Skip to main content

Showing 1–3 of 3 results for author: Zákopčanová, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2009.09082  [pdf, other

    cs.CY

    Visilant: Visual Support for the Exploration and Analytical Process Tracking in Criminal Investigations

    Authors: Kristína Zákopčanová, Marko Řeháček, Jozef Bátrna, Daniel Plakinger, Sergej Stoppel, Barbora Kozlíková

    Abstract: The daily routine of criminal investigators consists of a thorough analysis of highly complex and heterogeneous data of crime cases. Such data can consist of case descriptions, testimonies, criminal networks, spatial and temporal information, and virtually any other data that is relevant for the case. Criminal investigators work under heavy time pressure to analyze the data for relationships, prop… ▽ More

    Submitted 21 September, 2020; originally announced September 2020.

    Comments: Accepted for the IEEE VIS 2020 conference

  2. Exploratory Analysis of File System Metadata for Rapid Investigation of Security Incidents

    Authors: Michal Beran, Frantisek Hrdina, Daniel Kouril, Radek Oslejsek, Kristina Zakopcanova

    Abstract: Investigating cybersecurity incidents requires in-depth knowledge from the analyst. Moreover, the whole process is demanding due to the vast data volumes that need to be analyzed. While various techniques exist nowadays to help with particular tasks of the analysis, the process as a whole still requires a lot of manual activities and expert skills. We propose an approach that allows the analysis o… ▽ More

    Submitted 5 March, 2021; v1 submitted 3 September, 2020; originally announced September 2020.

  3. arXiv:1712.09424  [pdf, other

    cs.CR cs.CY cs.HC

    Timely Feedback in Unstructured Cybersecurity Exercises

    Authors: Jan Vykopal, Radek Ošlejšek, Karolína Burská, Kristína Zákopčanová

    Abstract: Cyber defence exercises are intensive, hands-on learning events for teams of professionals who gain or develop their skills to successfully prevent and respond to cyber attacks. The exercises mimic the real-life, routine operation of an organization which is being attacked by an unknown offender. Teams of learners receive very limited immediate feedback from the instructors during the exercise; th… ▽ More

    Submitted 26 December, 2017; originally announced December 2017.

    Comments: 6 pages; SIGCSE '18, Baltimore, MD, USA