|
|
Conference Program & Proceedings
Click here for PDF version.
All the articles were reviewed by the members of editorial board
(Detailed information)
09:00-10:40 |
|
Talks in sessions:
Cybersecurity and Networking Operations II (Big Hall) |
11:10-11:30 |
|
Closing of the Conference (Big Hall) |
(Big Hall) |
|
Talks in sessions:
Cybersecurity and Networking Operations II (Big Hall)
Chairperson: Eng. Július Baráth, PhD.
|
09:00-09:20 |
|
Lessons Learned from Military Cyber Defence Exercises
(Branislav Kulich) |
|
09:20-09:40 |
|
Multi-sensor Data Fusion and Sensor Fusion Models
(Jozef Jurčo, Jozef Puttera, Roman Berešík) |
|
09:40-10:00 |
|
Man-in-the-middle attack
(Vítězslav Šnorich) |
|
10:00-10:20 |
|
Domain Name System Black List False Reporting Attack
(Miloš Očkay, Martin Javurek) |
|
10:20-10:40 |
|
Signal Source Identification by Neural Network
(Zdenek Matousek, Jan Ochodnicky, Jan Kurty, Martin Hracek) |
|
10:40-11:00 |
|
Automatic Microwave Measurement
(Zdenek Matousek, Jan Ochodnicky, Tomas Nemergut) |
|
Every author and co-author of included paper shares full responsibility for its content, style and format.
|
|
|