default search action
Norbert Tihanyi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j13]Norbert Tihanyi, Tamás Bisztray, Mohamed Amine Ferrag, Ridhi Jain, Lucas C. Cordeiro:
How secure is AI-generated code: a large-scale comparison of large language models. Empir. Softw. Eng. 30(2): 47 (2025) - 2024
- [j12]Szilárd Pfeiffer, Norbert Tihanyi:
D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie-Hellman Key Exchange. IEEE Access 12: 957-980 (2024) - [j11]Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Thierry Lestable, Narinderjit Singh Thandi:
Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices. IEEE Access 12: 23733-23750 (2024) - [j10]Poonam Lohan, Burak Kantarci, Mohamed Amine Ferrag, Norbert Tihanyi, Yi Shi:
From 5G to 6G Networks: A Survey on AI-Based Jamming and Interference Detection and Mitigation. IEEE Open J. Commun. Soc. 5: 3920-3974 (2024) - [j9]Norbert Tihanyi, Tamás Bisztray, Bertalan Borsos, Sebastien Raveau:
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext. IEEE Trans. Inf. Forensics Secur. 19: 2981-2996 (2024) - [c11]Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Tamás Bisztray, Mérouane Debbah:
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge. CSR 2024: 296-302 - [c10]Zaiyu Cheng, Tong Wu, Peter Schrammel, Norbert Tihanyi, Eddie B. de Lima Filho, Lucas C. Cordeiro:
JCWIT: A Correctness-Witness Validator for Java Programs Based on Bounded Model Checking. ISSTA 2024: 1831-1835 - [c9]Ridhi Jain, Norbert Tihanyi, Mthandazo Ndhlovu, Mohamed Amine Ferrag, Lucas C. Cordeiro:
Rapid Taint Assisted Concolic Execution (TACE). SIGSOFT FSE Companion 2024: 627-631 - [c8]Rafael Sá Menezes, Mohannad Aldughaim, Bruno Farias, Xianzhiyu Li, Edoardo Manino, Fedor Shmarov, Kunjian Song, Franz Brauße, Mikhail R. Gadelha, Norbert Tihanyi, Konstantin Korovin, Lucas C. Cordeiro:
ESBMC v7.4: Harnessing the Power of Intervals - (Competition Contribution). TACAS (3) 2024: 376-380 - [i12]Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Mérouane Debbah:
CyberMetric: A Benchmark Dataset for Evaluating Large Language Models Knowledge in Cybersecurity. CoRR abs/2402.07688 (2024) - [i11]Norbert Tihanyi, Tamás Bisztray, Mohamed Amine Ferrag, Ridhi Jain, Lucas C. Cordeiro:
Do Neutral Prompts Produce Insecure Code? FormAI-v2 Dataset: Labelling Vulnerabilities in Code Generated by Large Language Models. CoRR abs/2404.18353 (2024) - [i10]Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Abdechakour Mechri, Norbert Tihanyi:
Generative AI and Large Language Models for Cyber Security: All Insights You Need. CoRR abs/2405.12750 (2024) - [i9]Ridhi Jain, Norbert Tihanyi, Mohamed Amine Ferrag:
Securing Tomorrow's Smart Cities: Investigating Software Security in Internet of Vehicles and Deep Learning Technologies. CoRR abs/2407.16410 (2024) - [i8]Norbert Tihanyi, Tamás Bisztray, Richard A. Dubniczky, Rebeka Tóth, Bertalan Borsos, Bilel Cherif, Mohamed Amine Ferrag, Lajos Muzsai, Ridhi Jain, Ryan Marinelli, Lucas C. Cordeiro, Mérouane Debbah:
Dynamic Intelligence Assessment: Benchmarking LLMs on the Road to AGI with a Focus on Model Confidence. CoRR abs/2410.15490 (2024) - 2023
- [j8]Pál Dömösi, Géza Horváth, Norbert Tihanyi:
Simple chain automaton random number generator for IoT devices. Acta Informatica 60(3): 317-329 (2023) - [j7]Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo:
Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. IEEE Commun. Surv. Tutorials 25(4): 2654-2713 (2023) - [c7]Norbert Tihanyi, Tamás Bisztray, Ridhi Jain, Mohamed Amine Ferrag, Lucas C. Cordeiro, Vasileios Mavroeidis:
The FormAI Dataset: Generative AI in Software Security through the Lens of Formal Verification. PROMISE 2023: 33-43 - [d2]Yiannis Charalambous, Norbert Tihanyi, Ridhi Jain, Youcheng Sun, Mohamed Amine Ferrag, Lucas C. Cordeiro:
