@inproceedings{MTMT:34534315, title = {Concept for real time attacker profiling with honeypots, by skill based attacker maturity model}, url = {https://m2.mtmt.hu/api/publication/34534315}, author = {Balogh, Ádám and Érsok, Máté and Bánáti, Anna and Erdődi, László}, booktitle = {IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics : SAMI 2024 : Proceedings}, doi = {10.1109/SAMI60510.2024.10432876}, unique-id = {34534315}, year = {2024}, pages = {175-179} } @inproceedings{MTMT:34534298, title = {Improving CTF Event Organization: A Case Study on Utilizing Open Source Technologies}, url = {https://m2.mtmt.hu/api/publication/34534298}, author = {Érsok, Máté and Erdődi, László and Balogh, Ádám and Bánáti, Anna}, booktitle = {IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics : SAMI 2024 : Proceedings}, doi = {10.1109/SAMI60510.2024.10432885}, unique-id = {34534298}, year = {2024}, pages = {169-173} } @inproceedings{MTMT:34163972, title = {Neural Network-based Log Analysis Methods for 5G network}, url = {https://m2.mtmt.hu/api/publication/34163972}, author = {Puskás, Áron and Kail, Eszter and Laczi, Szandra Anna and Bánáti, Anna}, booktitle = {SISY 2023 IEEE 21st International Symposium on Intelligent Systems and Informatics}, doi = {10.1109/SISY60376.2023.10417905}, unique-id = {34163972}, year = {2023}, pages = {589-594} } @inproceedings{MTMT:34157340, title = {Machine Learning Methods for Cybersecurity: Review and Bibliometric Analysis}, url = {https://m2.mtmt.hu/api/publication/34157340}, author = {Kail, Eszter and Bánáti, Anna and Fleiner, Rita Dominika and Mosavi, Amirhosein and Makó, Csaba}, booktitle = {SISY 2023 IEEE 21st International Symposium on Intelligent Systems and Informatics}, doi = {10.1109/SISY60376.2023.10417894}, unique-id = {34157340}, abstract = {This article presents a bibliometric analysis and review of the applications of machine learning methods in cybersecurity. A taxonomy of the methods and applications is presented, and fundamental studies are introduced and reviewed. The taxonomy of the methods classifies the machine learning methods in four fundamental groups based on the methods' architecture, i.e., artificial neural networks-based, decision trees-based, support vectors machines-based, and ensembles. The specific cybersecurity application of each group is further discussed. The deep learning and hybrid methods are not included in this study. The bibliometric analysis is performed considering the Scopus database. For selection and evaluation of the articles a modified version of PRISMA is proposed.}, keywords = {Artificial intelligence; taxonomy; bibliometric analysis; machine learning; Information technology; cybersecurity}, year = {2023}, pages = {527-535}, orcid-numbers = {Mosavi, Amirhosein/0000-0003-4842-0613} } @inproceedings{MTMT:34004409, title = {Use Cases of Attack Graph in Threat Analysis And Risk Assessment for The Automotive Domain}, url = {https://m2.mtmt.hu/api/publication/34004409}, author = {Saulaiman, Mera and Kozlovszky, Miklós and Bánáti, Anna and Csilling, Ákos}, booktitle = {2022 IEEE 1st International Conference on Cognitive Mobility (CogMob)}, doi = {10.1109/CogMob55547.2022.10118297}, unique-id = {34004409}, year = {2022}, pages = {000085-000092} } @inproceedings{MTMT:33101062, title = {Attack graph implementation in graph database}, url = {https://m2.mtmt.hu/api/publication/33101062}, author = {Simon-Nagy, Gabriella and Fleiner, Rita Dominika and Bánáti, Anna}, booktitle = {IEEE 20th Jubilee International Symposium on Intelligent Systems and Informatics (SISY 2022)}, doi = {10.1109/SISY56759.2022.10036309}, unique-id = {33101062}, year = {2022}, pages = {127-132}, orcid-numbers = {Simon-Nagy, Gabriella/0009-0002-4784-1344} } @inproceedings{MTMT:33060607, title = {Overview of Attack Graph Generation For Automotive Systems}, url = {https://m2.mtmt.hu/api/publication/33060607}, author = {Saulaiman, Mera and Kozlovszky, Miklós and Csilling, Ákos and Bánáti, Anna and Benhamida, Abdallah}, booktitle = {IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems ICCC 2022}, doi = {10.1109/ICCC202255925.2022.9922866}, unique-id = {33060607}, year = {2022}, pages = {135-142} } @inproceedings{MTMT:33059911, title = {5G registration tracking based on logdata}, url = {https://m2.mtmt.hu/api/publication/33059911}, author = {Kecskés, Miklós Vilmos and Orsós, Miklós and Kail, Eszter and Németh, Anna and Bánáti, Anna}, booktitle = {IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems ICCC 2022}, unique-id = {33059911}, year = {2022}, pages = {129-134} } @inproceedings{MTMT:33059905, title = {Measuring Honeypots based on CTF game}, url = {https://m2.mtmt.hu/api/publication/33059905}, author = {Érsok, Máté and Balogh, Ádám and Erődi, László and Kozlovszky, Miklós and Kail, Eszter and Bánáti, Anna}, booktitle = {IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems ICCC 2022}, unique-id = {33059905}, year = {2022}, pages = {123-128} } @inproceedings{MTMT:33059899, title = {Security threats based on critical database system privileges}, url = {https://m2.mtmt.hu/api/publication/33059899}, author = {Fleiner, Rita Dominika and Ruben, Hubert and Bánáti, Anna and Erdődi, László}, booktitle = {IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems ICCC 2022}, unique-id = {33059899}, year = {2022}, pages = {117-122} }