Items where Author is "Buttyán, Levente"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 10.


Lászka, Áron and Félegyházi, Márk and Buttyán, Levente (2014) A Survey of Interdependent Information Security Games. ACM COMPUTING SURVEYS, 47 (2). p. 23. ISSN 0360-0300

Lászka, Áron and Buttyán, Levente and Szeszlér, Dávid (2013) Designing robust network topologies for wireless sensor networks in adversarial environments. PERVASIVE AND MOBILE COMPUTING, 9 (4). pp. 546-563. ISSN 1574-1192

Schaffer, Péter and Farkas, Károly and Horváth, Ádám and Holczer, Tamás and Buttyán, Levente (2012) Secure and Reliable Clustering in Wireless Sensor Networks: A Critical Survey. Computer Networks, 56 (11). 2726 - 2741. ISSN 1389-1286

Book Section

Laszka, Aron and Horváth, Gábor and Félegyházi, Márk and Buttyán, Levente (2014) FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources. In: Decision and Game Theory for Security. Lecture Notes in Computer Science (8840). Springer International Publishing, Switzerland, pp. 175-194. ISBN 978-3-319-12600-5

Buttyán, Levente and Lászka, Áron and Szeszlér, Dávid (2013) A Minimum Cost Source Location Problem for Wireless Sensor Networks. In: 8th Japanese-Hungarian Symposium on Discrete Mathematics and Its Applications. BME, Budapest, pp. 79-88. ISBN 978-963-313-082-7

Lászka, Áron and Szeszlér, Dávid and Buttyán, Levente (2012) Game-theoretic Robustness of Many-to-one Networks. In: Game Theory for Networks. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (105). Springer, Dordrecht, pp. 88-98. ISBN 978-3-642-35581-3


Vajda, István and Bencsáth, Boldizsár and Berta, István Zsolt and Bognár, Attila and Buttyán, Levente and Verók, István (2008) Adatbiztonság és adatvédelem a mindent átható számítógépes technológia világában = Security and Privacy Issues in Pervasive Computing. Project Report. OTKA.

Pap, László and Balázs, Ferenc and Benkovics, Balázs and Buttyán, Levente and Csibi, Sándor and Fazekas, Péter and Fogaras, Dániel and Gyori, Sándor and Györfi, László and Hankó, Krisztián and Hollós, Dániel and Horváth Cz., János and Imre, Sándor and Jeney, Gábor and Kail, Eszter and Keszei, Csaba and Laczay, Bálint and Marx, Dániel and Németh, Zoltán and Rábai, Gyula and Recski, András and Rózsás, Balázs and Salamon, Gábor and Schulcz, Róbert and Sugár, Róbert and Szabó, Sándor and Szabó, Csanád István and Szalay, Máté and Vajda, István (2007) Az új algoritmusok és kódolási eljárások alkalmazása a mobil hírközlésben és informatikában = Application of new algorithms and coding procedures in mobile communications and computing. Project Report. OTKA.

Conference or Workshop Item

Ta, Vinh Thong and Dvir, Amit and Buttyán, Levente (2014) Formal Security Verification of Transport Protocols for Wireless Sensor Networks. In: Advanced Computational Methods for Knowledge Engineering, 2014.05.08-2014.05.08, Budapest.

Pék, Gábor and Buttyán, Levente (2014) Towards the Automated Detection of Unknown Malware on Live Systems. In: IEEE International Conference on Communications (ICC), 2014.06.00, Sydney.

This list was generated on Fri Dec 15 11:15:24 2017 CET.