Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices
Ferrag, Mohamed Amine, Ndhlovu, Mthandazo, Tihanyi, Norbert, Cordeiro, Lucas C., Debbah, Merouane, Lestable, Thierry, Thandi, Narinderjit Singh
Published in IEEE access (01.01.2024)
Published in IEEE access (01.01.2024)
Get full text
Journal Article
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Alwahedi, Fatima, Aldhaheri, Alyazia, Ferrag, Mohamed Amine, Battah, Ammar, Tihanyi, Norbert
Published in Internet of Things and Cyber-Physical Systems (2024)
Published in Internet of Things and Cyber-Physical Systems (2024)
Get full text
Journal Article
Efficient computing of n-dimensional simultaneous Diophantine approximation problems
Kovács, Attila, Tihanyi, Norbert
Published in Acta Universitatis Sapientiae. Informatica (01.07.2013)
Published in Acta Universitatis Sapientiae. Informatica (01.07.2013)
Get full text
Journal Article
Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rate
Carvalho, Ryan, Tihanyi, Norbert
Published in 2021 International Carnahan Conference on Security Technology (ICCST) (11.10.2021)
Published in 2021 International Carnahan Conference on Security Technology (ICCST) (11.10.2021)
Get full text
Conference Proceeding
Privacy-Preserving Password Cracking: How a Third Party can Crack our Password Hash Without Learning the Hash Value or the Cleartext
Tihanyi, Norbert, Bisztray, Tamas, Borsos, Bertalan, Raveau, Sebastien
Published in IEEE transactions on information forensics and security (2024)
Published in IEEE transactions on information forensics and security (2024)
Get full text
Journal Article
Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses
Ferrag, Mohamed Amine, Friha, Othmane, Kantarci, Burak, Tihanyi, Norbert, Cordeiro, Lucas, Debbah, Merouane, Hamouda, Djallel, Al-Hawawreh, Muna, Choo, Kim-Kwang Raymond
Published in IEEE Communications surveys and tutorials (2023)
Published in IEEE Communications surveys and tutorials (2023)
Get full text
Journal Article
A PSEUDORANDOM NUMBER GENERATOR WITH FULL CYCLE LENGTH BASED ON AUTOMATA COMPOSITIONS
Borsos, Bertalan, Dömösi, Pál, Alhammadi, Yousef, Tihanyi, Norbert, Gáll, József, Horváth, Géza
Published in Informatica (Ljubljana) (15.06.2021)
Published in Informatica (Ljubljana) (15.06.2021)
Get full text
Journal Article
Computing Extremely Large Values of the Riemann Zeta Function
Tihanyi, Norbert, Kovács, Attila, Kovács, József
Published in Journal of grid computing (01.12.2017)
Published in Journal of grid computing (01.12.2017)
Get full text
Journal Article
A Full Cycle Length Pseudorandom Number Generator Based on Compositions of Automata
Dömösi, Pál, Gáll, József, Horváth, Géza, Borsos, Bertalan, Tihanyi, Norbert, Al Hammadi, Yousef
Published in Informatica (Ljubljana) (01.06.2021)
Published in Informatica (Ljubljana) (01.06.2021)
Get full text
Journal Article
Some remarks and tests on the DH1 Cryptosystem based on automata compositions
Dömösi, Pál, Gáll, József, Horváth, Géza, Tihanyi, Norbert
Published in Informatica (Ljubljana) (01.06.2019)
Published in Informatica (Ljubljana) (01.06.2019)
Get full text
Journal Article
Statistical Analysis of DH1 Cryptosystem
Dömösi, Pál, Gáll, József, Horváth, Géza, Tihanyi, Norbert
Published in Acta cybernetica (Szeged) (2017)
Published in Acta cybernetica (Szeged) (2017)
Get full text
Journal Article
A general construction for generating pseudorandom sequences using the digit expansion of real functions
Tihanyi, Norbert, Borsos, Bertalan
Published in 2020 22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC) (01.09.2020)
Published in 2020 22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC) (01.09.2020)
Get full text
Conference Proceeding