Követés
Tihanyi Norbert
Tihanyi Norbert
Eötvös Loránd University, Technology Innovation Institute
E-mail megerősítve itt: inf.elte.hu
Cím
Hivatkozott rá
Hivatkozott rá
Év
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
F Alwahedi, A Aldhaheri, MA Ferrag, A Battah, N Tihanyi
Internet of Things and Cyber-Physical Systems, 2024
1102024
Revolutionizing cyber threat detection with large language models: A privacy-preserving bert-based lightweight model for iot/iiot devices
MA Ferrag, M Ndhlovu, N Tihanyi, LC Cordeiro, M Debbah, T Lestable, ...
IEEE Access, 2024
90*2024
A new era in software security: Towards self-healing software via large language models and formal verification
Y Charalambous, N Tihanyi, R Jain, Y Sun, MA Ferrag, LC Cordeiro
arXiv preprint arXiv:2305.14752, 2023
542023
The formai dataset: Generative ai in software security through the lens of formal verification
N Tihanyi, T Bisztray, R Jain, MA Ferrag, LC Cordeiro, V Mavroeidis
Proceedings of the 19th International Conference on Predictive Models and …, 2023
472023
Edge learning for 6g-enabled internet of things: A comprehensive survey of vulnerabilities, datasets, and defenses
MA Ferrag, O Friha, B Kantarci, N Tihanyi, L Cordeiro, M Debbah, ...
IEEE Communications Surveys & Tutorials, 2023
352023
Securefalcon: The next cyber reasoning system for cyber security
MA Ferrag, A Battah, N Tihanyi, M Debbah, T Lestable, LC Cordeiro
arXiv preprint arXiv:2307.06616, 2023
282023
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge
N Tihanyi, MA Ferrag, R Jain, T Bisztray, M Debbah
2024 IEEE International Conference on Cyber Security and Resilience (CSR …, 2024
20*2024
Generative AI and Large Language Models for Cyber Security: All Insights You Need
MA Ferrag, F Alwahedi, A Battah, B Cherif, A Mechri, N Tihanyi
arXiv preprint arXiv:2405.12750, 2024
162024
Efficient computing of n-dimensional simultaneous Diophantine approximation problems
A Kovács, N Tihanyi
Acta Universitatis Sapientiae, Informatica 5 (1), 16-34, 2013
142013
Computing extremely large values of the Riemann zeta function
N Tihanyi, A Kovács, J Kovács
Journal of Grid Computing 15, 527-534, 2017
132017
Unrevealed patterns in password databases part one: Analyses of cleartext passwords
N Tihanyi, A Kovács, G Vargha, Á Lénárt
Technology and Practice of Passwords: International Conference on Passwords …, 2015
102015
ESBMC v7. 4: Harnessing the Power of Intervals (Competition Contribution)
R Menezes, M Aldughaim, B Farias, X Li, E Manino, F Shmarov, K Song, ...
9*2024
Fast method for locating peak values of the Riemann zeta function on the critical line
N Tihanyi
2014 16th International Symposium on Symbolic and Numeric Algorithms for …, 2014
72014
‘SecureFalcon: Are we there yet in automated software vulnerability detection with LLMs?
MA Ferrag, A Battah, N Tihanyi, R Jain, D Maimut, F Alwahedi, T Lestable, ...
arXiv preprint arXiv:2307.06616, 2024
62024
Distributed computing of simultaneous Diophantine approximation problems
N Tihanyi, A Kovács, A Szucs
Stud. Univ. Babes-Bolyai Math 59 (4), 557-566, 2014
62014
Tight upper and lower bounds for the reciprocal sum of Proth primes
B Borsos, A Kovács, N Tihanyi
The Ramanujan Journal 59 (1), 181-198, 2022
52022
Improvements on finding large candidates of the Riemann zeta function on the critical line
N Tihanyi, A Kovács
Annales Univ. Sci. Budapest., Sect. Comp 48, 53-64, 2018
52018
Do neutral prompts produce insecure code? formai-v2 dataset: Labelling vulnerabilities in code generated by large language models
N Tihanyi, T Bisztray, MA Ferrag, R Jain, LC Cordeiro
arXiv preprint arXiv:2404.18353, 2024
42024
Report on the first DES fixed points for non-weak keys: Case-study of hacking an IoT environment
N Tihanyi
IEEE Access 10, 77802-77809, 2022
42022
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext
N Tihanyi, T Bisztray, B Borsos, S Raveau
IEEE Transactions on Information Forensics and Security, 2024
32024
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20