Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents L Erdődi, ĹĹ Sommervoll, FM Zennaro Journal of Information Security and Applications 61, 102903, 2021 | 43 | 2021 |
Modeling Penetration Testing with Reinforcement Learning Using Capture-the-Flag Challenges and Tabular Q-Learning FM Zennaro, L Erdodi arXiv preprint arXiv:2005.12632, 2020 | 43 | 2020 |
Secure information sharing in an industrial Internet of Things N Ulltveit-Moe, H Nergaard, L Erdödi, T Gjřsćter, E Kolstad, P Berg arXiv preprint arXiv:1601.04301, 2016 | 30 | 2016 |
Modelling penetration testing with reinforcement learning using capture‐the‐flag challenges: Trade‐offs between model‐free learning and a priori knowledge FM Zennaro, L Erdődi IET Information Security 17 (3), 441-457, 2023 | 26 | 2023 |
The Agent Web Model: modeling web hacking for reinforcement learning L Erdődi, FM Zennaro International Journal of Information Security, 1-17, 2021 | 18 | 2021 |
Security survey of dedicated iot networks in the unlicensed ism bands E Kail, A Banati, E Lászlo, M Kozlovszky 2018 IEEE 12th international symposium on applied computational intelligence …, 2018 | 18 | 2018 |
File compression with LZO algorithm using NVIDIA CUDA architecture L Erdodi, L Erdődi 2012 4th IEEE International Symposium on Logistics and Industrial …, 2012 | 13 | 2012 |
Attacking power grid substations: An experiment demonstrating how to attack the scada protocol iec 60870-5-104 L Erdődi, P Kaliyar, SH Houmb, A Akbarzadeh, AJ Waltoft-Olsen Proceedings of the 17th International Conference on Availability …, 2022 | 10 | 2022 |
Stack-based buffer overflow detection using recurrent neural networks WA Dahl, L Erdodi, FM Zennaro arXiv preprint arXiv:2012.15116, 2020 | 9 | 2020 |
Finding dispatcher gadgets for jump oriented programming code reuse attacks L Erdődi 2013 IEEE 8th International Symposium on Applied Computational Intelligence …, 2013 | 8 | 2013 |
Overview of phishing landscape and homographs in Arabic domain names H Ahmad, L Erdodi Security and Privacy 4 (4), e159, 2021 | 7 | 2021 |
Sql injections and reinforcement learning: An empirical evaluation of the role of action structure M Del Verme, ĹĹ Sommervoll, L Erdődi, S Totaro, FM Zennaro Secure IT Systems: 26th Nordic Conference, NordSec 2021, Virtual Event …, 2021 | 7 | 2021 |
Attacking x86 windows binaries by jump oriented programming L Erdődi 2013 IEEE 17th International Conference on Intelligent Engineering Systems …, 2013 | 5 | 2013 |
Experimental and numerical analysis of timber joints L Erdodi, I Bodi High Performance Structures and Materials. The 2nd Intern. Conf. Heraklion …, 2004 | 5 | 2004 |
Exploitation vs. prevention: the ongoing saga of software vulnerabilities L Erdődi, A Jřsang Acta Polytechnica Hungarica 17 (7), 199-218, 2020 | 4 | 2020 |
When every byte counts—Writing minimal length shellcodes ZL Németh, L Erdődi 2015 IEEE 13th International Symposium on Intelligent Systems and …, 2015 | 4 | 2015 |
Numerical determination of the slip modulus of dowel-type timber joints L Erdődi, I Bódi Pollack Periodica 2 (3), 35-44, 2007 | 4 | 2007 |
Comparison of The Strength Characteristics of Wood According to Combined Stress Theories and EC5 I Bódi, L Erdödi IABSE Symposium Report 85 (9), 1-6, 2001 | 4 | 2001 |
Security threats based on critical database system privileges R Fleiner, R Hubert, A Bánáti, L Erdôdi 2022 IEEE 10th Jubilee International Conference on Computational Cybernetics …, 2022 | 3 | 2022 |
D3. 2–Overall System Requirements and Functional Specifications D Gabioud, E László, G Basso Scalable Energy Management Infrastructure for Aggregation of Households …, 2015 | 3 | 2015 |