@inproceedings{MTMT:34832887, title = {Supporting CAN Bus Anomaly Detection with Correlation Data}, url = {https://m2.mtmt.hu/api/publication/34832887}, author = {Koltai, Beatrix and Gazdag, András Gábor and Ács, Gergely}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy}, doi = {10.5220/0012360400003648}, volume = {1}, unique-id = {34832887}, abstract = {Communication on the Controller Area Network (CAN) in vehicles is notably lacking in security measures, rendering it susceptible to remote attacks. These cyberattacks can potentially compromise safety-critical vehicle subsystems, and therefore endanger passengers and others around them. Identifying these intrusions could be done by monitoring the CAN traffic and detecting abnormalities in sensor measurements. To achieve this, we propose integrating time-series forecasting and signal correlation analysis to improve the detection accuracy of an onboard intrusion detection system (IDS). We predict sets of correlated signals collectively and report anomaly if their combined prediction error surpasses a predefined threshold. We show that this integrated approach enables the identification of a broader spectrum of attacks and significantly outperforms existing state-of-the-art solutions. © 2024 by SCITEPRESS – Science and Technology Publications, Lda.}, keywords = {Correlation; CAN; Anomaly detection; TCN}, year = {2024}, pages = {285-296}, orcid-numbers = {Gazdag, András Gábor/0000-0002-4481-3308} } @article{MTMT:34832881, title = {Stationary analysis of a constrained Markov fluid model with two buffers}, url = {https://m2.mtmt.hu/api/publication/34832881}, author = {Buchholz, Peter and Mészáros, András Gergely and Telek, Miklós}, doi = {10.1080/15326349.2024.2339247}, journal-iso = {STOCH MODELS}, journal = {STOCHASTIC MODELS}, unique-id = {34832881}, issn = {1532-6349}, abstract = {Abstract.: We consider Markov fluid models with two infinite buffers, whose fluid rates ensure that the fluid level of buffer 1 is never larger than the one of buffer 2. For the model, we derive the system of PDEs describing the transient behavior and expressions for the stationary analysis in the Laplace domain. Examples for the application of the model in the context of network access control are presented. Numerical results are compared with detailed simulation results to show that the numerical approach computes the required measures with sufficient accuracy. © 2024 Taylor & Francis Group, LLC.}, keywords = {Partial differential equations; Laplace transforms; LAPLACE TRANSFORM; Transient behavior; Access control; Markov fluid models; Markov fluid model; TRANSIENT EXPRESSION; Stationary analysis; Stationary analysis; Infinite buffer; Fluid level; two infinite fluid buffers; Fluid rates; Infinite fluids; Laplace domains; Two infinite fluid buffer}, year = {2024}, eissn = {1532-4214}, orcid-numbers = {Telek, Miklós/0000-0001-9600-6084} } @misc{MTMT:34818857, title = {Proceedings of the 8th International Conference on Research, Technology and Education of Space}, url = {https://m2.mtmt.hu/api/publication/34818857}, isbn = {9789637367342}, editor = {Bacsárdi, László and Kovács, Kálmán}, publisher = {Hungarian Astronautical Society}, unique-id = {34818857}, year = {2024}, orcid-numbers = {Bacsárdi, László/0000-0002-7337-317X} } @article{MTMT:34794507, title = {Hazai eredmények a kvantumhálózatok fejlesztésében}, url = {https://m2.mtmt.hu/api/publication/34794507}, author = {Bacsárdi, László and Kis, Zsolt}, journal-iso = {FIZIKAI SZEMLE}, journal = {FIZIKAI SZEMLE}, volume = {74}, unique-id = {34794507}, issn = {0015-3257}, year = {2024}, pages = {124-128}, orcid-numbers = {Bacsárdi, László/0000-0002-7337-317X} } @article{MTMT:34788060, title = {Modelling and evaluation of cooperative Vulnerable Road User protection schemes in realistic C-ITS environments}, url = {https://m2.mtmt.hu/api/publication/34788060}, author = {Hejazi, Hamdan and Bokor, László}, doi = {10.1016/j.comnet.2024.110396}, journal-iso = {COMPUT NETW}, journal = {COMPUTER NETWORKS}, volume = {246}, unique-id = {34788060}, issn = {1389-1286}, year = {2024}, eissn = {1872-7069}, orcid-numbers = {Bokor, László/0000-0003-1870-8544} } @article{MTMT:34785835, title = {Numerical inverse transformation of double sided Laplace transform with parameter optimization}, url = {https://m2.mtmt.hu/api/publication/34785835}, author = {Mészáros, András Gergely and Telek, Miklós}, doi = {10.1016/j.amc.2024.128713}, journal-iso = {APPL MATH COMPUT}, journal = {APPLIED MATHEMATICS AND COMPUTATION}, volume = {474}, unique-id = {34785835}, issn = {0096-3003}, abstract = {There are efficient numerical inverse Laplace transformation (NILT) procedures for double sided Laplace transforms (DSLT), which are based on some hyperparameters. If those hyperparameters are set properly, the computed inverse is accurate, while using an incorrect hyperparameter results in a completely incorrect inverse. To the best of the authors knowledge, there is no NILT procedure for DSLT, which automatically sets the hyperparameters based on the DSLT and the point where the inverse needs to be computed. In this paper we propose a procedure which automatically optimizes the hyperparameters of the NILT method and this way it eliminates the unforeseen dependency of the computed inverse on the inherent hyperparameters. © 2024 Elsevier Inc.