Laszlo Erdodi
Orcid: 0000-0002-4910-4228
According to our database1,
Laszlo Erdodi
authored at least 25 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on mn.uio.no
On csauthors.net:
Bibliography
2024
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation.
Int. J. Inf. Sec., August, 2024
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents.
Int. J. Inf. Sec., February, 2024
IEEE Access, 2024
LLMs in Web Development: Evaluating LLM-Generated PHP Code Unveiling Vulnerabilities and Limitations.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops, 2024
Proceedings of the 18th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2024
Decoding the Human Element in APT Attacks: Unveiling Attention Diversion Techniques in Cyber-Physical System Security.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024
2023
Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge.
IET Inf. Secur., May, 2023
Proceedings of the Privacy and Identity Management. Sharing in a Digital World, 2023
2022
Int. J. Inf. Sec., 2022
Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study.
Proceedings of the Augmented Cognition, 2022
Towards Dynamic Capture-The-Flag Training Environments For Reinforcement Learning Offensive Security Agents.
Proceedings of the IEEE International Conference on Big Data, 2022
Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Secur. Priv., 2021
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents.
J. Inf. Secur. Appl., 2021
SQL Injections and Reinforcement Learning: An Empirical Evaluation of the Role of Action Structure.
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021
2020
Modeling Penetration Testing with Reinforcement Learning Using Capture-the-Flag Challenges and Tabular Q-Learning.
CoRR, 2020
2018
Proceedings of the 12th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2018
2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
2015
Memória korrupciós szoftverhibák modern, kód újrafelhasználáson alapuló kiaknázási módszereinek vizsgálata
PhD thesis, 2015
Proceedings of the 13th IEEE International Symposium on Intelligent Systems and Informatics, 2015
2013
Proceedings of the IEEE 8th International Symposium on Applied Computational Intelligence and Informatics, 2013