Vedecko/umelecko-pedagogická charakteristika osoby
I.5 - Názov pracoviska
Ústav počítačových technológií a informatiky
I.6 - Adresa pracoviska
Nám. J. Herdu 2 917 01 Trnava
I.7 - Pracovné zaradenie
docent
I.8 - E-mailová adresa
marek.simon@ucm.sk
I.9 - Hyperlink na záznam osoby v Registri zamestnancov vysokých škôl
https://www.portalvs.sk/regzam/detail/14374
I.10 - Názov študijného odboru, v ktorom osoba pôsobí na vysokej škole
informatika
I.11 - ORCID iD
https://orcid.org/0000-0002-9844-5969
II. - Vysokoškolské vzdelanie a ďalší kvalifikačný rast
II.a - Názov vysokej školy alebo inštitúcie
Materiálovotechnologická fakulta v Trnave, Slovenská technická univerzita v Bratislave
II.c - Odbor a program
Aplikovaná informatika a automatizácia v priemysle
II.a - Názov vysokej školy alebo inštitúcie
Pedagogická fakulta, Univerzita Konštantína Filozofa v Nitre
II.c - Odbor a program
Didaktika technických odborných predmetov
III. - Súčasné a predchádzajúce zamestnania
III.a - Zamestnanie-pracovné zaradenie |
III.b - Inštitúcia |
III.c - Časové vymedzenie |
odborný asistent, univerzitný docent |
Univerzita sv. Cyrila a Metoda v Trnave, Nám. J. Herdu 2, 917 01, Trnava, (verejná vysoká škola) ▪ výučba predmetov na Katedre aplikovanej informatiky, účasť na IT projektoch |
09/2002 – 06/2021, 07/2021 – súčastnosť |
systémový inžinier |
Centrum výpočtovej a informačnej techniky MtF STU Trnava ▪ Správa počítačovej siete a operačných systémov |
1997-2002 |
konateľ |
Xmod, s.r.o. |
2007 - súčastnosť |
IV. - Rozvoj pedagogických, odborných, jazykových, digitálnych a iných zručností
IV.a - Popis aktivity, názov kurzu (ak išlo o kurz), iné |
IV.b - Názov inštitúcie |
IV.c - Rok |
certifikát Check Point SandBlast Administrator |
Check Point |
2017 |
Akreditovaný skúšobný komisár ECDL (European Computer Driving Licence) |
EU |
2008 |
V. - Prehľad aktivít v rámci pedagogického pôsobenia na vysokej škole
V.1.a - Názov profilového predmetu |
V.1.b - Študijný program |
V.1.c - Stupeň |
V.1.d - Študijný odbor |
manažment počítačových sietí |
aplikovaná informatika |
II. |
informatika |
pokročilé riešenia sieťovej bezpečnosti |
aplikovaná informatika |
II. |
informatika |
počítačové siete I. |
aplikovaná informatika |
I. |
informatika |
počítačové siete II |
aplikovaná informatika |
I. |
informatika |
počítačové siete III. |
aplikovaná informatika |
I. |
informatika |
V.2.a - Názov študijného programu |
V.2.b - Stupeň |
V.2.c - Študijný odbor |
aplikovaná informatika |
I. |
informatika |
aplikovaná informatika |
II. |
informatika |
V.4.a - Bakalárske (prvý stupeň)
1
V.4.b - Diplomové (druhý stupeň)
2
V.4.c - Dizertačné (tretí stupeň)
0
V.4.a - Bakalárske (prvý stupeň)
32
V.4.b - Diplomové (druhý stupeň)
2
V.4.c - Dizertačné (tretí stupeň)
0
VI. - Prehľad výsledkov tvorivej činnosti
VI.1.b - Za posledných šesť rokov
30
VI.1.b - Za posledných šesť rokov
20
VI.1.a - Celkovo
360 (https://scholar.google.sk/citations?user=fuIgjaEAAAAJ&hl=sk)
VI.1.b - Za posledných šesť rokov
261
VI.1.b - Za posledných šesť rokov
101
L.Huraj,M.Simon and T.Horák,"IoT Measuring of UDP-Based Distributed Reflective DoS Attack,"2018IEEE16th International Symposium on Intelligent Systems and Informatics (SISY), Subotica, Serbia, 2018, pp. 000209-000214, doi: 10.1109/SISY.2018.8524703.
