关注
Mark Felegyhazi
Mark Felegyhazi
Avatao
在 crysys.hu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Nash equilibria of packet forwarding strategies in wireless ad hoc networks
M Felegyhazi, JP Hubaux, L Buttyan
IEEE Transactions on Mobile computing 5 (5), 463-476, 2006
4682006
Game theory in wireless networks: A tutorial
M Felegyhazi, JP Hubaux
4112006
Click trajectories: End-to-end analysis of the spam value chain
K Levchenko, A Pitsillidis, N Chachra, B Enright, C Grier, T Halvorson, ...
Security and Privacy (SP), 2011 IEEE Symposium on, 431-446, 2011
3712011
The cousins of stuxnet: Duqu, flame, and gauss
B Bencsáth, G Pék, L Buttyán, M Felegyhazi
Future Internet 4 (4), 971-1003, 2012
2862012
On the Potential of Proactive Domain Blacklisting.
M Felegyhazi, C Kreibich, V Paxson
LEET 10, 6-6, 2010
2502010
Non-cooperative multi-radio channel allocation in wireless networks
M Felegyhazi, M Cagalj, SS Bidokhti, JP Hubaux
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
2242007
The long {“Taile”} of typosquatting domain names
J Szurdi, B Kocso, G Cseh, J Spring, M Felegyhazi, C Kanich
23rd USENIX Security Symposium (USENIX Security 14), 191-206, 2014
2142014
Competitive cyber-insurance and internet security
N Shetty, G Schwartz, M Felegyhazi, J Walrand
Economics of information security and privacy, 229-247, 2010
1682010
A survey of interdependent information security games
A Laszka, M Felegyhazi, L Buttyan
ACM Computing Surveys (CSUR) 47 (2), 1-38, 2014
1592014
Duqu: Analysis, detection, and lessons learned
B Bencsáth, G Pék, L Buttyán, M Félegyházi
ACM European Workshop on System Security (EuroSec) 2012, 2012
1512012
Barter trade improves message delivery in opportunistic networks
L Buttyán, L Dóra, M Félegyházi, I Vajda
Ad Hoc Networks 8 (1), 1-14, 2010
1502010
Equilibrium analysis of packet forwarding strategies in wireless ad hoc networks–the static case
M Félegyházi, L Buttyán, JP Hubaux
Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC …, 2003
1332003
CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot
DI Buza, F Juhász, G Miru, M Félegyházi, T Holczer
Smart Grid Security: Second International Workshop, SmartGridSec 2014 …, 2014
1212014
Duqu: A Stuxnet-like malware found in the wild
B Bencsáth, G Pék, L Buttyán, M Félegyházi
CrySyS Lab Technical Report 14, 1-60, 2011
1132011
On wireless social community networks
MH Manshaei, J Freudiger, M Félegyházi, P Marbach, JP Hubaux
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1552-1560, 2008
1032008
FlipThem: Modeling targeted attacks with FlipIt for multiple resources
A Laszka, G Horvath, M Felegyhazi, L Buttyán
Decision and Game Theory for Security: 5th International Conference, GameSec …, 2014
982014
Barter-based cooperation in delay-tolerant personal wireless networks
L Buttyan, L Dora, M Felegyhazi, I Vajda
2007 IEEE International Symposium on a World of Wireless, Mobile and …, 2007
942007
Revocation games in ephemeral networks
M Raya, MH Manshaei, M Félegyházi, JP Hubaux
Proceedings of the 15th ACM conference on Computer and communications …, 2008
892008
Efficient MAC in cognitive radio systems: A game-theoretic approach
M Felegyhazi, M Cagalj, JP Hubaux
IEEE Transactions on wireless Communications 8 (4), 1984-1995, 2009
882009
On the Effects of Registrar-level Intervention
H Liu, K Levchenko, M Felegyhazi, C Kreibich, G Maier, GM Voelker, ...
Proc. of 4th USENIX LEET, 2011
642011
系统目前无法执行此操作,请稍后再试。
文章 1–20