{"id":15118,"date":"2018-09-26T15:48:11","date_gmt":"2018-09-26T15:48:11","guid":{"rendered":"https:\/\/www.upjs.sk\/pracoviska\/tip\/ciit\/focus-of-research\/"},"modified":"2023-06-28T08:52:19","modified_gmt":"2023-06-28T08:52:19","slug":"focus-of-research","status":"publish","type":"page","link":"https:\/\/www.upjs.sk\/pracoviska\/tip\/en\/our-centers\/ciit\/focus-of-research\/","title":{"rendered":"Focus of research"},"content":{"rendered":"\n
<\/a>Cybernetic security<\/mark><\/strong> <\/a>Communication and collaboration systems<\/mark><\/strong> <\/a>Artificial intelligence<\/mark><\/strong> Cybernetic securityNetwork and information systems and services play an important role in society. Their reliability and security are essential for economic and social activities and, in particular, for the functioning of the internal market. The robustness and readiness of the network is influenced by several factors that govern its use. The goal of CIIT is … Continued<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":15111,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","footnotes":""},"class_list":["post-15118","page","type-page","status-publish","hentry"],"acf":{"acf_link_na_externy_obsah":""},"yoast_head":"\n
Network and information systems and services play an important role in society. Their reliability and security are essential for economic and social activities and, in particular, for the functioning of the internal market. The robustness and readiness of the network is influenced by several factors that govern its use. The goal of CIIT is to develop models that take into account these factors and \u00a0more reliably estimate their potential to meet their purpose facing the changed circumstances. Respectively, model the impact of interventions in the structure of networks on behavior in other areas. It is essential to take into account the security aspects, threats to privacy and ethical principles in these models. Identify the security threats of the network, the community, the individual. Identify anomalies respectively to predict degenerative processes in structures. Develop models to explore complex systems with multiple dimensions and their interdependence (e.g. as individual involved in nets embedded into larger social, cultural, technical structures, and physical space).<\/p>\n\n\n\n
Just as control of the computer with commands and keyboard was replaced by mouse-controlled GUI, the new control devices again fundamentally change the design of user interfaces. Introduced products face this new challenge and will need to adapt their user interfaces to a new trend. However, a number of experiments with different approaches need to be done before the change. There are no user patterns for new ways of control yet. Our goal is to create space for experimental interface designs and explore the possibilities of controlling the user interface using modern drivers or develop a new driver that would be natural (easy, simple) to control. Experimental activity would also be beneficial for the commercial entities involved in the Ko\u0161ice IT Valley consortium.<\/p>\n\n\n\n
Getting knowledge from data is in many ways domain-specific tasks. On one hand, it requires extensive knowledge of analytical and research methods, but also a strong understanding of the area from which the data originates. The aim of CIIT is to build a workplace in cooperation with the commercial sphere to support the creation of expert systems by using the knowledge from the development of statistical analytical methods, concept analysis and machine learning methods.<\/p>\n","protected":false},"excerpt":{"rendered":"