Tihanyi, Norbert
42  Ergebnisse:
Personensuche X
?
1

ESBMC v7.4: Harnessing the Power of Intervals: (Competition..:

, In: Tools and Algorithms for the Construction and Analysis of Systems; Lecture Notes in Computer Science,
 
?
5

Machine learning techniques for IoT security: Current resea..:

Alwahedi, Fatima ; Aldhaheri, Alyazia ; Ferrag, Mohamed Amine..
Internet of Things and Cyber-Physical Systems.  4 (2024)  - p. 167-185 , 2024
 
?
6

Privacy-Preserving Password Cracking: How a Third Party Can..:

Tihanyi, Norbert ; Bisztray, Tamás ; Borsos, Bertalan.
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 2981-2996 , 2024
 
?
7

The FormAI Dataset: Generative AI in Software Security thro..:

, In: Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering,
Tihanyi, Norbert ; Bisztray, Tamas ; Jain, Ridhi... - p. 33-43 , 2023
 
?
9

Edge Learning for 6G-Enabled Internet of Things: A Comprehe..:

Ferrag, Mohamed Amine ; Friha, Othmane ; Kantarci, Burak...
IEEE Communications Surveys & Tutorials.  25 (2023)  4 - p. 2654-2713 , 2023
 
?
12

Creating effective fingerprint artefacts: a cooperative and..:

, In: 2021 International Carnahan Conference on Security Technology (ICCST),
Carvalho, Ryan ; Tihanyi, Norbert - p. 1-6 , 2021
 
?
13

The Theory and Practice of Magic Hash Based Attacks on Ligh..:

, In: Security, Privacy, and Anonymity in Computation, Communication, and Storage; Lecture Notes in Computer Science,
Tihanyi, Norbert ; Borsos, Bertalan - p. 93-107 , 2021
 
?
14

Computation Results of the Riemann Zeta Search Project:

, In: 2018 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC),
Tihanyi, Norbert ; Kovacs, Attila - p. 75-79 , 2018
 
1-15