}, keywords = {Inverse problems; Laplace transforms; PARAMETER OPTIMIZATION; PARAMETER OPTIMIZATION; Transformation methods; Hyper-parameter; Laplace transformations; Inverse transformations; numerical Inverse Laplace transformation; numerical Inverse Laplace transformation; inverse transforms; Double sided Laplace transform; Double sided; Double sided laplace transform}, year = {2024}, eissn = {1873-5649}, orcid-numbers = {Telek, Miklós/0000-0001-9600-6084} } @inproceedings{MTMT:34782153, title = {Efficient Computing of Disaster-Disjoint Paths: Greedy and Beyond}, url = {https://m2.mtmt.hu/api/publication/34782153}, author = {Vass, Balázs and Bérczi-Kovács, Erika and Gyimesi, Péter and Tapolcai, János}, booktitle = {2024 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024}, unique-id = {34782153}, year = {2024}, pages = {1-2}, orcid-numbers = {Bérczi-Kovács, Erika/0000-0003-2259-0868} } @inproceedings{MTMT:34782100, title = {Efficient Algorithm for Region-Disjoint Survivable Routing in Backbone Networks}, url = {https://m2.mtmt.hu/api/publication/34782100}, author = {Bérczi-Kovács, Erika and Gyimesi, Péter and Vass, Balázs and Tapolcai, János}, booktitle = {IEEE INFOCOM 2024 - IEEE Conference on Computer Communications}, unique-id = {34782100}, year = {2024}, pages = {1-10}, orcid-numbers = {Bérczi-Kovács, Erika/0000-0003-2259-0868} } @inproceedings{MTMT:34765240, title = {Digital Innovations Development: Causal factors and relations - A Case Study of Montenegro}, url = {https://m2.mtmt.hu/api/publication/34765240}, author = {Ognjanović, Ivana and Laković, Luka and Šendelj, Ramo and Bokor, László and Kara, Péter András and Reich, Christoph and Madan, Manav and Roganović, Milovan and Zouilas, Emmanouil and Mantas, John and Eraković, Jevto and Radusinović, Tanja and Rakočević, Nada}, booktitle = {2024 28th International Conference on Information Technology (IT)}, doi = {10.1109/IT61232.2024.10475725}, unique-id = {34765240}, abstract = {In order for economies to expand and develop globally, innovation is essential. A popular statistic for evaluating innovation between countries is the Global Innovation Index (GII), which provides a thorough analysis of the state of innovation worldwide. In this context, this paper aims to contribute to the literature by examining the multi-factoral effects of the innovation ecosystem on innovation development (internal causal effects), and the impact of global trends and crises on the innovation ecosystem (external causal effects) in Montenegro. The resources provided in this paper offer valuable insights into the innovation landscape in Montenegro and the Western Balkans, as well as the impact of globalization, global trends, and crises on innovation in the region. The paper also discusses the function of innovation hubs such as the DigNest project, in promoting cooperation between academic institutions, government agencies and corporations, and supporting the exchange of knowledge and fresh concepts. © 2024 IEEE.}, year = {2024} } @inproceedings{MTMT:34765208, title = {Investigation of the separation zone for split-domain light field visualization}, url = {https://m2.mtmt.hu/api/publication/34765208}, author = {Javidi, Kamran and Martini, Maria G. and Kara, Péter András}, booktitle = {2024 28th International Conference on Information Technology (IT)}, doi = {10.1109/IT61232.2024.10475755}, unique-id = {34765208}, abstract = {Light field visualization commonly provides a single content over the entire field of view. However, the angularly-selective nature of the technology enables the simultaneous visualization of different contents at different viewing angles. Yet segmenting the valid viewing area comes with content interference as well in forms of separation zones, resulting invalid viewing domains. In this paper, we introduce a study on the separation zone of split-domain light field visualization. We created a static-content-based scenario in which we split the valid viewing area into two distinct domains, with a separation zone in between them. This was achieved by merging two light field contents in the middle with an instantaneous switch. The resulting visualization on a light field display was captured by a DSLR camera from two viewing distances, and it was compared to the crosstalk effect caused by insufficient angular resolution. © 2024 IEEE.}, year = {2024} }