Levente Buttyán
Orcid: 0000-0003-4233-2559Affiliations:
- Budapest University of Technology and Economics, Department of Networked Systems and Services
According to our database1,
Levente Buttyán
authored at least 117 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on hit.bme.hu
On csauthors.net:
Bibliography
2024
A pipeline for processing large datasets of potentially malicious binaries with rate-limited access to a cloud-based malware analysis platform.
Proceedings of the 32nd International Conference on Modeling, 2024
2023
Increasing the Robustness of a Machine Learning-based IoT Malware Detection Method with Adversarial Training.
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning, 2023
PATRIoTA: A Similarity-based IoT Malware Detection Method Robust Against Adversarial Samples.
Proceedings of the IEEE International Conference on Edge Computing and Communications, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
SIMBIoTA-ML: Light-weight, Machine Learning-based Malware Detection for Embedded IoT Devices.
Proceedings of the 7th International Conference on Internet of Things, 2022
2021
Acta Cybern., 2021
Proceedings of the 6th International Conference on Internet of Things, 2021
2020
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-98040-9, 2020
Proceedings of the NOMS 2020, 2020
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020
2019
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation.
IACR Cryptol. ePrint Arch., 2019
Towards Detecting Trigger-Based Behavior in Binaries: Uncovering the Correct Environment.
Proceedings of the Software Engineering and Formal Methods - 17th International Conference, 2019
2018
Int. J. Commun. Syst., 2018
Message Format and Field Semantics Inference for Binary Protocols Using Recorded Network Traffic.
Proceedings of the 26th International Conference on Software, 2018
Proceedings of the Security in Computer and Information Sciences, 2018
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018
2017
Proceedings of the 25th International Conference on Software, 2017
Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016
Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis.
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
2014
Proceedings of the Advanced Computational Methods for Knowledge Engineering, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
2013
Telecommun. Syst., 2013
Designing robust network topologies for wireless sensor networks in adversarial environments.
Pervasive Mob. Comput., 2013
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013
SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains.
Proceedings of IEEE International Conference on Communications, 2013
2012
Comput. Networks, 2012
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
A machine learning based approach for predicting undisclosed attributes in social networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
A Wireless Sensor and Actuator Network for improving the electrical power grid dependability.
Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012, 2012
Tresorium: Cryptographic File System for Dynamic Groups over Untrusted Cloud Storage.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012
Invitation-Oriented TGDH: Key Management for Dynamic Groups in an Asynchronous Communication Model.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012
Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Proceedings of the Game Theory for Networks, 2012
2011
Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes.
IEEE Trans. Dependable Secur. Comput., 2011
Int. J. Distributed Sens. Networks, 2011
Optimal selection of sink nodes in wireless sensor networks in adversarial environments.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the 19th International Conference on Software, 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Fourth European Workshop on System Security, 2011
Proceedings of the First SysSec Workshop 2011, 2011
2010
Securing multi-operator-based QoS-aware mesh networks: requirements and design options.
Wirel. Commun. Mob. Comput., 2010
Application of wireless sensor networks in critical infrastructure protection: challenges and design options.
IEEE Wirel. Commun., 2010
Int. J. Distributed Sens. Networks, 2010
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks.
Comput. Commun., 2010
Ad Hoc Networks, 2010
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Proceedings of the IEEE International Conference on Sensor Networks, 2010
Security analysis of reliable transport layer protocols for wireless sensor networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
Formal verification of secure ad-hoc network routing protocols using deductive model-checking.
Proceedings of the 3rd Joint IFIP Wireless and Mobile Networking Conference, 2010
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010
Proceedings of the Inter-Vehicular Communication, 03.10. - 06.10.2010, 2010
2009
Ad Hoc Networks, 2009
An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009
Proceedings of the IEEE Vehicular Networking Conference, 2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
2008
IEEE Commun. Mag., 2008
Secure vehicular communication systems: implementation, performance, and research challenges.
IEEE Commun. Mag., 2008
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008
2007
IEEE J. Sel. Areas Commun., 2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
2006
IEEE Trans. Mob. Comput., 2006
IEEE Trans. Mob. Comput., 2006
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
Modelling adversaries and security objectives for routing protocols in wireless sensor networks.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
2005
A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals.
IEEE Trans. Dependable Secur. Comput., 2005
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
2004
A formal model of rational exchange and its application to the analysis of Syverson's protocol.
J. Comput. Secur., 2004
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
2003
IEEE Trans. Mob. Comput., 2003
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003
Mob. Networks Appl., 2003
Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back.
IEEE Distributed Syst. Online, 2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003
Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003
Proceedings of the Financial Cryptography, 2003
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003
2002
Proceedings of the 2002 Workshop on New Security Paradigms, 2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002
2001
IEEE Commun. Mag., 2001
Proceedings of the Electronic Commerce, Second International Workshop, 2001
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001
2000
IEEE Trans. Commun., 2000
IEEE Internet Comput., 2000
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000
Proceedings of the 1st ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2000
1999
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999
Proceedings of the Secure Internet Programming, 1999
Closed user groups in Internet service centres.
Proceedings of the Distributed Applications and Interoperable Systems II, Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems, June 28, 1999
1998
Proceedings of the Network and Distributed System Security Symposium, 1998
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998