Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices MA Ferrag, M Ndhlovu, N Tihanyi, LC Cordeiro, M Debbah, T Lestable, ... IEEE Access 12, 23733-23750, 2024 | 34* | 2024 |
A new era in software security: Towards self-healing software via large language models and formal verification Y Charalambous, N Tihanyi, R Jain, Y Sun, MA Ferrag, LC Cordeiro arXiv preprint arXiv:2305.14752, 2023 | 29 | 2023 |
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models F Alwahedi, A Aldhaheri, MA Ferrag, A Battah, N Tihanyi Internet of Things and Cyber-Physical Systems, 2024 | 23 | 2024 |
The formai dataset: Generative ai in software security through the lens of formal verification N Tihanyi, T Bisztray, R Jain, MA Ferrag, LC Cordeiro, V Mavroeidis Proceedings of the 19th International Conference on Predictive Models and …, 2023 | 21 | 2023 |
Efficient computing of n-dimensional simultaneous Diophantine approximation problems A Kovács, N Tihanyi Acta Universitatis Sapientiae, Informatica 5 (1), 16-34, 2013 | 14 | 2013 |
Securefalcon: The next cyber reasoning system for cyber security MA Ferrag, A Battah, N Tihanyi, M Debbah, T Lestable, LC Cordeiro arXiv preprint arXiv:2307.06616, 2023 | 13 | 2023 |
Computing extremely large values of the Riemann zeta function N Tihanyi, A Kovács, J Kovács Journal of Grid Computing 15, 527-534, 2017 | 13 | 2017 |
Edge learning for 6g-enabled internet of things: A comprehensive survey of vulnerabilities, datasets, and defenses MA Ferrag, O Friha, B Kantarci, N Tihanyi, L Cordeiro, M Debbah, ... IEEE Communications Surveys & Tutorials, 2023 | 12 | 2023 |
Unrevealed patterns in password databases Part one: analyses of cleartext passwords N Tihanyi, A Kovács, G Vargha, Á Lénárt Technology and Practice of Passwords: International Conference on Passwords …, 2015 | 9 | 2015 |
CyberMetric: A Benchmark Dataset for Evaluating Large Language Models Knowledge in Cybersecurity N Tihanyi, MA Ferrag, R Jain, M Debbah arXiv preprint arXiv:2402.07688, 2024 | 6 | 2024 |
Distributed computing of simultaneous Diophantine approximation problems N Tihanyi, A Kovács, A Szucs Stud. Univ. Babes-Bolyai Math 59 (4), 557-566, 2014 | 6 | 2014 |
Fast method for locating peak values of the Riemann zeta function on the critical line N Tihanyi 2014 16th International Symposium on Symbolic and Numeric Algorithms for …, 2014 | 6 | 2014 |
Improvements on finding large candidates of the Riemann zeta function on the critical line N Tihanyi, A Kovács Annales Univ. Sci. Budapest., Sect. Comp 48, 53-64, 2018 | 5 | 2018 |
ESBMC v7. 4: Harnessing the Power of Intervals (Competition Contribution) R Menezes, M Aldughaim, B Farias, X Li, E Manino, F Shmarov, K Song, ... | 4* | 2024 |
Tight upper and lower bounds for the reciprocal sum of Proth primes B Borsos, A Kovács, N Tihanyi The Ramanujan Journal 59 (1), 181-198, 2022 | 4 | 2022 |
Report on the first DES fixed points for non-weak keys: Case-study of hacking an IoT environment N Tihanyi IEEE Access 10, 77802-77809, 2022 | 3 | 2022 |
Statistical analysis of DH1 cryptosystem P Dömösi, J Gáll, G Horváth, N Tihanyi Acta Cybernetica 23 (1), 371-378, 2017 | 3 | 2017 |
Comparison of two Hungarian password databases N Tihanyi Pollack Periodica 8 (2), 179-186, 2013 | 3 | 2013 |
Fault-injection based backdoors in pseudo random number generators N Tihanyi Studia Scientiarum Mathematicarum Hungarica 52 (2), 233-245, 2015 | 2 | 2015 |
Biztonsági tesztelés a gyakorlatban T Norbert, V Gergely, F Ferenc Budapest: NKE, ÁROP–2.2 21, 2014 | 2 | 2014 |