Items where Author is "Buttyán, Levente"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 10.

Laszka, Aron and Horváth, Gábor and Félegyházi, Márk and Buttyán, Levente (2014) FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources. In: Decision and Game Theory for Security. Lecture Notes in Computer Science (8840). Springer International Publishing, Switzerland, pp. 175-194. ISBN 978-3-319-12600-5

Ta, Vinh Thong and Dvir, Amit and Buttyán, Levente (2014) Formal Security Verification of Transport Protocols for Wireless Sensor Networks. In: Advanced Computational Methods for Knowledge Engineering, 2014.05.08-2014.05.08, Budapest.

Lászka, Áron and Félegyházi, Márk and Buttyán, Levente (2014) A Survey of Interdependent Information Security Games. ACM COMPUTING SURVEYS, 47 (2). p. 23. ISSN 0360-0300

Pék, Gábor and Buttyán, Levente (2014) Towards the Automated Detection of Unknown Malware on Live Systems. In: IEEE International Conference on Communications (ICC), 2014.06.00, Sydney.

Lászka, Áron and Buttyán, Levente and Szeszlér, Dávid (2013) Designing robust network topologies for wireless sensor networks in adversarial environments. PERVASIVE AND MOBILE COMPUTING, 9 (4). pp. 546-563. ISSN 1574-1192

Buttyán, Levente and Lászka, Áron and Szeszlér, Dávid (2013) A Minimum Cost Source Location Problem for Wireless Sensor Networks. In: 8th Japanese-Hungarian Symposium on Discrete Mathematics and Its Applications. BME, Budapest, pp. 79-88. ISBN 978-963-313-082-7

Schaffer, Péter and Farkas, Károly and Horváth, Ádám and Holczer, Tamás and Buttyán, Levente (2012) Secure and Reliable Clustering in Wireless Sensor Networks: A Critical Survey. Computer Networks, 56 (11). 2726 - 2741. ISSN 1389-1286

Lászka, Áron and Szeszlér, Dávid and Buttyán, Levente (2012) Game-theoretic Robustness of Many-to-one Networks. In: Game Theory for Networks. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (105). Springer, Dordrecht, pp. 88-98. ISBN 978-3-642-35581-3

Vajda, István and Bencsáth, Boldizsár and Berta, István Zsolt and Bognár, Attila and Buttyán, Levente and Verók, István (2008) Adatbiztonság és adatvédelem a mindent átható számítógépes technológia világában = Security and Privacy Issues in Pervasive Computing. Project Report. OTKA.

Pap, László and Balázs, Ferenc and Benkovics, Balázs and Buttyán, Levente and Csibi, Sándor and Fazekas, Péter and Fogaras, Dániel and Gyori, Sándor and Györfi, László and Hankó, Krisztián and Hollós, Dániel and Horváth Cz., János and Imre, Sándor and Jeney, Gábor and Kail, Eszter and Keszei, Csaba and Laczay, Bálint and Marx, Dániel and Németh, Zoltán and Rábai, Gyula and Recski, András and Rózsás, Balázs and Salamon, Gábor and Schulcz, Róbert and Sugár, Róbert and Szabó, Sándor and Szabó, Csanád István and Szalay, Máté and Vajda, István (2007) Az új algoritmusok és kódolási eljárások alkalmazása a mobil hírközlésben és informatikában = Application of new algorithms and coding procedures in mobile communications and computing. Project Report. OTKA.

This list was generated on Thu Apr 27 01:13:41 2017 CEST.