Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ján Hurtuk is active.

Publication


Featured researches published by Ján Hurtuk.


international conference on emerging elearning technologies and applications | 2014

The malicious code hiding techniques, code obfuscation problem

Ján Hurtuk; Marek Čopjak; Marek Dufala; Pavol Drienik

Nowadays, in world of modern technologies and technology society, information can be the most valuable commodity on the market and so gathering it, buy or sell it becomes the most important part of doing business. Because of the prizing, the more sophisticated ways of gathering and processing of the information are still being developed, various kinds of more sophisticated and faster systems are being created and more complex technologies are being made, which clearly opens various paths for various criminal menaces. To be able to react appropriate and fast on this threads and protect valuable property of its own, to protect the data and be able to find an appropriate solution for protecting them and for preventing them from damage or any other misusing, man should be aware of the processes behind the whole cycle and be able to define the whole menace scope given to the general situation and scenario.


international conference on intelligent engineering systems | 2014

Malware categorization and recognition problem

Liberios Vokorokos; Ján Hurtuk; Branislav Madoš

Nowadays, in this modern technology based society, information is the most valuable commodity on the market. Because of its prize, ways of stealing and misusing of the information are still being developed. This developing process is done each time by more and more sophisticated ways. To be able to react on this kind of thread, to protect sensitive data and to be able to choose appropriate solution for protecting them and for preventing them from damage, man should be familiar with processes behind and should be able to exactly define the whole menace and every possible dangerous scenario behind it.


symposium on applied computational intelligence and informatics | 2016

Security sandbox based on RBAC model

Ján Hurtuk; Anton Balaz; Norbert Adam

The article presents a security solution of mapping RBAC model in to Linux kernel systems. RBAC management model represents an effective concept of mapping user organization structure to access control of computer systems objects. Definition of RBAC model roles allows declaring permitted operations with specified security policy. Based on the roles, system management model provides a comprehensive system protection against security threats and misuse of user credentials. The result of this paper is a set of defined roles forming security sandboxes within defined security policies of particular roles.


international symposium on applied machine intelligence and informatics | 2016

Brain-computer interface and Arduino microcontroller family software interconnection solution

Branislav Mados; Norbert Adam; Ján Hurtuk; Marek Čopjak

Brain-Computer Interface (BCI) is the modern approach to the construction of the Human-Machine Interface (HMI) that interconnects human brain and the machine and allows to send commands to the machine directly from the central nervous system (CNS) and especially the brain. Great popularity of the Arduino microcontroller board family and integration of its members into many projects including amateur, professional, industrial and scientific solutions impelled us to design software solution, that helps integrate Brain Computer Interface comprising Emotiv EPOC Neuroheadset with Arduino microcontroller boards. The paper introduces concept of the Brain-Computer Interface in its first section and possibilities of its use. Next section of the paper describes Emotiv EPOC Neuroheadset, which is the part of the BCI, with function of the electroencephalograph (EEG) that non-invasively monitors the electromagnetic manifestations of neural activity of the human central nervous system (CNS), mainly the brain. Using the proprietary software installed on the host computer software transforms acquired signals into the commands that are then executed via third party software. Another part of the paper introduces Arduino microcontroller board family and the last part describes proposed software solution that provides software interface between Emotiv EPOC Neuroheadset software and Arduino microcontroller boards.


international conference on intelligent engineering systems | 2016

The obfuscation efficiency measuring schemes

Liberios Vokorokos; Matus Uchnar; Ján Hurtuk

Obfuscation is primarily used as a tool for protecting the written code against reverse engineering. But there also exist other schemas for the obfuscation process, which primarily focus on hiding the true purpose of the written code by transforming its blocks, which causes the inability of comparison the obfuscated code sequence to code stored in database by static or hybrid analysis. When trying to overcome this type of analysis weakness, man should be well educated in the obfuscation schemas.


international symposium on applied machine intelligence and informatics | 2017

Safe user authentication in a network environment

Matus Uchnar; Ján Hurtuk

Network security is often neglected even by users. This paper deals with user authentication in a network environment and offers analysis of this topic and possibilities how to increase its security by cryptographic methods. A synthetic part provides a detailed description of the design of a simple web application to authenticate users with protection against selected attacks and also its practical implementation in the form of implementation in PHP. In order to perform later testing there is also design and creation of version without protection mechanisms described in this part. The evaluation part contains the results of testing of both applications in order to demonstrate the effectiveness of methods against attacks. One of the benefits of this work is also demonstration of the necessity of appropriate choice of password by user, considering his length and combination of characters from different character sets. Another benefit is also proving, how easy is to perform such attacks as well as how easy is to implement protection against them. Last but not least, another benefit of this work is a comparison of efficiency of two different password cracking methods.


international symposium on applied machine intelligence and informatics | 2014

Customer relationship management system proposal with emphasis on simplicity and security using distributed system architecture

Liberios Vokorokos; Ján Hurtuk; Marek Cajkovsky

Main theme of this paper lies in analysis of existing CRM systems based on their using in business across various kinds of environments, their variations in structure and pros and cons of their using in particular case studies. Based on previous research, proposal of brand new CRM system is made, with special structure based on simple yet efficient solutions, which can be applied in almost every possible kind of business planning because of small effort needed to structure change.


international conference on emerging elearning technologies and applications | 2014

User interfaces and GPGPU technology

Branislav Sobota; P. Ivancak; Ján Hurtuk; M. Varga

The aim of this article is to describe the security field user interface for persons with reduced safety awareness. The introduction is a description of some related projects. Consequently, in this context, describes the possibilities of using GPGPU technologies and their implementation in the field of user interfaces with a focus on software ergonomics.


Acta Electrotechnica et Informatica | 2014

METHODS OF THE DATA MINING AND MACHINE LEARNING IN COMPUTER SECURITY

Norbert Ádám; Branislav Madoš; Marek Čajkovský; Ján Hurtuk; Tomáš Tomčák


Acta Electrotechnica et Informatica | 2015

SOUND-BASED COMMUNICATION IN THE PROCESS OF MALWARE DISTRIBUTION

Ján Hurtuk; Branislav Mados; Štefan Halčín

Collaboration


Dive into the Ján Hurtuk's collaboration.

Top Co-Authors

Avatar

Branislav Madoš

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Liberios Vokorokos

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Branislav Mados

Technical University of Košice

View shared research outputs
Top Co-Authors

Avatar

Norbert Adam

Technical University of Košice

View shared research outputs
Top Co-Authors

Avatar

Marek Čopjak

Technical University of Košice

View shared research outputs
Top Co-Authors

Avatar

Anton Balaz

Technical University of Košice

View shared research outputs
Top Co-Authors

Avatar

Liberios Vokorokos

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Matus Uchnar

Technical University of Košice

View shared research outputs
Top Co-Authors

Avatar

Pavol Drienik

Technical University of Košice

View shared research outputs
Top Co-Authors

Avatar

Branislav Sobota

Technical University of Košice

View shared research outputs
Researchain Logo
Decentralizing Knowledge