Conference Partners
|
|
|
Talks in sessions Cybersecurity and Networking Operations I |
Critical information infrastructure remarks (Josef Kaderka) |
![]() |
Generation of cryptographically secure elliptic curves over prime fields (Rafał Gliwa, Janusz Szmidt, Robert Wicik) |
Penetration Tests in the Military Data Network Environment (Radek Beran) |
![]() |
Random keys for classified cryptographic systems (Mariusz Borowski) |
![]() |
Talks in sessions Cybersecurity and Networking Operations II |
Reconnaissance of cyberspace in terms of military security of the state (Maciej Marczyk, Bartosz Biernacik) |
![]() |
Cyber criminality (Bohumil Ptáček, Leopold Skoruša) |
![]() |
The project "Current cyber threats in the Czech Republic and their elimination" (Petr Hrůza, Oldřich Luňáček) |
![]() |
Talks in sessions Information Systems and Information Processing I |
Design of the image scanning system based on low power processor MSP430 (Vladislav Bača, Peter Fuchs, Igor Jakubička, Rastislav Vyletel, Peter Drahoš) |
![]() |
Information System for Remote Management of Crisis Situations (Petr Hrůza, Zdeněk Dvořák) |
![]() |
Experiences in Development and Implementation of Knowledge Management Systems (Ladislav Buřita et. al.) |
![]() |
Mobile virtual ICT platform in military decision making process (Grzegorz Pilarski) |
![]() |
Technical Session (Small Hall) Chairperson: Marcel Harakaľ |
Discussion on current problems and trends in ICT within Armed Forces. |
Talks in sessions Information Systems and Information Processing II
|
Dimension Reduction Methods of Text Documents by Neural Networks (Lenka Skovajsová, Igor Mokriš) |
![]() |
Update of Database Application Using Replication (Ľubomír Semančík) |
![]() |
Real time clustering of high dimensional data by Projective Adaptive Resonance Theory (Roman Krakovský, Radoslav Forgáč, Igor Mokriš) |
![]() |
Talks in sessions Signal Processing and Communication Technologies
|
Sequences for Binary Encoding of Radar Signals (Ján Ochodnický, Marián Babjak, Zdeněk Matoušek) |
![]() |
AC analysis of switched capacitor filters in SPICE-family programs (Dalibor Biolek, Zdeněk Kolka, Viera Biolková) |
![]() |
Mitigation of Atmospheric Turbulence on Terrestrial FSO Paths using Buffering (Zdeněk Kolka, Viera Biolková, Dalibor Biolek) |
![]() |
Memristor model for simulating large circuits for massively-parallel analog computing (Zdeněk Kolka, Viera Biolková, Dalibor Biolek) |
![]() |
Small-aperture microphone array for detection systems (Roman Berešík, Jozef Puttera, Jozef Jurčo) |
![]() |
Talks in sessions Student's Session (Small Hall)
|
Security threats for the Android OS (Vítězslav Šnorich) |
![]() |
Possibilities for abuse and security of smart watch (Lubomir Almer) |
![]() |
Talks in sessions Information Systems and Information Processing III
|
Monitoring of department network – administrator view (Július Baráth) |
![]() |
An Example of a Language Representation based on C-BML (Ľubomír Dedera, Marek Benčík) |
![]() |
Penetration testing and Critical security controls (Branislav Kulich) |
Probabilistic model properties of IFF recognition in a network-oriented environment (Radoslav Masnica, Jozef Štulrajter) |
![]() |
Using unmanned aerial vehicles as a carrier of different sensors in NEC environment (Peter Rindzak) |
![]() |
Security in Military Cloud Computing Applications (Miroslav Ďulík) |
![]() |
Parallel programming models (Michal Áč) |
![]() |
Analysis of Vehicles Electromagnetic Emissivity for Vehicles Classification Application (Stanislava Gažovová, František Nebus, Vladimír Belák) |
![]() |
GPU computing latency analysis (Miloš Očkay) |
![]() |
Genetic algorithm in cryptography (Martin Javurek, Michal Turčaník, Marcel Harakaľ) |
![]() |
Secure communication in the computer network (Boris Matej) |
![]() |
List of reviews |
![]() |