L. Huraj and M. Šimon, "Realtime attack environment for DDoS experimentation," 2019 IEEE 15th International Scientific Conference on Informatics, Poprad, Slovakia, 2019, pp. 000113-000118, doi: 10.1109/ Informatics47936.2019.9119271.
T.Kozíkand M.Šimon,"Preparing and managing the remote experiment in education,"201215thInternational Conference on Interactive Collaborative Learning (ICL), Villach, Austria, 2012, pp. 1-4, doi: 10.1109/ ICL.2012.6402077.
T. Kozík,M. Šimon,P. Arras,P. Kunaand G.Tabunshchyk,"Remote experiment at universities,"2015IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Warsaw, Poland, 2015, pp. 929-934, doi: 10.1109/IDAACS.2015.7341440.
Šimon, M.; Huraj, L.; Búčik, N. A Comparative Analysis of High Availability for Linux Container Infrastructures. Future Internet 2023, 15, 253. https://doi.org/10.3390/fi15080253
L. Huraj and M. Šimon, "Realtime attack environment for DDoS experimentation," 2019 IEEE 15th International Scientific Conference on Informatics, Poprad, Slovakia, 2019, pp. 000113-000118, doi: 10.1109/ Informatics47936.2019.9119271.
M.Šimon,D.L.Iveta,L.Huraj and J.Pospíchal, "Multi-Hub Location Heuristic for Alert Routing,"in IEEE Access, vol. 7, pp. 40369-40379, 2019, doi: 10.1109/ACCESS.2019.2907161.
Šimon M.,Huraj L.(2019)A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks. In: Silhavy R. (eds) Software Engineering Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 984. Springer, Cham. https://doi.org/10.1007/978-3-030-19807-7_12
Huraj, L.; Šimon, M.; Horák, T. Resistance of IoT Sensors against DDoS Attack in Smart Home Environment. Sensors 2020, 20, 5298. https://doi.org/10.3390/s20185298
ŠIMON,M.;HURAJ,L.;ČERŇANSKÝ,M. Performance Evaluations of IP Tables Firewall Solutions under DDoS attacks. Journal of Applied Mathematics, Statistics and Informatics, 2015, 11.2: 35-45.
- By: H. Igor, J. Bohuslava and J. Martin, "Proposal of communication standardization of industrial networks in Industry 4.0," 2016 IEEE 20th Jubilee International Conference on Intelligent Engineering Systems (INES), Budapest, Hungary, 2016, pp. 119-124, doi: 10.1109/INES.2016.7555105.
- K. Evers, R. Oram, S. El-Tawab, M. H. Heydari and B. B. Park, "Security measurement on a cloud-based cyber-physical system used for Intelligent Transportation," 2017 IEEE International Conference on Vehicular Electronics and Safety (ICVES), Vienna, Austria, 2017, pp. 97-102, doi: 10.1109/ICVES.2017.7991908.
- Dirgová Luptáková I., Pospíchal J. (2017) Community Cut-off Attack on Malicious Networks. In: Kravets A., Shcherbakov M., Kultsova M., Groumpos P. (eds) Creativity in Intelligent Technologies and Data Science. CIT&DS 2017. Communications in Computer and Information Science, vol 754. Springer, Cham. https:// doi.org/10.1007/978-3-319-65551-2_50
- Horák T., Huraj L. (2019) Smart Thermostat as a Part of IoT Attack. In: Silhavy R. (eds) Cybernetics and Automation Control Theory Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 986. Springer, Cham. https://doi.org/10.1007/978-3-030-19813-8_17 I.
- D. Luptáková and J. Pospichal, "Community Detection Based Clustering," 2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY), Subotica, Serbia, 2018, pp. 000289-000294, doi: 10.1109/ SISY.2018.8524662.
