TY - CHAP AU - Balogh, Ádám AU - Érsok, Máté AU - Bánáti, Anna AU - Erdődi, László ED - IEEE, Publ. TI - Concept for real time attacker profiling with honeypots, by skill based attacker maturity model T2 - IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics : SAMI 2024 : Proceedings PB - IEEE CY - Danvers (MA) SN - 9798350317206 PY - 2024 SP - 175 EP - 179 PG - 5 DO - 10.1109/SAMI60510.2024.10432876 UR - https://m2.mtmt.hu/api/publication/34534315 ID - 34534315 LA - English DB - MTMT ER - TY - CHAP AU - Érsok, Máté AU - Erdődi, László AU - Balogh, Ádám AU - Bánáti, Anna ED - IEEE, Publ. TI - Improving CTF Event Organization: A Case Study on Utilizing Open Source Technologies T2 - IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics : SAMI 2024 : Proceedings PB - IEEE CY - Danvers (MA) SN - 9798350317206 PY - 2024 SP - 169 EP - 173 PG - 5 DO - 10.1109/SAMI60510.2024.10432885 UR - https://m2.mtmt.hu/api/publication/34534298 ID - 34534298 LA - English DB - MTMT ER - TY - CHAP AU - Puskás, Áron AU - Kail, Eszter AU - Laczi, Szandra Anna AU - Bánáti, Anna ED - Szakál, Anikó TI - Neural Network-based Log Analysis Methods for 5G network T2 - SISY 2023 IEEE 21st International Symposium on Intelligent Systems and Informatics PB - IEEE Hungary Section CY - Budapest SN - 9798350343366 PY - 2023 SP - 589 EP - 594 PG - 6 DO - 10.1109/SISY60376.2023.10417905 UR - https://m2.mtmt.hu/api/publication/34163972 ID - 34163972 LA - English DB - MTMT ER - TY - CHAP AU - Kail, Eszter AU - Bánáti, Anna AU - Fleiner, Rita Dominika AU - Mosavi, Amirhosein AU - Makó, Csaba ED - Szakál, Anikó TI - Machine Learning Methods for Cybersecurity: Review and Bibliometric Analysis T2 - SISY 2023 IEEE 21st International Symposium on Intelligent Systems and Informatics PB - IEEE Hungary Section CY - Budapest SN - 9798350343366 PY - 2023 SP - 527 EP - 535 PG - 9 DO - 10.1109/SISY60376.2023.10417894 UR - https://m2.mtmt.hu/api/publication/34157340 ID - 34157340 AB - This article presents a bibliometric analysis and review of the applications of machine learning methods in cybersecurity. A taxonomy of the methods and applications is presented, and fundamental studies are introduced and reviewed. The taxonomy of the methods classifies the machine learning methods in four fundamental groups based on the methods' architecture, i.e., artificial neural networks-based, decision trees-based, support vectors machines-based, and ensembles. The specific cybersecurity application of each group is further discussed. The deep learning and hybrid methods are not included in this study. The bibliometric analysis is performed considering the Scopus database. For selection and evaluation of the articles a modified version of PRISMA is proposed. LA - English DB - MTMT ER - TY - CHAP AU - Saulaiman, Mera AU - Kozlovszky, Miklós AU - Bánáti, Anna AU - Csilling, Ákos TI - Use Cases of Attack Graph in Threat Analysis And Risk Assessment for The Automotive Domain T2 - 2022 IEEE 1st International Conference on Cognitive Mobility (CogMob) PB - IEEE CY - Piscataway (NJ) SN - 9781665476324 PY - 2022 SP - 000085 EP - 000092 PG - 8 DO - 10.1109/CogMob55547.2022.10118297 UR - https://m2.mtmt.hu/api/publication/34004409 ID - 34004409 LA - English DB - MTMT ER - TY - CHAP AU - Simon-Nagy, Gabriella AU - Fleiner, Rita Dominika AU - Bánáti, Anna ED - Szakál, Anikó TI - Attack graph implementation in graph database T2 - IEEE 20th Jubilee International Symposium on Intelligent Systems and Informatics (SISY 2022) PB - IEEE CY - Szabadka SN - 9781665489881 PY - 2022 SP - 127 EP - 132 PG - 6 DO - 10.1109/SISY56759.2022.10036309 UR - https://m2.mtmt.hu/api/publication/33101062 ID - 33101062 LA - English DB - MTMT ER - TY - CHAP AU - Saulaiman, Mera AU - Kozlovszky, Miklós AU - Csilling, Ákos AU - Bánáti, Anna AU - Benhamida, Abdallah ED - Szakál, Anikó TI - Overview of Attack Graph Generation For Automotive Systems T2 - IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems ICCC 2022 PB - IEEE Hungary Section CY - Budapest SN - 9781665481762 PY - 2022 SP - 135 EP - 142 PG - 8 DO - 10.1109/ICCC202255925.2022.9922866 UR - https://m2.mtmt.hu/api/publication/33060607 ID - 33060607 LA - English DB - MTMT ER - TY - CHAP AU - Kecskés, Miklós Vilmos AU - Orsós, Miklós AU - Kail, Eszter AU - Németh, Anna AU - Bánáti, Anna ED - Szakál, Anikó TI - 5G registration tracking based on logdata T2 - IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems ICCC 2022 PB - IEEE Hungary Section CY - Budapest SN - 9781665481762 PY - 2022 SP - 129 EP - 134 PG - 6 UR - https://m2.mtmt.hu/api/publication/33059911 ID - 33059911 LA - English DB - MTMT ER - TY - CHAP AU - Érsok, Máté AU - Balogh, Ádám AU - Erődi, László AU - Kozlovszky, Miklós AU - Kail, Eszter AU - Bánáti, Anna ED - Szakál, Anikó TI - Measuring Honeypots based on CTF game T2 - IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems ICCC 2022 PB - IEEE Hungary Section CY - Budapest SN - 9781665481762 PY - 2022 SP - 123 EP - 128 PG - 6 UR - https://m2.mtmt.hu/api/publication/33059905 ID - 33059905 LA - English DB - MTMT ER - TY - CHAP AU - Fleiner, Rita Dominika AU - Ruben, Hubert AU - Bánáti, Anna AU - Erdődi, László ED - Szakál, Anikó TI - Security threats based on critical database system privileges T2 - IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems ICCC 2022 PB - IEEE Hungary Section CY - Budapest SN - 9781665481762 PY - 2022 SP - 117 EP - 122 PG - 6 UR - https://m2.mtmt.hu/api/publication/33059899 ID - 33059899 LA - English DB - MTMT ER -