Ján Hurtuk
Technical University of Košice
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ján Hurtuk.
international conference on emerging elearning technologies and applications | 2014
Ján Hurtuk; Marek Čopjak; Marek Dufala; Pavol Drienik
Nowadays, in world of modern technologies and technology society, information can be the most valuable commodity on the market and so gathering it, buy or sell it becomes the most important part of doing business. Because of the prizing, the more sophisticated ways of gathering and processing of the information are still being developed, various kinds of more sophisticated and faster systems are being created and more complex technologies are being made, which clearly opens various paths for various criminal menaces. To be able to react appropriate and fast on this threads and protect valuable property of its own, to protect the data and be able to find an appropriate solution for protecting them and for preventing them from damage or any other misusing, man should be aware of the processes behind the whole cycle and be able to define the whole menace scope given to the general situation and scenario.
international conference on intelligent engineering systems | 2014
Liberios Vokorokos; Ján Hurtuk; Branislav Madoš
Nowadays, in this modern technology based society, information is the most valuable commodity on the market. Because of its prize, ways of stealing and misusing of the information are still being developed. This developing process is done each time by more and more sophisticated ways. To be able to react on this kind of thread, to protect sensitive data and to be able to choose appropriate solution for protecting them and for preventing them from damage, man should be familiar with processes behind and should be able to exactly define the whole menace and every possible dangerous scenario behind it.
symposium on applied computational intelligence and informatics | 2016
Ján Hurtuk; Anton Balaz; Norbert Adam
The article presents a security solution of mapping RBAC model in to Linux kernel systems. RBAC management model represents an effective concept of mapping user organization structure to access control of computer systems objects. Definition of RBAC model roles allows declaring permitted operations with specified security policy. Based on the roles, system management model provides a comprehensive system protection against security threats and misuse of user credentials. The result of this paper is a set of defined roles forming security sandboxes within defined security policies of particular roles.
international symposium on applied machine intelligence and informatics | 2016
Branislav Mados; Norbert Adam; Ján Hurtuk; Marek Čopjak
Brain-Computer Interface (BCI) is the modern approach to the construction of the Human-Machine Interface (HMI) that interconnects human brain and the machine and allows to send commands to the machine directly from the central nervous system (CNS) and especially the brain. Great popularity of the Arduino microcontroller board family and integration of its members into many projects including amateur, professional, industrial and scientific solutions impelled us to design software solution, that helps integrate Brain Computer Interface comprising Emotiv EPOC Neuroheadset with Arduino microcontroller boards. The paper introduces concept of the Brain-Computer Interface in its first section and possibilities of its use. Next section of the paper describes Emotiv EPOC Neuroheadset, which is the part of the BCI, with function of the electroencephalograph (EEG) that non-invasively monitors the electromagnetic manifestations of neural activity of the human central nervous system (CNS), mainly the brain. Using the proprietary software installed on the host computer software transforms acquired signals into the commands that are then executed via third party software. Another part of the paper introduces Arduino microcontroller board family and the last part describes proposed software solution that provides software interface between Emotiv EPOC Neuroheadset software and Arduino microcontroller boards.
international conference on intelligent engineering systems | 2016
Liberios Vokorokos; Matus Uchnar; Ján Hurtuk
Obfuscation is primarily used as a tool for protecting the written code against reverse engineering. But there also exist other schemas for the obfuscation process, which primarily focus on hiding the true purpose of the written code by transforming its blocks, which causes the inability of comparison the obfuscated code sequence to code stored in database by static or hybrid analysis. When trying to overcome this type of analysis weakness, man should be well educated in the obfuscation schemas.
international symposium on applied machine intelligence and informatics | 2017
Matus Uchnar; Ján Hurtuk
Network security is often neglected even by users. This paper deals with user authentication in a network environment and offers analysis of this topic and possibilities how to increase its security by cryptographic methods. A synthetic part provides a detailed description of the design of a simple web application to authenticate users with protection against selected attacks and also its practical implementation in the form of implementation in PHP. In order to perform later testing there is also design and creation of version without protection mechanisms described in this part. The evaluation part contains the results of testing of both applications in order to demonstrate the effectiveness of methods against attacks. One of the benefits of this work is also demonstration of the necessity of appropriate choice of password by user, considering his length and combination of characters from different character sets. Another benefit is also proving, how easy is to perform such attacks as well as how easy is to implement protection against them. Last but not least, another benefit of this work is a comparison of efficiency of two different password cracking methods.
international symposium on applied machine intelligence and informatics | 2014
Liberios Vokorokos; Ján Hurtuk; Marek Cajkovsky
Main theme of this paper lies in analysis of existing CRM systems based on their using in business across various kinds of environments, their variations in structure and pros and cons of their using in particular case studies. Based on previous research, proposal of brand new CRM system is made, with special structure based on simple yet efficient solutions, which can be applied in almost every possible kind of business planning because of small effort needed to structure change.
international conference on emerging elearning technologies and applications | 2014
Branislav Sobota; P. Ivancak; Ján Hurtuk; M. Varga
The aim of this article is to describe the security field user interface for persons with reduced safety awareness. The introduction is a description of some related projects. Consequently, in this context, describes the possibilities of using GPGPU technologies and their implementation in the field of user interfaces with a focus on software ergonomics.
Acta Electrotechnica et Informatica | 2014
Norbert Ádám; Branislav Madoš; Marek Čajkovský; Ján Hurtuk; Tomáš Tomčák
Acta Electrotechnica et Informatica | 2015
Ján Hurtuk; Branislav Mados; Štefan Halčín