|
|
English
version
For å registrere i Cristin må du være vitenskapelig eller administrativt ansatt.
|
|
|
|
|
|
|
|
|
2024
|
1. |
Jon-Martin Pettersen, Storm; Houmb, Siv Hilde; Kaliyar, Pallavi; Erdodi, Laszlo Tibor; Hagen, Janne Merete. Testing Commercial Intrusion Detection Systems for Industrial Control Systems in a Substation Hardware in the Loop Testlab. Electronics 2024 ;Volum 13.(1) s. - NTNU UiO
Untitled
|
2023
|
2. |
Akbarzadeh, Aida; Erdodi, Laszlo Tibor; Houmb, Siv Hilde; Soltvedt, Tore Geir; Muggerud, Hans Kristian. Attacking IEC 61850 Substations by Targeting the PTP Protocol. Electronics 2023 ;Volum 12.(12) s. - NTNU
Untitled
|
|
3. |
Chetwyn, Robert Andrew; Erdodi, Laszlo Tibor. Towards Dynamic Capture-The-Flag Training Environments For Reinforcement Learning Offensive Security Agents. I: 2022 IEEE International Conference on Big Data. IEEE (Institute of Electrical and Electronics Engineers) 2023 ISBN 978-1-6654-8045-1. UiO
Untitled
|
|
4. |
Sommervoll, Åvald Åslaugson; Erdodi, Laszlo Tibor; Zennaro, Fabio Massimo. Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents. International Journal of Information Security 2023 s. - UiO NTNU
Untitled
|
|
5. |
Zennaro, Fabio Massimo; Erdodi, Laszlo Tibor. Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge. IET Information Security 2023 s. - UiO NTNU
Untitled
|
2022
|
6. |
Erdodi, Laszlo; Kaliyar, Pallavi; Houmb, Siv Hilde; Akbarzadeh, Aida; Waltoft-Olsen, Andrè Jung. Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104. I: ARES 2022: The 17th International Conference on Availability, Reliability and Security. Association for Computing Machinery (ACM) 2022 ISBN 978-1-4503-9670-7. s. - NTNU
Untitled
|
|
7. |
Kaliyar, Pallavi; Erdodi, Laszlo; Katsikas, Sokratis. LIST: Lightweight Solutions for Securing IoT Devices against Mirai Malware Attack. I: Proceedings, SECURWARE 2022, The Sixteenth International Conference on Emerging Security Information, Systems and Technologies. International Academy, Research and Industry Association (IARIA) 2022 ISBN 978-1-68558-007-0. s. 63-69 NTNU
Untitled
|
|
8. |
Yamin, Muhammad Mudassar; Erdodi, Laszlo Tibor; Torseth, Espen; Katt, Basel. Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study. Lecture Notes in Computer Science (LNCS) 2022 ;Volum 13310. s. 304-321 NTNU
Untitled
|
2021
|
9. |
Chetwyn, Robert Andrew; Erdodi, Laszlo. Cheat Detection In Cyber Security Capture The Flag Games - An Automated Cyber Threat Hunting Approach. CEUR Workshop Proceedings 2021 ;Volum Vol-3056. s. 175-190 NTNU UiO
Untitled
|
|
10. |
Erdodi, Laszlo; Sommervoll, Åvald Åslaugson; Zennaro, Fabio Massimo. Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents. Journal of Information Security and Applications 2021 ;Volum 61. s. - UiO
Untitled
|
|
11. |
Erdodi, Laszlo; Zennaro, Fabio Massimo. The Agent Web Model - Modelling web hacking for reinforcement learning. International Journal of Information Security 2021 s. - UiO
Untitled
|
2020
|
12. |
Erdodi, Laszlo; Jøsang, Audun. Exploitation vs. Prevention: The ongoing saga of software vulnerabilities. Acta Polytechnica Hungarica 2020 ;Volum 17.(7) s. 199-218 UiO
Untitled
|
2017
|
13. |
Erdodi, Laszlo; Jøsang, Audun. Exploit prevention, quo vadis?. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10547 LNCS. s. 180-190 UiO
Untitled
|
2016
|
14. |
Ulltveit-Moe, Nils; Pfrang, Steffen; Erdödi, Lazlo; Nebot, Héctor. Mitigating Local Attacks Against a City Traffic Controller. I: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy. SciTePress 2016 ISBN 978-989-758-167-0. s. 209-218 UIA
Untitled
|
2015
|
15. |
Erdodi, Laszlo. Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying. Acta Polytechnica Hungarica 2015 ;Volum 12.(5) s. 155-172 UiO
Untitled
|
|
16. |
Erdodi, Laszlo; Nemeth, Zoltan. When Every Byte Counts – Writing Minimal Length Shellcodes. I: 2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY). IEEE Press 2015 ISBN 978-1-4673-9388-1. s. - UiO
Untitled
|
|
17. |
Gabioud, Dominique; Erdodi, Laszlo; Basso, Gillian; Unander, Harald; Werlen, Karl; Ulltveit-Moe, Nils; Jacobsen, Rune Hylsberg; Funk, Stefan; Siegel, Stefan; Gjøsæter, Terje. SEMIAH D3.2 – Overall System Requirements and Functional Specifications.. : SEMIAH Consortium 2015 89 s. UIA UiO
Untitled
|
|