- Dirgová Luptáková I., Pospíchal J. (2017) Maximum Traveling Salesman Problem by Adapted Neural Gas. In: Matoušek R. (eds) Recent Advances in Soft Computing. ICSC-MENDEL 2016. Advances in Intelligent Systems and Computing, vol 576. Springer, Cham. https://doi.org/10.1007/978-3-319-58088-3_16
- Huraj, L.; Horak, T.; Strelec, P.; Tanuska, P. Mitigation against DDoS Attacks on an IoT-Based Production Line Using Machine Learning. Appl. Sci. 2021, 11, 1847. https://doi.org/10.3390/app11041847
- M. Ölvecký and D. Gabriška, "Metadata associations and relationship with real data," 2019 17th International Conference on Emerging eLearning Technologies and Applications (ICETA), Starý Smokovec, Slovakia, 2019, pp. 570-574, doi: 10.1109/ICETA48886.2019.9040127.
L.Huraj,M.SimonandT.Horák,"IoT Measuring of UDP-Based Distributed Reflective DoS Attack,"2018IEEE16th International Symposium on Intelligent Systems and Informatics (SISY), Subotica, Serbia, 2018, pp. 000209-000214, doi: 10.1109/SISY.2018.8524703.
- BY: Aljuhani, A. 57193802914; Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments (2021) IEEE Access, 9, art. no. 9366480, pp. 42236-42264. DOI: 10.1109/ACCESS.2021.3062909 DOCUMENT TYPE: Article PUBLICATION STAGE: Final SOURCE: Scopus
- Chen, X., Feng, W., Ma, Y., Ge, N., Wang, X. 57211101682;57209853990;57221849485;7005864121;7501856729; Preventing DRDoS Attacks in 5G Networks: A New Source IP Address Validation Approach (2020) 2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings, art. no. 9322314, DOI: 10.1109/GLOBECOM42002.2020.9322314 DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final SOURCE: Scopus
- Gondim, J.J.C., de Oliveira Albuquerque, R., Sandoval Orozco, A.L. 57191967350;16745042500;57195496087; Mirror saturation in amplified reflection Distributed Denial of Service: A case of study using SNMP, SSDP, NTP and DNS protocols (2020) Future Generation Computer Systems, 108, pp. 68-81. Cited 1 time. hDOI: 10.1016/j.future.2020.01.024 DOCUMENT TYPE: Article PUBLICATION STAGE: Final OPEN ACCESS: All Open Access, Bronze SOURCE: Scopus
- Ganesh Karthik, M., Mukesh Krishnan, M.B. 56695263600;55349873700; PBAMA: Parallel best attack mitigation algorithm based ddos attacks detection in internet of things (2020) International Journal of Advanced Science and Technology, 29 (5 Special Issue), pp. 978-986. DOCUMENT TYPE: Article PUBLICATION STAGE: Final SOURCE: Scopus
- Aminu Ghali, A., Ahmad, R., Alhussian, H.S.A. 57218596251;56767549000;55430817100; Comparative Analysis of DoS and DDoS Attacks in Internet of Things Environment (2020) Advances in Intelligent Systems and Computing, 1225 AISC, pp. 183-194. Cited 1 time. DOI: 10.1007/978-3-030-51971-1_15 DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final SOURCE: Scopus
- Abu Waraga, O., Bettayeb, M., Nasir, Q., Abu Talib, M. 57211513498;57209271202;9734443200;56521230400; Design and implementation of automated IoT security testbed (2020) Computers and Security, 88, art. no. 101648, . Cited 11 times. DOI: 10.1016/j.cose.2019.101648 DOCUMENT TYPE: Article PUBLICATION STAGE: Final SOURCE: Scopus
- Samaila, M.G., Sequeiros, J.B.F., Simoes, T., Freire, M.M., Inacio, P.R.M. 57195332930;56272323400;37065126000;7102299203;27168727400; IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space (2020) IEEE Access, 8, art. no. 8957116, pp. 16462-16494. Cited 4 times.DOI: 10.1109/ACCESS.2020.2965925 DOCUMENT TYPE: Article PUBLICATION STAGE: Final OPEN ACCESS: All Open Access, Gold SOURCE: Scopus
- Jose, J., Jose, D.V. 57215215348;57215420756; Impact of distributed denial of service attack in internet of things applications-an overview (2019) International Journal of Advanced Science and Technology, 28 (17), pp. 201-205. DOCUMENT TYPE: Article PUBLICATION STAGE: Final SOURCE: Scopus
