Pavel Kozak’s research while affiliated with Mendel University in Brno and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (11)


Phishing – Still TopicalPhishing - Stále Aktuální
  • Article
  • Full-text available

November 2024

·

3 Reads

Advances in Military Technology

·

Kamil Halouzka

·

Pavel Kozak

Článek shrnuje výsledky výzkumu phishingových hrozeb a útoků za víceleté období. Získané phishingové e-maily podléhají statistické, frekvenční a obsahové analýze; zprávy jsou rozděleny podle obsahu do pěti segmentů: Obchodní, Fond, Charita, Převod a Ostatní. Je popsán experiment s komunikací s phishingovými útočníky; jsou k tomu nastavena nezbytná bezpečnostní opatření. Ochrana proti phishingovým útokům je řešena filtrováním příchozí pošty na klientovi Microsoft Outlook při aplikaci pravidel s klíčovými slovy získanými z jednotlivých segmentů. V širším kontextu je vysvětlena kybernetická bezpečnost emailové komunikace a popsány komerční nástroje obrany proti phishingovým útokům. Využitelnost výsledků výzkumu se předpokládá i při výchově studentů vysokých škol a vzdělávání zaměstnanců firem a organizací.

Download








Figure 3. Weekly frequency of incoming emails.
Figure 4. Hierarchical query in the Business segment.
Figure 5. Result of the query in the Business segment, sorted by file name.
Figure 6. Result of the query in the Business segment, sorted by score.
Figure 7. Content analysis of the word compensation.

+6

Analysis of phishing emails

March 2021

·

1,649 Reads

·

9 Citations

AIMS Electronics and Electrical Engineering

This research aims to describe and analyze phishing emails. The problem of phishing, types of message content of phishing emails, and the basic techniques of phishing email attacks are explained by way of introduction. The study also includes a review of the relevant literature on Web of Science and analyzes articles that deal with the threat of phishing attacks and defense against them. Data collected within a time interval of two months from two email accounts of one of the authors of the study was used for the analysis of 200 email messages. Data has been resented in tabular form, to allow further statistical processing using functions such as sum, average and frequency analysis. The core part of the study involved the classification and segmentation of emails according to the main goals of the sent message. The text analytical software Tovek, was used for the analysis, Contribution of the manuscript is in the understanding of phishing emails and extending the knowledge base in education and training in phishing email defense. The discussion compares the results of this research with those of the studies mentioned in the "Introduction" and "Literature review" sections. Furthermore, the emerging problems and limitations of the use of text analytical software are described, and finally the issue is devoted to problems with obtaining personal data from recipients' emails. The "Conclusion" section summarizes the contributions of this research.



Citations (5)


... In addition to civilian communication services, there is a growing demand for satellite radar for military surveillance and reconnaissance. Amid the uncertainty of localized wars, not only developed countries like the United States, European Union, Japan, and China, but also nations worldwide are increasingly focused on developing satellite communication and radar technology for national security [5,6]. Table 1 compares the electrical properties of major semiconductor materials [8], while Figure 2 illustrates the breakdown voltage characteristics as a function of cutoff frequency for semiconductor devices [9,10]. ...

Reference:

A Review of Ku-Band GaN HEMT Power Amplifiers Development
The Use of Drones in Military Conflict
  • Citing Conference Paper
  • May 2023

... The analysis of performance errors showed moderate concern for all error types, with communication errors and misidentification/loss of separation scoring the highest. This highlights the importance of developing clear communication protocols and procedures to minimize the risk of errors (Gupta, Jain, & Vaszkun, 2016;Kozak, Platenka, & Vrsecka, 2022). Additionally, concerns regarding procedural errors, inattention/overload errors, and decision-making errors emphasize the need for ongoing training and support for controllers as they adapt to managing a more complex airspace environment. ...

Analysis of Communication Protocols of UAV Control Sets
  • Citing Conference Paper
  • October 2022

... Cybersecurity becomes a very challenging issue and the occurrence of different cyber attacks is more frequent [1,2]. Detection of anomalies in computer networks has been the main goal of many research activities due to its potential in detecting new types of cyber attacks. ...

A Comparison of Cyber Security Reports for 2020 of Central European Countries
  • Citing Article
  • April 2022

Advances in Science Technology and Engineering Systems Journal

... For example, a threat actor can use a physical interface (USB port) to attack a system without a network [26]. Due to being able to be carried out remotely network-based attacks make up most attacks observed today [27]- [29]. Table 4 illustrates and references the attack vectors detectable using network logs. ...

Overview of Cyber Threats in Central European Countries
  • Citing Conference Paper
  • October 2021

... Email phishing is a phishing type in which unsuspecting victim is tricked into divulging credential or sensitive information through email [10], [52]. Here the attacker sends phishing code either through email containing a phishing link or malware attachment in such a way that as soon as the victim clicks on the link [21], it will either redirect it to a phishing site or get the system infected by malware. Sensitive credentials getting by this mean can then be use by the attacker to commit series of cybercrimes against the victim or target organization including but not limited to remote malware installation, instigate Denial of service attack, Cyberstalking, identity theft, and can even be sold in the dark market. ...

Analysis of phishing emails

AIMS Electronics and Electrical Engineering