default search action
Sándor Plósz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j2]Sándor Plósz, Aurora Maccarone, Steve McLaughlin, Gerald S. Buller, Abderrahim Halimi:
Real-Time Reconstruction of 3D Videos From Single-Photon LiDaR Data in the Presence of Obscurants. IEEE Trans. Computational Imaging 9: 106-119 (2023) - [c11]Sándor Plósz, István Gyöngy, Jonathan Leach, Steve McLaughlin, Gerald S. Buller, Abderrahim Halimi:
Fast Multiscale 3D Reconstruction Using Single-Photon Lidar Data. ICASSP 2023: 1-5
2010 – 2019
- 2019
- [j1]Roberto Passerone, Daniela Cancila, Michele Albano, Sebti Mouelhi, Sándor Plósz, Erkki Jantunen, Anna Ryabokon, Mohamed-Emine Laarouchi, Csaba Hegedüs, Pál Varga:
A Methodology for the Design of Safety-Compliant and Secure Communication of Autonomous Vehicles. IEEE Access 7: 125022-125037 (2019) - 2018
- [c10]Sándor Plósz, Pál Varga:
Security and safety risk analysis of vision guided autonomous vehicles. ICPS 2018: 193-198 - 2017
- [c9]Zhendong Ma, Aleksandar Hudic, Abdelkader Magdy Shaaban, Sándor Plósz:
Security Viewpoint in a Reference Architecture Model for Cyber-Physical Production Systems. EuroS&P Workshops 2017: 153-159 - [c8]Sándor Plósz, Christoph Schmittner, Pál Varga:
Combining Safety and Security Analysis for Industrial Collaborative Automation Systems. SAFECOMP Workshops 2017: 187-198 - [c7]Pál Varga, Sándor Plósz, Gabor Soos, Csaba Hegedüs:
Security threats and issues in automation IoT. WFCS 2017: 1-6 - 2016
- [c6]Sándor Plósz, Csaba Hegedüs, Pál Varga:
Advanced Security Considerations in the Arrowhead Framework. SAFECOMP Workshops 2016: 234-245 - 2014
- [c5]Sándor Plósz, Arsham Farshad, Markus Tauber, Christian M. Lesjak, Thomas Ruprechter, Nuno Pereira:
Security vulnerabilities and risks in industrial usage of wireless communication. ETFA 2014: 1-8 - [i2]Sándor Plósz, Markus Tauber, Pál Varga:
Information Assurance System in the Arrowhead Project. ERCIM News 2014(97) (2014) - 2013
- [c4]Sándor Plósz, Zsolt Kertész, Csaba Lukovszki, Dávid Kovács, István Moldován, Gergely Hollósi:
Practical aspects of visual recognition for indoor mobile positioning. CogInfoCom 2013: 527-532 - 2011
- [c3]Sándor Plósz, István Moldován, László Kántor, Tuan Anh Trinh:
Characterization of Power-Aware Reconfiguration in FPGA-Based Networking Hardware. Networking Workshops 2011: 281-290 - 2010
- [c2]Sándor Plósz, István Moldován, Tuan Anh Trinh, Andreas Foglar:
Design and Implementation of a Practical Smart Home System Based on DECT Technology. ICST E-Energy 2010: 104-113
2000 – 2009
- 2009
- [c1]Dániel Horváth, Gábor Kapitány, Sándor Plósz, István Moldován, Csaba Lukovszki:
Ring Flushing for Reduced Overload in Spanning Tree Protocol Controlled Ethernet Networks. EUNICE 2009: 11-20 - [i1]Tuan Anh Trinh, Sándor Plósz:
Interactive Energy Management System in Households. ERCIM News 2009(79) (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint