Laszlo Erdodi

Orcid: 0000-0002-4910-4228

According to our database1, Laszlo Erdodi authored at least 25 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation.
Int. J. Inf. Sec., August, 2024

Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents.
Int. J. Inf. Sec., February, 2024

Multidomain Cyber-Physical Testbed for Power System Vulnerability Assessment.
IEEE Access, 2024

LLMs in Web Development: Evaluating LLM-Generated PHP Code Unveiling Vulnerabilities and Limitations.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops, 2024

Beyond Static Defense: Dynamic Honeypots for Proactive Threat Engagement.
Proceedings of the 18th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2024

Decoding the Human Element in APT Attacks: Unveiling Attention Diversion Techniques in Cyber-Physical System Security.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024

2023
Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge.
IET Inf. Secur., May, 2023

Workshop on Cybersecurity of Critical Infrastructures.
Proceedings of the Privacy and Identity Management. Sharing in a Digital World, 2023

2022
The Agent Web Model: modeling web hacking for reinforcement learning.
Int. J. Inf. Sec., 2022

Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study.
Proceedings of the Augmented Cognition, 2022

Towards Dynamic Capture-The-Flag Training Environments For Reinforcement Learning Offensive Security Agents.
Proceedings of the IEEE International Conference on Big Data, 2022

Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Overview of phishing landscape and homographs in Arabic domain names.
Secur. Priv., 2021

Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents.
J. Inf. Secur. Appl., 2021

SQL Injections and Reinforcement Learning: An Empirical Evaluation of the Role of Action Structure.
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021

2020
Stack-based Buffer Overflow Detection using Recurrent Neural Networks.
CoRR, 2020

The Agent Web Model - Modelling web hacking for reinforcement learning.
CoRR, 2020

Modeling Penetration Testing with Reinforcement Learning Using Capture-the-Flag Challenges and Tabular Q-Learning.
CoRR, 2020

2018
Security Survey of Dedicated IoT Networks in the Unlicensed ISM Bands.
Proceedings of the 12th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2018

2017
Exploit Prevention, Quo Vadis?
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

2016
Secure Information Sharing in an Industrial Internet of Things.
CoRR, 2016

Mitigating Local Attacks Against a City Traffic Controller.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Memória korrupciós szoftverhibák modern, kód újrafelhasználáson alapuló kiaknázási módszereinek vizsgálata
PhD thesis, 2015

When every byte counts - Writing minimal length shellcodes.
Proceedings of the 13th IEEE International Symposium on Intelligent Systems and Informatics, 2015

2013
Finding dispatcher gadgets for jump oriented programming code reuse attacks.
Proceedings of the IEEE 8th International Symposium on Applied Computational Intelligence and Informatics, 2013


  Loading...