Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents L Erdődi, ÅÅ Sommervoll, FM Zennaro Journal of Information Security and Applications 61, 102903, 2021 | 50 | 2021 |
Modeling Penetration Testing with Reinforcement Learning Using Capture-the-Flag Challenges and Tabular Q-Learning FM Zennaro, L Erdodi arXiv preprint arXiv:2005.12632, 2020 | 44 | 2020 |
Secure information sharing in an industrial Internet of Things N Ulltveit-Moe, H Nergaard, L Erdödi, T Gjøsæter, E Kolstad, P Berg arXiv preprint arXiv:1601.04301, 2016 | 32 | 2016 |
Modelling penetration testing with reinforcement learning using capture‐the‐flag challenges: Trade‐offs between model‐free learning and a priori knowledge FM Zennaro, L Erdődi IET Information Security 17 (3), 441-457, 2023 | 30 | 2023 |
The Agent Web Model: modeling web hacking for reinforcement learning L Erdődi, FM Zennaro International Journal of Information Security, 1-17, 2021 | 18 | 2021 |
Security survey of dedicated iot networks in the unlicensed ism bands E Kail, A Banati, E Lászlo, M Kozlovszky 2018 IEEE 12th international symposium on applied computational intelligence …, 2018 | 18 | 2018 |
File compression with LZO algorithm using NVIDIA CUDA architecture L Erdodi, L Erdődi 2012 4th IEEE International Symposium on Logistics and Industrial …, 2012 | 13 | 2012 |
Attacking power grid substations: An experiment demonstrating how to attack the scada protocol iec 60870-5-104 L Erdődi, P Kaliyar, SH Houmb, A Akbarzadeh, AJ Waltoft-Olsen Proceedings of the 17th International Conference on Availability …, 2022 | 11 | 2022 |
Overview of phishing landscape and homographs in Arabic domain names H Ahmad, L Erdodi Security and Privacy 4 (4), e159, 2021 | 9 | 2021 |
Sql injections and reinforcement learning: An empirical evaluation of the role of action structure M Del Verme, ÅÅ Sommervoll, L Erdődi, S Totaro, FM Zennaro Secure IT Systems: 26th Nordic Conference, NordSec 2021, Virtual Event …, 2021 | 9 | 2021 |
Stack-based buffer overflow detection using recurrent neural networks WA Dahl, L Erdodi, FM Zennaro arXiv preprint arXiv:2012.15116, 2020 | 9 | 2020 |
Finding dispatcher gadgets for jump oriented programming code reuse attacks L Erdődi 2013 IEEE 8th International Symposium on Applied Computational Intelligence …, 2013 | 8 | 2013 |
Attacking x86 windows binaries by jump oriented programming L Erdődi 2013 IEEE 17th International Conference on Intelligent Engineering Systems …, 2013 | 5 | 2013 |
Experimental and numerical analysis of timber joints L Erdodi, I Bodi High Performance Structures and Materials. The 2nd Intern. Conf. Heraklion …, 2004 | 5 | 2004 |
Towards dynamic capture-the-flag training environments for reinforcement learning offensive security agents RA Chetwyn, L Erdődi 2022 IEEE International Conference on Big Data (Big Data), 2585-2594, 2022 | 4 | 2022 |
Honeypot optimization based on CTF game Á Balogh, M Érsok, L Erdődi, A Szarvák, E Kail, A Bánáti 2022 IEEE 20th Jubilee World Symposium on Applied Machine Intelligence and …, 2022 | 4 | 2022 |
Exploitation vs. prevention: the ongoing saga of software vulnerabilities L Erdődi, A Jøsang Acta Polytechnica Hungarica 17 (7), 199-218, 2020 | 4 | 2020 |
When every byte counts—Writing minimal length shellcodes ZL Németh, L Erdődi 2015 IEEE 13th International Symposium on Intelligent Systems and …, 2015 | 4 | 2015 |
Numerical determination of the slip modulus of dowel-type timber joints L Erdődi, I Bódi Pollack Periodica 2 (3), 35-44, 2007 | 4 | 2007 |
Comparison of The Strength Characteristics of Wood According to Combined Stress Theories and EC5 I Bódi, L Erdödi IABSE Symposium Report 85 (9), 1-6, 2001 | 4 | 2001 |