Buttyán, Levente
80  results:
Search for persons X
?
1

PATRIoTA: A Similarity-based IoT Malware Detection Method R..:

, In: 2023 IEEE International Conference on Edge Computing and Communications (EDGE),
Sandor, Jozsef ; Nagy, Roland ; Buttyan, Levente - p. 344-353 , 2023
 
?
2

Increasing the Robustness of a Machine Learning-based IoT M..:

, In: Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning,
 
?
4

A Practical Attack on the TLSH Similarity Digest Scheme:

, In: Proceedings of the 18th International Conference on Availability, Reliability and Security,
 
?
5

SIMBIoTA++: Improved Similarity-based IoT Malware Detection:

, In: 2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS),
 
?
6

Correlation-Based Anomaly Detection for the CAN Bus:

, In: Communications in Computer and Information Science; Security in Computer and Information Sciences,
 
?
7

T-RAID: TEE-based Remote Attestation for IoT Devices:

, In: Communications in Computer and Information Science; Security in Computer and Information Sciences,
Nagy, Roland ; Bak, Márton ; Papp, Dorottya. - p. 76-88 , 2022
 
?
8

Clustering IoT Malware based on Binary Similarity:

, In: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium,
 
?
9

iO Combiners and Universal Constructions:

, In: Cryptographic Obfuscation; SpringerBriefs in Computer Science,
Horváth, Máté ; Buttyán, Levente - p. 79-81 , 2020
 
?
10

Building Core-Obfuscators—In Search of a Seed I:

, In: Cryptographic Obfuscation; SpringerBriefs in Computer Science,
Horváth, Máté ; Buttyán, Levente - p. 55-69 , 2020
 
?
11

Background:

, In: Cryptographic Obfuscation; SpringerBriefs in Computer Science,
Horváth, Máté ; Buttyán, Levente - p. 11-28 , 2020
 
?
12

Cryptographic Obfuscation: A Survey 

SpringerBriefs in Computer Science
Horváth, Máté ; Buttyán, Levente - 1st ed. 2020 . , 2020
 
?
13

Introduction:

, In: Cryptographic Obfuscation; SpringerBriefs in Computer Science,
Horváth, Máté ; Buttyán, Levente - p. 1-10 , 2020
 
?
14

There Is Always an Exception: Controlling Partial Informati..:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2019,
 
?
15

Building Functional Encryption: In Search of a Seed, II:

, In: Cryptographic Obfuscation; SpringerBriefs in Computer Science,
Horváth, Máté ; Buttyán, Levente - p. 71-77 , 2020
 
1-15