Norbert Tihanyi
Orcid: 0000-0002-9002-5935
According to our database1,
Norbert Tihanyi
authored at least 36 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Empir. Softw. Eng., March, 2025
2024
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext.
IEEE Trans. Inf. Forensics Secur., 2024
From 5G to 6G Networks: A Survey on AI-Based Jamming and Interference Detection and Mitigation.
IEEE Open J. Commun. Soc., 2024
Dynamic Intelligence Assessment: Benchmarking LLMs on the Road to AGI with a Focus on Model Confidence.
CoRR, 2024
Securing Tomorrow's Smart Cities: Investigating Software Security in Internet of Vehicles and Deep Learning Technologies.
CoRR, 2024
CoRR, 2024
Do Neutral Prompts Produce Insecure Code? FormAI-v2 Dataset: Labelling Vulnerabilities in Code Generated by Large Language Models.
CoRR, 2024
CyberMetric: A Benchmark Dataset for Evaluating Large Language Models Knowledge in Cybersecurity.
CoRR, 2024
D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie-Hellman Key Exchange.
IEEE Access, 2024
Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices.
IEEE Access, 2024
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2024
Proceedings of the Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, 2024
JCWIT: A Correctness-Witness Validator for Java Programs Based on Bounded Model Checking.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
Acta Informatica, September, 2023
FormAI Dataset: A Large Collection of AI-Generated C Programs and Their Vulnerability Classifications.
Dataset, September, 2023
Dataset for : A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification.
Dataset, June, 2023
A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification.
CoRR, 2023
Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses.
IEEE Commun. Surv. Tutorials, 2023
The FormAI Dataset: Generative AI in Software Security through the Lens of Formal Verification.
Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering, 2023
2022
Report on the First DES Fixed Points for Non-Weak Keys: Case-Study of Hacking an IoT Environment.
IEEE Access, 2022
2021
A Pseudorandom number Generator with Full Cycle Length based on Automata Compositions.
Informatica (Slovenia), 2021
Informatica (Slovenia), 2021
Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rate.
Proceedings of the 2021 International Carnahan Conference on Security Technology, 2021
2020
PhD thesis, 2020
A general construction for generating pseudorandom sequences using the digit expansion of real functions.
Proceedings of the 22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2020
The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
2019
Informatica (Slovenia), 2019
2018
Proceedings of the 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2018
2017
2014
Fast Method for Locating Peak Values of the Riemann Zeta Function on the Critical Line.
Proceedings of the 16th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2014
Proceedings of the Technology and Practice of Passwords, 2014