Banati, Anna
27  Ergebnisse:
Personensuche X
?
1

Improving CTF Event Organization: A Case Study on Utilizing..:

, In: 2024 IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics (SAMI),
Ersok, Mate ; Erdodi, Laszlo ; Balogh, Adam. - p. 000169-000174 , 2024
 
?
2

Concept for real time attacker profiling with honeypots, by..:

, In: 2024 IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics (SAMI),
Balogh, Adam ; Ersok, Mate ; Banati, Anna. - p. 000175-000180 , 2024
 
?
3

Machine Learning Methods for Cybersecurity: Review and Bibl..:

, In: 2023 IEEE 21st Jubilee International Symposium on Intelligent Systems and Informatics (SISY),
Kail, Eszter ; Banati, Anna ; Fleiner, Rita.. - p. 000527-000536 , 2023
 
?
4

Neural Network-Based Log Analysis Methods for 5G Network:

, In: 2023 IEEE 21st Jubilee International Symposium on Intelligent Systems and Informatics (SISY),
Puskas, Aron ; Kail, Eszter ; Laczi, Szandra. - p. 000589-000594 , 2023
 
?
5

Use Cases of Attack Graph in Threat Analysis And Risk Asses..:

, In: 2022 IEEE 1st International Conference on Cognitive Mobility (CogMob),
 
?
6

Security threats based on critical database system privileg..:

, In: 2022 IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems (ICCC),
Fleiner, Rita ; Hubert, Ruben ; Banati, Anna. - p. 000117-000122 , 2022
 
?
7

Measuring Honeypots based on CTF game:

, In: 2022 IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems (ICCC),
Ersok, Mate ; Balogh, Adam ; Erdodi, Laszlo... - p. 000123-000128 , 2022
 
?
8

Use cases of attack graph for SOC optimization purpose:

, In: 2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES),
Banati, Anna ; Rigo, Erno ; Fleiner, Rita. - p. 000143-000148 , 2022
 
?
9

Overview of Attack Graph Generation For Automotive Systems:

, In: 2022 IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems (ICCC),
 
?
10

Attack Graph Implementation in Graph Database:

, In: 2022 IEEE 20th Jubilee International Symposium on Intelligent Systems and Informatics (SISY),
Simon-Nagy, Gabriella ; Fleiner, Rita ; Banati, Anna - p. 000127-000132 , 2022
 
?
11

5G registration tracking based on logdata:

, In: 2022 IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems (ICCC),
Kecskes, Miklos Vilmos ; Orsos, Miklos ; Kail, Eszter.. - p. 000129-000134 , 2022
 
?
12

Strengthening Database Security with Capture the Flag Exerc..:

, In: 2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES),
Hubert, Ruben ; Banati, Anna ; Erdodi, Laszlo. - p. 000137-000142 , 2022
 
?
13

Usability of Scientific Workflow in Dynamically Changing En..:

Bánáti, Anna ; Kail, Eszter ; Kacsuk, Péter.
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-319-16766-4_14.  , 2015
 
?
14

Usability of Scientific Workflow in Dynamically Changing En..:

Bánáti, Anna ; Kail, Eszter ; Kacsuk, Péter.
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-319-16766-4_14.  , 2015
 
?
15

Intersectionality, gender norms, and young adolescents in c..:

Banati, Prerna ; Jones, Nicola ; Moreau, Caroline...
The Lancet Child & Adolescent Health.  8 (2024)  7 - p. 522-531 , 2024
 
1-15