Current Research Information SysTem In Norway
 
 

 English version


 
Hovedside
Forskningsresultater/NVI
Forskere
Prosjekter
Forskningsenheter
Logg inn
Om Cristin
 
 
   
Eksporter til


Viser treff 1-17 av 17

2024
1 Jon-Martin Pettersen, Storm; Houmb, Siv Hilde; Kaliyar, Pallavi; Erdodi, Laszlo Tibor; Hagen, Janne Merete.
Testing Commercial Intrusion Detection Systems for Industrial Control Systems in a Substation Hardware in the Loop Testlab. Electronics 2024 ;Volum 13.(1) s. -
NTNU UiO Untitled
 
2023
2 Akbarzadeh, Aida; Erdodi, Laszlo Tibor; Houmb, Siv Hilde; Soltvedt, Tore Geir; Muggerud, Hans Kristian.
Attacking IEC 61850 Substations by Targeting the PTP Protocol. Electronics 2023 ;Volum 12.(12) s. -
NTNU Untitled
 
3 Chetwyn, Robert Andrew; Erdodi, Laszlo Tibor.
Towards Dynamic Capture-The-Flag Training Environments For Reinforcement Learning Offensive Security Agents. I: 2022 IEEE International Conference on Big Data. IEEE (Institute of Electrical and Electronics Engineers) 2023 ISBN 978-1-6654-8045-1.
UiO Untitled
 
4 Sommervoll, Åvald Åslaugson; Erdodi, Laszlo Tibor; Zennaro, Fabio Massimo.
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents. International Journal of Information Security 2023 s. -
UiO NTNU Untitled
 
5 Zennaro, Fabio Massimo; Erdodi, Laszlo Tibor.
Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge. IET Information Security 2023 s. -
UiO NTNU Untitled
 
2022
6 Erdodi, Laszlo; Kaliyar, Pallavi; Houmb, Siv Hilde; Akbarzadeh, Aida; Waltoft-Olsen, Andrè Jung.
Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104. I: ARES 2022: The 17th International Conference on Availability, Reliability and Security. Association for Computing Machinery (ACM) 2022 ISBN 978-1-4503-9670-7. s. -
NTNU Untitled
 
7 Kaliyar, Pallavi; Erdodi, Laszlo; Katsikas, Sokratis.
LIST: Lightweight Solutions for Securing IoT Devices against Mirai Malware Attack. I: Proceedings, SECURWARE 2022, The Sixteenth International Conference on Emerging Security Information, Systems and Technologies. International Academy, Research and Industry Association (IARIA) 2022 ISBN 978-1-68558-007-0. s. 63-69
NTNU Untitled
 
8 Yamin, Muhammad Mudassar; Erdodi, Laszlo Tibor; Torseth, Espen; Katt, Basel.
Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study. Lecture Notes in Computer Science (LNCS) 2022 ;Volum 13310. s. 304-321
NTNU Untitled
 
2021
9 Chetwyn, Robert Andrew; Erdodi, Laszlo.
Cheat Detection In Cyber Security Capture The Flag Games - An Automated Cyber Threat Hunting Approach. CEUR Workshop Proceedings 2021 ;Volum Vol-3056. s. 175-190
NTNU UiO Untitled
 
10 Erdodi, Laszlo; Sommervoll, Åvald Åslaugson; Zennaro, Fabio Massimo.
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents. Journal of Information Security and Applications 2021 ;Volum 61. s. -
UiO Untitled
 
11 Erdodi, Laszlo; Zennaro, Fabio Massimo.
The Agent Web Model - Modelling web hacking for reinforcement learning. International Journal of Information Security 2021 s. -
UiO Untitled
 
2020
12 Erdodi, Laszlo; Jøsang, Audun.
Exploitation vs. Prevention: The ongoing saga of software vulnerabilities. Acta Polytechnica Hungarica 2020 ;Volum 17.(7) s. 199-218
UiO Untitled
 
2017
13 Erdodi, Laszlo; Jøsang, Audun.
Exploit prevention, quo vadis?. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10547 LNCS. s. 180-190
UiO Untitled
 
2016
14 Ulltveit-Moe, Nils; Pfrang, Steffen; Erdödi, Lazlo; Nebot, Héctor.
Mitigating Local Attacks Against a City Traffic Controller. I: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy. SciTePress 2016 ISBN 978-989-758-167-0. s. 209-218
UIA Untitled
 
2015
15 Erdodi, Laszlo.
Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying. Acta Polytechnica Hungarica 2015 ;Volum 12.(5) s. 155-172
UiO Untitled
 
16 Erdodi, Laszlo; Nemeth, Zoltan.
When Every Byte Counts – Writing Minimal Length Shellcodes. I: 2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY). IEEE Press 2015 ISBN 978-1-4673-9388-1. s. -
UiO Untitled
 
17 Gabioud, Dominique; Erdodi, Laszlo; Basso, Gillian; Unander, Harald; Werlen, Karl; Ulltveit-Moe, Nils; Jacobsen, Rune Hylsberg; Funk, Stefan; Siegel, Stefan; Gjøsæter, Terje.
SEMIAH D3.2 – Overall System Requirements and Functional Specifications.. : SEMIAH Consortium 2015 89 s.
UIA UiO Untitled