Følg
László Erdődi
László Erdődi
Researcher in Computer Science, University of Oslo
Verifisert e-postadresse på oslomet.no - Startside
Tittel
Sitert av
Sitert av
År
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents
L Erdődi, ÅÅ Sommervoll, FM Zennaro
Journal of Information Security and Applications 61, 102903, 2021
472021
Modeling Penetration Testing with Reinforcement Learning Using Capture-the-Flag Challenges and Tabular Q-Learning
FM Zennaro, L Erdodi
arXiv preprint arXiv:2005.12632, 2020
432020
Secure information sharing in an industrial Internet of Things
N Ulltveit-Moe, H Nergaard, L Erdödi, T Gjøsæter, E Kolstad, P Berg
arXiv preprint arXiv:1601.04301, 2016
312016
Modelling penetration testing with reinforcement learning using capture‐the‐flag challenges: Trade‐offs between model‐free learning and a priori knowledge
FM Zennaro, L Erdődi
IET Information Security 17 (3), 441-457, 2023
292023
The Agent Web Model: modeling web hacking for reinforcement learning
L Erdődi, FM Zennaro
International Journal of Information Security, 1-17, 2021
182021
Security survey of dedicated iot networks in the unlicensed ism bands
E Kail, A Banati, E Lászlo, M Kozlovszky
2018 IEEE 12th international symposium on applied computational intelligence …, 2018
182018
File compression with LZO algorithm using NVIDIA CUDA architecture
L Erdodi, L Erdődi
2012 4th IEEE International Symposium on Logistics and Industrial …, 2012
132012
Attacking power grid substations: An experiment demonstrating how to attack the scada protocol iec 60870-5-104
L Erdődi, P Kaliyar, SH Houmb, A Akbarzadeh, AJ Waltoft-Olsen
Proceedings of the 17th International Conference on Availability …, 2022
102022
Stack-based buffer overflow detection using recurrent neural networks
WA Dahl, L Erdodi, FM Zennaro
arXiv preprint arXiv:2012.15116, 2020
92020
Overview of phishing landscape and homographs in Arabic domain names
H Ahmad, L Erdodi
Security and Privacy 4 (4), e159, 2021
82021
Sql injections and reinforcement learning: An empirical evaluation of the role of action structure
M Del Verme, ÅÅ Sommervoll, L Erdődi, S Totaro, FM Zennaro
Secure IT Systems: 26th Nordic Conference, NordSec 2021, Virtual Event …, 2021
82021
Finding dispatcher gadgets for jump oriented programming code reuse attacks
L Erdődi
2013 IEEE 8th International Symposium on Applied Computational Intelligence …, 2013
82013
Attacking x86 windows binaries by jump oriented programming
L Erdődi
2013 IEEE 17th International Conference on Intelligent Engineering Systems …, 2013
52013
Experimental and numerical analysis of timber joints
L Erdodi, I Bodi
High Performance Structures and Materials. The 2nd Intern. Conf. Heraklion …, 2004
52004
Honeypot optimization based on CTF game
Á Balogh, M Érsok, L Erdődi, A Szarvák, E Kail, A Bánáti
2022 IEEE 20th Jubilee World Symposium on Applied Machine Intelligence and …, 2022
42022
Exploitation vs. prevention: the ongoing saga of software vulnerabilities
L Erdődi, A Jøsang
Acta Polytechnica Hungarica 17 (7), 199-218, 2020
42020
When every byte counts—Writing minimal length shellcodes
ZL Németh, L Erdődi
2015 IEEE 13th International Symposium on Intelligent Systems and …, 2015
42015
Numerical determination of the slip modulus of dowel-type timber joints
L Erdődi, I Bódi
Pollack Periodica 2 (3), 35-44, 2007
42007
Comparison of The Strength Characteristics of Wood According to Combined Stress Theories and EC5
I Bódi, L Erdödi
IABSE Symposium Report 85 (9), 1-6, 2001
42001
Towards dynamic capture-the-flag training environments for reinforcement learning offensive security agents
RA Chetwyn, L Erdődi
2022 IEEE International Conference on Big Data (Big Data), 2585-2594, 2022
32022
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20