Communication and Information Technologies
8th International Scientific Conference
October 14th - 16th, 2015 - Hotel GRANIT Tatranské Zruby

Conference Proceedings / ISBN 978-80-8040-508-3
All the articles were reviewed by the members of editorial board

 

 

 

Conference Partners

 

 

Secunet

 

Intergraph

 

EMC

 

IBM

 

EMM

 

Dell

 

Interway

 

LYNX

 

Beset

pdf

NBÚ

 

FreeDivision

 

 

 

 

Talks in sessions

Cybersecurity and Networking Operations I
Chairperson: Marcel Harakaľ

 

Critical information infrastructure remarks

(Josef Kaderka)

pdf

Generation of cryptographically secure elliptic curves over prime fields

(Rafał Gliwa, Janusz Szmidt, Robert Wicik)

pdf

Penetration Tests in the Military Data Network Environment

(Radek Beran)

pdf

Random keys for classified cryptographic systems

(Mariusz Borowski)

pdf

 

Talks in sessions

Cybersecurity and Networking Operations II
Chairperson: Július Baráth

 

Reconnaissance of cyberspace in terms of military security of the state

(Maciej Marczyk, Bartosz Biernacik)

pdf

Cyber criminality

(Bohumil Ptáček, Leopold Skoruša)

pdf

The project "Current cyber threats in the Czech Republic and their elimination"

(Petr Hrůza, Oldřich Luňáček)

pdf

 

Talks in sessions

Information Systems and Information Processing I
Chairperson: Miroslav Líška

 

Design of the image scanning system based on low power processor MSP430

(Vladislav Bača, Peter Fuchs, Igor Jakubička, Rastislav Vyletel, Peter Drahoš)

pdf

Information System for Remote Management of Crisis Situations

(Petr Hrůza, Zdeněk Dvořák)

pdf

Experiences in Development and Implementation of Knowledge Management Systems

(Ladislav Buřita et. al.)

pdf

Mobile virtual ICT platform in military decision making process

(Grzegorz Pilarski)

pdf

 

Technical Session (Small Hall)

Chairperson: Marcel Harakaľ

 

Discussion on current problems and trends in ICT within Armed Forces.

 

 

Talks in sessions

Information Systems and Information Processing II
Chairperson: Ľubomír Dedera

 

Dimension Reduction Methods of Text Documents by Neural Networks

(Lenka Skovajsová, Igor Mokriš)

pdf

Update of Database Application Using Replication

(Ľubomír Semančík)

pdf

Real time clustering of high dimensional data by Projective Adaptive Resonance Theory

(Roman Krakovský, Radoslav Forgáč, Igor Mokriš)

pdf

 

Talks in sessions

Signal Processing and Communication Technologies
Chairperson: Martin Marko

 

Sequences for Binary Encoding of Radar Signals

(Ján Ochodnický, Marián Babjak, Zdeněk Matoušek)

pdf

AC analysis of switched capacitor filters in SPICE-family programs

(Dalibor Biolek, Zdeněk Kolka, Viera Biolková)

pdf

Mitigation of Atmospheric Turbulence on Terrestrial FSO Paths using Buffering

(Zdeněk Kolka, Viera Biolková, Dalibor Biolek)

pdf

Memristor model for simulating large circuits for massively-parallel analog computing

(Zdeněk Kolka, Viera Biolková, Dalibor Biolek)

pdf

Small-aperture microphone array for detection systems

(Roman Berešík, Jozef Puttera, Jozef Jurčo)

pdf

 

Talks in sessions

Student's Session (Small Hall)
Chairperson: Miroslav Ďulík

 

Security threats for the Android OS

(Vítězslav Šnorich)

pdf

Possibilities for abuse and security of smart watch

(Lubomir Almer)

pdf

 

Talks in sessions

Information Systems and Information Processing III
Chairperson: Jozef Štulrajter

 

Monitoring of department network – administrator view

(Július Baráth)

pdf

An Example of a Language Representation based on  C-BML

(Ľubomír Dedera, Marek Benčík)

pdf

Penetration testing and Critical security controls

(Branislav Kulich)

 

Probabilistic model properties of IFF recognition in a network-oriented environment

(Radoslav Masnica, Jozef Štulrajter)

pdf

Using unmanned aerial vehicles as a carrier of different sensors in NEC environment

(Peter Rindzak)

pdf

Security in Military Cloud Computing Applications

(Miroslav Ďulík)

pdf

Parallel programming models

(Michal Áč)

pdf

Analysis of Vehicles Electromagnetic Emissivity for Vehicles Classification Application

(Stanislava Gažovová, František Nebus, Vladimír Belák)

pdf

GPU computing latency analysis

(Miloš Očkay)

pdf

Genetic algorithm in cryptography

(Martin Javurek, Michal Turčaník, Marcel Harakaľ)

pdf

Secure communication in the computer network

(Boris Matej)

pdf

 

List of reviews

pdf

 

 



 

AOS KTI afcea

 

All the articles were reviewed by the members of editorial board

 

Every author and co-author of included paper shares full responsibility for its content, style and format.

MAP

Map






Mnemonix © 2015