- Bettayeb, M., Waraga, O.A., Talib, M.A., Nasir, Q., Einea, O. 57209271202;57215138764;56521230400;9734443200;57194773266; IoT Testbed Security: Smart Socket and Smart Thermostat (2019) 2019 IEEE Conference on Application, Information and Network Security, AINS 2019, art. no. 8968694, pp. 18-23. Cited 3 times. DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final SOURCE: Scopus
- Salami, O.W., Umoh, I.J., Adedokun, E.A., Mu'Azu, M.B., Ajao, L.A. 57215324148;54421412000;57215303831;55030886900;57194237345; Efficient Method for Discriminating Flash Event from DoS Attack during Internet Protocol Traceback using Shark Smell Optimization Algorithm (2019) 2019 2nd International Conference of the IEEE Nigeria Computer Chapter, NigeriaComputConf 2019, art. no. 8949671, . Cited 2 times. DOI: 10.1109/NigeriaComputConf45974.2019.8949671 DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final SOURCE: Scopus
- Kumar, N., Mittal, N., Naryan, Y. 14007785600;56640907600;57211402722; Isolation of distributed denial of service attack using threshold based technique in internet of things (2019) International Journal of Recent Technology and Engineering, 8 (1C2), pp. 87-93. Cited 1 time. DOCUMENT TYPE: Article PUBLICATION STAGE: Final SOURCE: Scopus
- Šimon, M., Huraj, L. 55575839800;27867686600; A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks (2019) Advances in Intelligent Systems and Computing, 984, pp. 109-118. Cited 5 times. DOI: 10.1007/978-3-030-19807-7_12 DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final SOURCE: Scopus
T. Kozík and M.Šimon,"Preparing and managing the remote experimentin education,"201215thInternational Conference on Interactive Collaborative Learning (ICL), Villach, Austria, 2012, pp. 1-4, doi: 10.1109/ ICL.2012.6402077.
- BY: Uckelmann, D., Mezzogori, D., Esposito, G., Neroni, M., Reverberi, D., Ustenko, M. 24825537100;57205318368;57211505546;57204589349;57218701342;57218700930; Safety and Security in Federated Remote Labs – A Requirement Analysis (2021) Advances in Intelligent Systems and Computing, 1231 AISC, pp. 21-36. Cited 1 time. DOI: 10.1007/978-3-030-52575-0_2 DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final SOURCE: Scopus
- Uckelmann, D., Mezzogori, D., Esposito, G., Neroni, M., Reverberi, D., Ustenko, M., Baalsrud-Hauge, J. 24825537100;57205318368;57211505546;57204589349;57218701342;57218700930;55201947400; Guideline to Safety and Security in Federated Remote Labs (2021) International journal of online and biomedical engineering, 17 (4), pp. 39-62. DOCUMENT TYPE: Article PUBLICATION STAGE: Final OPEN ACCESS: All Open Access, Gold SOURCE: Scopus
- Arras, P., Van Merode, D., Tabunshchyk, G. 54395094700;55640573500;56007319800; Project-oriented teaching approach for IoT education (2018) Dependable IoT for Human and Industry: Modeling, Architecting, Implementation, pp. 515-534. DOCUMENT TYPE: Book Chapter PUBLICATION STAGE: Final SOURCE: Scopus
- Kolomvatsos, K., Tsiroukis, M., Hadjiefthymiades, S. 24829478600;57210923854;6603881052; An experiment description language for supporting mobile IoT applications (2017) Building the Future Internet through FIRE: 2016 FIRE Book: a Research and Experimentation based Approach English, pp. 461-490. Cited 3 times. DOCUMENT TYPE: Book Chapter PUBLICATION STAGE: Final SOURCE: Scopus
- Cvjetković, V.M., Stanković, U. 6507636065;57194407878; Arduino based physics and engineering remote laboratory (2017) Advances in Intelligent Systems and Computing, 545, pp. 560-574. Cited 1 time. DOI: 10.1007/978-3-319-50340-0_51 DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final SOURCE: Scopus
