default search action
Piroska Haller
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Roland Bolboaca, Piroska Haller, Béla Genge:
Evaluation Techniques for Long Short-Term Memory Models: Overfitting Analysis and Handling Missing Values. IEA/AIE 2024: 228-240 - 2022
- [j13]Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero, Georgios Fontaras:
VetaDetect: Vehicle tampering detection with closed-loop model ensemble. Int. J. Crit. Infrastructure Prot. 37: 100525 (2022) - [j12]Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero, Georgios Fontaras:
Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525. Int. J. Crit. Infrastructure Prot. 38: 100543 (2022) - [c25]Roland Bolboaca, Piroska Haller, Dimitris Kontses, Alexandros Papageorgiou-Koutoulas, Stylianos Doulgeris, Nikolaos Zingopis, Zissis Samaras:
Tampering Detection for Automotive Exhaust Aftertreatment Systems using Long Short-Term Memory Predictive Networks. EuroS&P Workshops 2022: 358-367 - 2020
- [c24]Roland Bolboaca, Teri Lenard, Béla Genge, Piroska Haller:
Locality sensitive hashing for tampering detection in automotive systems. ARES 2020: 57:1-57:7 - [c23]Teri Lenard, Roland Bolboaca, Béla Genge, Piroska Haller:
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks. Networking 2020: 395-403
2010 – 2019
- 2019
- [j11]Béla Genge, Piroska Haller, Calin Enachescu:
Anomaly Detection in Aging Industrial Internet of Things. IEEE Access 7: 74217-74230 (2019) - [j10]Béla Genge, Piroska Haller, Adrian-Vasile Duka, Hunor Sándor:
A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems. Autom. 67(5): 417-428 (2019) - [j9]Béla Genge, Piroska Haller, Adrian-Vasile Duka:
Engineering security-aware control applications for data authentication in smart industrial cyber-physical systems. Future Gener. Comput. Syst. 91: 206-222 (2019) - [j8]Piroska Haller, Béla Genge, Adrian-Vasile Duka:
On the practical integration of anomaly detection techniques in industrial control applications. Int. J. Crit. Infrastructure Prot. 24: 48-68 (2019) - [j7]Hunor Sándor, Béla Genge, Zoltán Szántó, Lorinc Márton, Piroska Haller:
Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems. Int. J. Crit. Infrastructure Prot. 25: 152-168 (2019) - [c22]Roland Bolboaca, Béla Genge, Piroska Haller:
Using Side-Channels to Detect Abnormal Behavior in Industrial Control Systems. ICCP 2019: 435-441 - [c21]Hunor Sándor, Béla Genge, Piroska Haller, Andrei Bica:
A Security-Enhanced Interoperability Middleware for the Internet of Things. ISDFS 2019: 1-6 - 2018
- [c20]Anastasija Collen, Niels A. Nijdam, Javier Augusto-Gonzalez, Sokratis K. Katsikas, Konstantinos M. Giannoutakis, Georgios P. Spathoulas, Erol Gelenbe, Konstantinos Votis, Dimitrios Tzovaras, Navid Ghavami, Melanie Volkamer, Piroska Haller, Alvaro Sánchez, Miltiadis Dimas:
GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control. Euro-CYBERSEC 2018: 68-78 - 2017
- [j6]Piroska Haller, Béla Genge:
Using Sensitivity Analysis and Cross-Association for the Design of Intrusion Detection Systems in Industrial Cyber-Physical Systems. IEEE Access 5: 9336-9347 (2017) - [j5]Béla Genge, Piroska Haller, István Kiss:
Cyber-Security-Aware Network Design of Industrial Control Systems. IEEE Syst. J. 11(3): 1373-1384 (2017) - [j4]Béla Genge, Piroska Haller, Cristian-Dragos Dumitru, Calin Enachescu:
Designing Optimal and Resilient Intrusion Detection Architectures for Smart Grids. IEEE Trans. Smart Grid 8(5): 2440-2451 (2017) - [c19]Adrian-Vasile Duka, Béla Genge, Piroska Haller, Bogdan Crainicu:
Enforcing End-to-End Security in Scada Systems via Application-Level Cryptography. Critical Infrastructure Protection 2017: 139-155 - [c18]Hunor Sándor, Béla Genge, Piroska Haller, Flavius Graur:
Software Defined Response and Network Reconfiguration for Industrial Control Systems. Critical Infrastructure Protection 2017: 157-173 - [c17]Béla Genge, Adrian-Vasile Duka, Piroska Haller, Bogdan Crainicu, Hunor Sándor, Flavius Graur:
Design, verification and implementation of a lightweight remote attestation protocol for process control systems. INDIN 2017: 75-82 - [c16]Hunor Sándor, Piroska Haller, Béla Genge, Zoltán Kátai:
Optimally scheduled interventions in the presence of vulnerabilities for modern cyber-physical systems. INDIN 2017: 115-120 - [c15]Hunor Sándor, Béla Genge, Piroska Haller, Adrian-Vasile Duka, Bogdan Crainicu:
