Márk Félegyházi

According to our database1, Márk Félegyházi authored at least 30 papers between 2003 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Mentoring Talent in IT Security-A Case Study.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis.
Proceedings of the Computer Security - ESORICS 2016, 2016

2014
A Survey of Interdependent Information Security Games.
ACM Comput. Surv., 2014

The Long "Taile" of Typosquatting Domain Names.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

CryPLH: Protecting Smart Energy Systems from Targeted Attacks with a PLC Honeypot.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Estimating Systematic Risk in Real-World Networks.
Proceedings of the Financial Cryptography and Data Security, 2014

2012
The Cousins of Stuxnet: Duqu, Flame, and Gauss.
Future Internet, 2012

The BIZ Top-Level Domain: Ten Years Later.
Proceedings of the Passive and Active Measurement - 13th International Conference, 2012

2011
Click Trajectories: End-to-End Analysis of the Spam Value Chain.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

On the Effects of Registrar-level Intervention.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Network Regulations and Market Entry.
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011

CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap.
Proceedings of the First SysSec Workshop 2011, 2011

2010
Barter trade improves message delivery in opportunistic networks.
Ad Hoc Networks, 2010

On the Potential of Proactive Domain Blacklisting.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

Optimal Information Security Investment with Penetration Testing.
Proceedings of the Decision and Game Theory for Security, 2010

2009
Efficient MAC in cognitive radio systems: A game-theoretic approach.
IEEE Trans. Wirel. Commun., 2009

Competitive Cyber-Insurance and Internet Security.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

2008
Optimal pricing strategy for wireless social community networks.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008

On Wireless Social Community Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Revocation games in ephemeral networks.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Barter-based cooperation in delay-tolerant personal wireless networks.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Border Games in Cellular Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

Wireless operators in a shared spectrum.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2006

Multi-radio channel allocation in competitive wireless networks.
Proceedings of the 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 2006

2005
Cooperative Packet Forwarding in Multi-Domain Sensor Networks.
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005

2004
SOWER: self-organizing wireless network for messaging.
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004

2003
Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003


  Loading...