- Cvjetkovic, V.M., Stankovic, U. 6507636065;57194407878; Arduino based physics and engineering remote laboratory (2017) International Journal of Online Engineering, 13 (1), pp. 87-105. Cited 8 times. DOI: 10.3991/ijoe.v13i01.6375 DOCUMENT TYPE: Article PUBLICATION STAGE: Final OPEN ACCESS: All Open Access, Gold, Green SOURCE: Scopus
- Li, Z. 57192256245; Research on modern sports training method based on computer virtual technology (2016) International Journal of Multimedia and Ubiquitous Engineering, 11 (11), pp. 427-438. DOI: 10.14257/ijmue.2016.11.11.39 DOCUMENT TYPE: Article PUBLICATION STAGE: Final OPEN ACCESS: All Open Access, Bronze SOURCE: Scopus
- Arras, P., Henke, K., Tabunshchyk, G., Van Merode, D. 54395094700;56266272300;56007319800;55640573500; Iterative pattern for the embedding of remote laboratories in the educational process (2015) Proceedings of 2015 12th International Conference on Remote Engineering and Virtual Instrumentation, REV 2015, art. no. 7087262, pp. 52-55. Cited 6 times. DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final SOURCE: Scopus
- Arras, P., Tabunshchyk, G., Kozik, T. 54395094700;56007319800;57197654521; E-learning concept for the properties of materials remote study (2013) Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, IDAACS 2013, 2, art. no. 6663024, pp. 742-747. Cited 6 times. h DOI: 10.1109/IDAACS.2013.6663024 DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final OPEN ACCESS: All Open Access, Green SOURCE: Scopus
- Yang, L., Lu, H. 56032885200;8589763800; Implementation of computer hardware remote laboratory based on cloud computing platform (2013) Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 41 (SUPPL.2), pp. 72-76. DOCUMENT TYPE: Article PUBLICATION STAGE: Final SOURCE: Scopus
Marek Šimon, Ladislav Huraj, Marián Hosťovecký (2015): IPv6 Network DDoS Attack with P2P Grid. In: Kravets A., Shcherbakov M., Kultsova M., Shabalina O. (eds) Creativity in Intelligent Technologies and Data Science. Communications in Computer and Information Science, vol 535. Springer, Cham. https:// doi.org/10.1007/978-3-319-23766-4_32
- BY: Alsadhan, A., Hussain, A., Liatsis, P., Alani, M., Tawfik, H., Kendrick, P., Francis, H. 57203481904;56212648400;8410551000;36615131500;10039993800;57190286922;26029423800; Locally weighted classifiers for detection of neighbor discovery protocol distributed denial-of-service and replayed attacks (2019) Transactions on Emerging Telecommunications Technologies, art. no. e3700, . Cited 3 times. DOCUMENT TYPE: Article PUBLICATION STAGE: Article in Press OPEN ACCESS: All Open Access, Green SOURCE: Scopus
- Dirgová Luptáková, I., Pospíchal, J. 57192181484;35617699700; Community cut-off attack on malicious networks (2017) Communications in Computer and Information Science, 754, pp. 697-708. Cited 5 times. DOI: 10.1007/978-3-319-65551-2_50 DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final SOURCE: Scopus
- Igor, H., Bohuslava, J., Martin, J. 56126464400;56126148500;55750292400; Proposal of communication standardization of industrial networks in Industry 4.0 (2016) INES 2016 - 20th Jubilee IEEE International Conference on Intelligent Engineering Systems, Proceedings, art. no. 7555105, pp. 119-124. Cited 13 times. DOI: 10.1109/INES.2016.7555105 DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final SOURCE: Scopus
M.Šimon, D.L.Iveta, L.Huraj and J.Pospíchal,"Multi-Hub Location Heuristic for Alert Routing,"inIEEEAccess, vol. 7, pp. 40369-40379, 2019, doi: 10.1109/ACCESS.2019.2907161.