Cross-layer anomaly detection in industrial cyber-physical systems. SoftCOM 2017: 1-5 - 2016
- [j3]Béla Genge, Piroska Haller, István Kiss:
A framework for designing resilient distributed intrusion detection systems for critical infrastructures. Int. J. Crit. Infrastructure Prot. 15: 3-11 (2016) - [c14]Béla Genge, Piroska Haller:
A hierarchical control plane for software-defined networks-based industrial control systems. Networking 2016: 73-81 - [c13]Béla Genge, Piroska Haller, István Kiss:
Big Data Processing to Detect Abnormal Behavior in Smart Grids. SmartGIFT 2016: 214-221 - 2015
- [j2]Béla Genge, István Kiss, Piroska Haller:
A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. Int. J. Crit. Infrastructure Prot. 10: 3-17 (2015) - [j1]Béla Genge, Flavius Graur, Piroska Haller:
Experimental assessment of network design approaches for protecting industrial control systems. Int. J. Crit. Infrastructure Prot. 11: 24-38 (2015) - [c12]Béla Genge, Piroska Haller, István Kiss:
A Linear Programming Approach for K-Resilient and Reliability-Aware Design of Large-Scale Industrial Networks. ADHOC-NOW 2015: 288-302 - [c11]István Kiss, Béla Genge, Piroska Haller, Gheorghe Sebestyen:
A framework for testing stealthy attacks in energy grids. ICCP 2015: 553-560 - [c10]István Kiss, Béla Genge, Piroska Haller:
A clustering-based approach to detect cyber attacks in process control systems. INDIN 2015: 142-148 - 2014
- [c9]Béla Genge, Dorin Adrian Rusu, Piroska Haller:
A connection pattern-based approach to detect network traffic anomalies in critical infrastructures. EUROSEC 2014: 1:1-1:6 - [c8]Lorinc Márton, Piroska Haller, Tamás Szabó, Hunor Sándor, Tamas Vajda, Zoltán Szántó:
Network Controller for Teleoperated Mobile Robotic Agents. IAS 2014: 1437-1449 - [c7]Lorinc Márton, Zoltán Szántó, Tamas Vajda, Piroska Haller, Hunor Sándor, Tamás Szabó, Levente Tamas:
Communication delay and jitter influence on bilateral teleoperation. MED 2014: 1171-1176 - 2013
- [c6]Lorinc Márton, Jordi Artigas-Esclusa, Piroska Haller, Tamas Vajda:
Passive bilateral teleoperation with bounded control signals. INDIN 2013: 337-342 - 2011
- [i11]Béla Genge, Piroska Haller:
Using Planetlab to Implement Multicast at the Application Level. CoRR abs/1101.5791 (2011) - 2010
- [i10]Gyula Farkas, Béla Genge, Piroska Haller:
A Platform for Implementing Secure Wireless Ad Hoc Networks. CoRR abs/1007.0917 (2010) - [i9]Béla Genge, Piroska Haller:
End-Host Distribution in Application-Layer Multicast: Main Issues and Solutions. CoRR abs/1007.0920 (2010)
2000 – 2009
- 2009
- [c5]Béla Genge, Piroska Haller:
Middleware for Automated Implementation of Security Protocols. ESWC 2009: 476-490 - [c4]Béla Genge, Piroska Haller:
A syntactic approach for identifying multi-protocol attacks. ICUMT 2009: 1-5 - [c3]Béla Genge, Piroska Haller:
Towards Automated Secure Web Service Execution. Networking 2009: 943-954 - [i8]Béla Genge, Piroska Haller, Iosif Ignat, Ovidiu Ratoi:
Informal specification-based performance evaluation of security protocols. CoRR abs/0908.2871 (2009) - [i7]Ovidiu Ratoi, Piroska Haller, Ioan Salomie, Béla Genge:
Component based platform for multimedia applications. CoRR abs/0908.3082 (2009) - [i6]Béla Genge, Piroska Haller, Ovidiu Ratoi, Iosif Ignat:
Term-based composition of security protocols. CoRR abs/0908.3083 (2009) - [i5]Béla Genge, Piroska Haller:
A Modeling Framework for Generating Security Protocol Specifications. CoRR abs/0908.3090 (2009) - [i4]Béla Genge, Iosif Ignat, Piroska Haller:
Automated Composition of Security Protocols. CoRR abs/0908.4325 (2009) - [i3]Béla Genge, Piroska Haller:
Extending WS-Security to Implement Security Protocols for Web Services. CoRR abs/0909.1639 (2009) - [i2]Attila Magyari, Béla Genge, Piroska Haller:
Certificate-based Single Sign-On Mechanism for Multi-Platform Distributed Systems. CoRR abs/0909.1640 (2009) - [i1]Béla Genge, Piroska Haller:
Performance Evaluation of Security Protocols. CoRR abs/0910.3765 (2009) - 2008
- [c2]Béla Genge, Piroska Haller, Ovidiu Ratoi:
Constructing Security Protocol Specifications for Web Services. IDC 2008: 245-250 - [c1]Béla Genge, Piroska Haller:
A Modeling Framework for Generating Security Protocol Specifications. SYNASC 2008: 362-365
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint