. Secur. 2017: 4 (2017)
Conference and Workshop Papers
- 2024
- [c15]Pavol Sokol, Sophia Petra Krisáková, Rastislav Krivos-Bellus:
Forensic Artifacts' Analysis using Graph Theory. ITAT 2024: 209-215 - 2022
- [c14]Pavol Sokol, L'ubomír Antoni, Ondrej Krídlo, Eva Marková, Kristína Kovácová, Stanislav Krajci:
The analysis of digital evidence by Formal concept analysis. CLA 2022: 147-158 - [c13]Eva Marková, Pavol Sokol, Kristína Kovácová:
Detection of relevant digital evidence in the forensic timelines. ECAI 2022: 1-7 - 2021
- [c12]Dávid Varga, Zoltán Szoplák, Pavol Sokol, Stanislav Krajci, Peter Gurský:
Analysis and Prediction of Legal Judgements in the Slovak Criminal Proceedings. ITAT 2021: 161-170 - 2020
- [c11]Patrik Pekarcík, Andrej Gajdos, Pavol Sokol:
Forecasting Security Alerts Based on Time Series. HAIS 2020: 546-557 - 2019
- [c10]Terézia Mézesová, Pavol Sokol, Tomás Bajtos:
Evaluation of Attacker Skill Level for Multi-stage Attacks. ECAI 2019: 1-6 - 2018
- [c9]Tomás Bajtos, Pavol Sokol, Terézia Mézesová:
Virtual honeypots and detection of telnet botnets. CECC 2018: 2:1-2:6 - 2016
- [c8]Pavol Sokol, Veronika Kopcová:
Lessons learned from correlation of honeypots' data and spatial data. ECAI 2016: 1-8 - [c7]Pavol Sokol, Veronika Kopcová:
Lessons Learned from Honeypots - Statistical Analysis of Logins and Passwords. CONFENIS 2016: 112-126 - 2015
- [c6]Pavol Sokol, Martin Husák, Frantiek Liptak:
Deploying Honeypots and Honeynets: Issue of Privacy. ARES 2015: 397-403 - [c5]Pavol Sokol, Maros Andrejko:
Deploying Honeypots and Honeynets: Issues of Liability. CN 2015: 92-101 - [c4]Pavol Sokol, Matej Zuzcak, Tomas Sochor:
Definition of Attack in Context of High Level Interaction Honeypots. CSOC (2) 2015: 155-164 - [c3]Pavol Sokol, Lenka Kleinova, Martin Husák:
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. EUROCON 2015: 1-6 - 2014
- [c2]Pavol Sokol:
Legal issues of honeynet's generations. ECAI 2014: 63-69 - [c1]Peter Pisarcík, Pavol Sokol:
Framework for distributed virtual honeynets. SIN 2014: 324
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint