|
|
Personal data sheet |
Print preview personal data approved: 2024. II. 25. Publications |
2024
from data base, 2024. II. 25. |
Ferrag Mohamed Amine, Ndhlovu Mthandazo, Tihanyi Norbert, Cordeiro Lucas C., Debbah Merouane, Lestable Thierry, Thandi Narinderjit Singh: Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices, IEEE ACCESS 12: pp. 23733-23750. type of document: Journal paper/Article number of independent citations: 4 language: English URL |
2024
from data base, 2024. II. 25. |
Alwahedi Fatima, Aldhaheri Alyazia, Ferrag Mohamed Amine, Battah Ammar, Tihanyi Norbert: Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models, Internet of Things and Cyber-Physical Systems 4: pp. 167-185. type of document: Journal paper/Article language: English URL |
2023
from data base, 2024. II. 25. |
Tihanyi Norbert, Bisztray Tamas, Jain Ridhi, Ferrag Mohamed Amine, Cordeiro Lucas C., Mavroeidis Vasileios: The FormAI Dataset: Generative AI in Software Security through the Lens of Formal Verification, In: Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering, ACM (2023) pp. 33-43. type of document: Part of book/Proceedings Paper number of independent citations: 1 language: English URL |
2022
from data base, 2024. II. 25. |
Borsos Bertalan, Kovács Attila, Tihanyi Norbert: Tight upper and lower bounds for the reciprocal sum of Proth primes, RAMANUJAN JOURNAL 59: (1) pp. 181-198. type of document: Journal paper/Article number of independent citations: 2 language: English URL |
2022
from data base, 2024. II. 25. |
Tihanyi Norbert: Report on the First DES Fixed Points for Non-Weak Keys: Case-Study of Hacking an IoT Environment, IEEE ACCESS 10: pp. 77802-77809. type of document: Journal paper/Article number of independent citations: 1 language: English URL |
2021
from data base, 2024. II. 25. |
Carvalho Ryan, Tihanyi Norbert: Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rate, In: 2021 International Carnahan Conference on Security Technology (ICCST), IEEE (2021) pp. 1-6. type of document: Part of book/Proceedings Paper number of independent citations: 1 language: English URL |
2017
from data base, 2024. II. 25. |
Tihanyi N, Kovács A, Kovács J: Computing Extremely Large Values of the Riemann Zeta Function, JOURNAL OF GRID COMPUTING 15: (4) pp. 527-534. type of document: Journal paper/Article number of independent citations: 1 language: English URL |
2015
from data base, 2024. II. 25. |
Tihanyi N, Kovács A, Vargha G, Lénárt Á: Unrevealed patterns in password databases part one, LECTURE NOTES IN COMPUTER SCIENCE 9393: pp. 89-101. type of document: Journal paper/Article number of independent citations: 5 language: English URL |
2015
from data base, 2024. II. 25. |
Tihanyi Norbert: Fault-Injection based backdoors in Pseudo Random Number Generators, STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA 52: (2) pp. 233-245. type of document: Journal paper/Article number of independent citations: 1 language: English URL |
2013
from data base, 2024. II. 25. |
Kovács Attila, Tihanyi Norbert: Efficient computing of n-dimensional simultaneous Diophantine approximation problems, ACTA UNIVERSITATIS SAPIENTIAE INFORMATICA 5: (1) pp. 16-34. type of document: Journal paper/Article number of independent citations: 4 language: English URL |
| Number of independent citations to these publications: | 20 |
|
|
|
|
|