- BY: Gupta, A.T., Lokhande, S.A., Mondal, K. 57221153668;57222096460;55235107400; Burning Grids and Intervals (2021) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12601 LNCS, pp. 66-79. DOI: 10.1007/978-3-030-67899-9_6 DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final SOURCE: Scopus
- Gabriska, D. 55807885500; Evaluation of the level of reliability in hazardous technological processes (2021) Applied Sciences (Switzerland), 11 (1), art. no. 134, pp. 1-13. DOI: 10.3390/app11010134 DOCUMENT TYPE: Article PUBLICATION STAGE: Final OPEN ACCESS: All Open Access, Gold SOURCE: Scopus
- Kenzin, M., Bychkov, I., Maksimkin, N. 57023864000;56308077400;57024121200; Situational awareness for distributed mobile robot teams under limited communication (2020) CEUR Workshop Proceedings, 2638, pp. 146-155. DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final SOURCE: Scopus
- Kamali, S., Miller, A., Zhang, K. 15845705100;26649546500;57214780829; Burning Two Worlds: Algorithms for Burning Dense and Tree-Like Graphs (2020) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12011 LNCS, pp. 113-124. Cited 1 time. DOI: 10.1007/978-3-030-38919-2_10 DOCUMENT TYPE: Conference Paper PUBLICATION STAGE: Final SOURCE: Scopus
VEGA1/0145/18-VEGA-Optimalizácia sieťovej bezpečnosti prostredníctvom výpočtovej inteligencie (Optimization of network security by computational intelligence).
APVV-17-0116 Algoritmus kolektívnej inteligencie: Interdisciplinárne štúdium swarmového správania netopierov, IKT, riešiteľ, 2018-2021
VII. - Prehľad aktivít v organizovaní vysokoškolského vzdelávania a tvorivých činností
VII.a - Aktivita, funkcia |
VII.b - Názov inštitúcie, grémia |
VII.c - Časové vymedzenia pôsobenia |
Týždeň vedy a techniky, prednášajúci, prednáška Bezpečne na Internete, Moje heslo, môj štít |
UCM FPV |
2011, 2017 |
Získanie HW a SW pre EDU Barracuda, prezentácia projektu na Konference Security & Networking Bratislava 2017 |
U-system s.r.o., COMGUARD s.r.o. |
2017 |
DUCM, prednášajúci |
DUCM |
2013, 2014 |
zodpovedný riešiteľ |
KEGA 012UCM-4/2021 - KEGA - Moderné technológie a inovácie vo výučbe sieťovej bezpečnosti (Modern technologies and innovations in network security education) |
2021 - 2023 |
zástupca vedúceho projektu |
KEGA 011UCM-4/2024 - Výučba a tréning bezpečnosti IoT s využitím moderných technológií |
2024 - 2026 |
VIII. - Prehľad zahraničných mobilít a pôsobenia so zameraním na vzdelávanie a tvorivú činnosť
v študijnom odbore
VIII.a - Názov inštitúcie |
VIII.b - Sídlo inštitúcie |
VIII.c - Obdobie trvania pôsobenia/pobytu (uviesť dátum odkedy dokedy trval pobyt) |
VIII.d - Mobilitná schéma, pracovný kontrakt, iné (popísať) |
Univerzita Tomáše Bati v Zlíne |
Nám. T. G. Masaryka 5555, 760 01 Zlín |
23.04.-26.04.2019 |
Erasmus+ |
Ostravská Univerzita v Ostrave |
30. dubna 22, 701 03 Ostrava |
11.6.-15.6.2018 |
Erasmus+ |
University of Bielsko-Biala, Bielsko-Biala |
Bielsko-Biała, Poland |
12.06.2017-16.06.2017 |
Erasmus+ |
Filozoficko-přírodovědecká fakulta, Slezská univerzita v Opavě |
Opava, ČR / Opava, Czech Republic |
20.6.2016-24.06.2016 |
Erasmus+ |
Oulu University of Applied Science |
Oulu, Fínsko |
15.03.2015-22.03.2015 |
projekt FPV - Tvorba a inovácia študijných programov |
SpainBcn-Programs in Barcelona |
Pare Laines, 19 2 - 08025 Barcelona |
17.06.2024 do 21.06.2024 |
Staff Mobility For Training, international mobility training course. Improvement of English Proficiency. Possibility of Intensive English block course. Speaking with correction. |
IX. - Iné relevantné skutočnosti
IX.a - Ak je to podstatné, uvádzajú sa iné aktivity súvisiace s vysokoškolským vzdelávaním
alebo s tvorivou činnosťou
Správa virtualizačného prostredia UPTI vrátane VM serverov ako web UPTI, LMS Moodle. Správa prostredia na ktorom je realizovaný výskum z oblasti bezpečnosti IT a IoT.
Dátum poslednej aktualizácie
2025-02-12