Dataset for : A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification. Zenodo, 2023 - [d1]Norbert Tihanyi, Tamás Bisztray, Ridhi Jain, Mohamed Amine Ferrag, Lucas C. Cordeiro, Vasileios Mavroeidis:
FormAI Dataset: A Large Collection of AI-Generated C Programs and Their Vulnerability Classifications. IEEE DataPort, 2023 - [i7]Yiannis Charalambous, Norbert Tihanyi, Ridhi Jain, Youcheng Sun, Mohamed Amine Ferrag, Lucas C. Cordeiro:
A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification. CoRR abs/2305.14752 (2023) - [i6]Norbert Tihanyi, Tamás Bisztray, Bertalan Borsos, Sebastien Raveau:
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext. CoRR abs/2306.08740 (2023) - [i5]Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo:
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. CoRR abs/2306.10309 (2023) - [i4]Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Thierry Lestable:
Revolutionizing Cyber Threat Detection with Large Language Models. CoRR abs/2306.14263 (2023) - [i3]Norbert Tihanyi, Tamás Bisztray, Ridhi Jain, Mohamed Amine Ferrag, Lucas C. Cordeiro, Vasileios Mavroeidis:
The FormAI Dataset: Generative AI in Software Security Through the Lens of Formal Verification. CoRR abs/2307.02192 (2023) - [i2]Mohamed Amine Ferrag, Ammar Battah, Norbert Tihanyi, Mérouane Debbah, Thierry Lestable, Lucas C. Cordeiro:
SecureFalcon: The Next Cyber Reasoning System for Cyber Security. CoRR abs/2307.06616 (2023) - [i1]Rafael Menezes, Mohannad Aldughaim, Bruno Farias, Xianzhiyu Li, Edoardo Manino, Fedor Shmarov, Kunjian Song, Franz Brauße, Mikhail R. Gadelha, Norbert Tihanyi, Konstantin Korovin, Lucas C. Cordeiro:
ESBMC v7.4: Harnessing the Power of Intervals. CoRR abs/2312.14746 (2023) - 2022
- [j6]Norbert Tihanyi:
Report on the First DES Fixed Points for Non-Weak Keys: Case-Study of Hacking an IoT Environment. IEEE Access 10: 77802-77809 (2022) - 2021
- [j5]Bertalan Borsos, Pál Dömösi, Yousef AlHammadi, Norbert Tihanyi, József Gáll, Géza Horváth:
A Pseudorandom number Generator with Full Cycle Length based on Automata Compositions. Informatica (Slovenia) 45(1) (2021) - [j4]Bertalan Borsos, Pál Dömösi, Yousef AlHammadi, Norbert Tihanyi, József Gáll, Géza Horváth:
A Full Cycle Length Pseudorandom Number Generator Based on Compositions of Automata. Informatica (Slovenia) 45(2) (2021) - [c6]Ryan Carvalho, Norbert Tihanyi:
Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rate. ICCST 2021: 1-6 - 2020
- [b1]Norbert Tihanyi:
Numerical computing of extremely large values of the Riemann-Siegel Z-function. Eötvös Loránd University, Hungary, 2020 - [c5]Norbert Tihanyi, Bertalan Borsos:
The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments. SpaCCS Workshops 2020: 93-107 - [c4]Norbert Tihanyi, Bertalan Borsos:
A general construction for generating pseudorandom sequences using the digit expansion of real functions. SYNASC 2020: 48-54
2010 – 2019
- 2019
- [j3]Pál Dömösi, József Gáll, Géza Horváth, Norbert Tihanyi:
Some Remarks and Tests on the Dh1 Cryptosystem Based on Automata Compositions. Informatica (Slovenia) 43(2) (2019) - 2018
- [c3]Norbert Tihanyi, Attila Kovács:
Computation Results of the Riemann Zeta Search Project. SYNASC 2018: 75-79 - 2017
- [j2]Pál Dömösi, József Gáll, Géza Horváth, Norbert Tihanyi:
Statistical Analysis of DH1 Cryptosystem. Acta Cybern. 23(1): 371-378 (2017) - [j1]Norbert Tihanyi, Attila Kovács, József Kovács:
Computing Extremely Large Values of the Riemann Zeta Function. J. Grid Comput. 15(4): 527-534 (2017) - 2014
- [c2]Norbert Tihanyi, Attila Kovács, Gergely Vargha, Ádám Lénárt:
Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords. PASSWORDS 2014: 89-101 - [c1]Norbert Tihanyi:
Fast Method for Locating Peak Values of the Riemann Zeta Function on the Critical Line. SYNASC 2014: 91-96
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 01:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint