TY - CHAP AU - Holló, Csaba ED - Szlávi, Péter ED - Zsakó, László TI - A túlzott digitális eszközhasználat fontosabb jellemzői és oktatási vonatkozásai T2 - iNFODIDACT'2023 PB - Webdidaktika Alapítvány CY - Budapest SN - 9786158060875 PY - 2024 SP - 45 EP - 63 PG - 19 UR - https://m2.mtmt.hu/api/publication/34863410 ID - 34863410 LA - Hungarian DB - MTMT ER - TY - JOUR AU - Baniata, Hamza AU - Kertész, Attila TI - Partial Pre-Image Attack on Proof-of-Work based Blockchains JF - BLOCKCHAIN: RESEARCH AND APPLICATIONS J2 - BLOCKCHAIN VL - X PY - 2024 SP - 100194 SN - 2096-7209 DO - 10.1016/j.bcra.2024.100194 UR - https://m2.mtmt.hu/api/publication/34847971 ID - 34847971 LA - English DB - MTMT ER - TY - CHAP AU - Kiss, T AU - Ullah, A AU - Terstyanszky, G AU - Kao, O AU - Becker, S AU - Verginadis, Y AU - Michalas, A AU - Stankovski, V AU - Kertész, Attila AU - Ricci, E AU - Altmann, J AU - Egger, B AU - Tusa, F AU - Kovács, József AU - Lovas, Róbert ED - Barolli, L TI - Swarmchestrate: Towards a Fully Decentralised Framework for Orchestrating Applications in the Cloud-to-Edge Continuum T2 - Advanced Information Networking and Applications PB - Springer Nature Switzerland CY - Cham SN - 9783031579318 T3 - Lecture Notes on Data Engineering and Communications Technologies, ISSN 2367-4512 ; 203. PY - 2024 SP - 89 EP - 100 PG - 12 DO - 10.1007/978-3-031-57931-8_9 UR - https://m2.mtmt.hu/api/publication/34795721 ID - 34795721 LA - English DB - MTMT ER - TY - CHAP AU - Wilson, Valdez AU - Baniata, Hamza AU - Márkus, András AU - Kertész, Attila ED - Zeinalipour, Demetris ED - Blanco Heras, Dora ED - Pallis, George ED - Herodotou, Herodotos ED - Trihinas, Demetris ED - Balouek, Daniel ED - Diehl, Patrick ED - Cojean, Terry ED - Fürlinger, Karl ED - Kirkeby, Maja Hanne ED - Nardellli, Matteo ED - Di Sanzo, Pierangelo TI - Towards a Simulation as a Service Platform for the Cloud-to-Things Continuum T2 - Euro-Par 2023: Parallel Processing Workshops PB - Springer Nature Switzerland CY - Cham SN - 9783031488030 T3 - Lecture Notes in Computer Science, ISSN 0302-9743 ; 14352. PY - 2024 SP - 65 EP - 75 PG - 11 DO - 10.1007/978-3-031-48803-0_6 UR - https://m2.mtmt.hu/api/publication/34795664 ID - 34795664 LA - English DB - MTMT ER - TY - JOUR AU - Ring, Orsolya AU - Szabó, Martina Katalin AU - Guba, Csenge AU - Váradi, Bendegúz AU - Üveges, István TI - "Approaches to sentiment analysis of Hungarian political news at the sentence level" JF - LANGUAGE RESOURCES AND EVALUATION J2 - LANG RESOUR EVAL PY - 2024 PG - 29 SN - 1574-020X DO - 10.1007/s10579-023-09717-5 UR - https://m2.mtmt.hu/api/publication/34753193 ID - 34753193 AB - Automated sentiment analysis of textual data is one of the central and most challenging tasks in political communication studies. However, the toolkits available are primarily for English texts and require contextual adaptation to produce valid results—especially concerning morphologically rich languages such as Hungarian. This study introduces (1) a new sentiment and emotion annotation framework that uses inductive approaches to identify emotions in the corpus and aggregate these emotions into positive, negative, and mixed sentiment categories, (2) a manually annotated sentiment data set with 5700 political news sentences, (3) a new Hungarian sentiment dictionary for political text analysis created via word embeddings, whose performance was compared with other available sentiment dictionaries. (4) Because of the limitations of sentiment analysis using dictionaries we have also applied various machine learning algorithms to analyze our dataset, (5) Last but not least to move towards state-of-the-art approaches, we have fine-tuned the Hungarian BERT-base model for sentiment analysis. Meanwhile, we have also tested how different pre-processing steps could affect the performance of machine-learning algorithms in the case of Hungarian texts. LA - English DB - MTMT ER - TY - JOUR AU - Aladics, Tamás AU - Hegedűs, Péter AU - Ferenc, Rudolf TI - A Comparative Study of Commit Representations for JIT Vulnerability Prediction JF - COMPUTERS J2 - COMPUTERS VL - 13 PY - 2024 IS - 1 SP - 22 SN - 2073-431X DO - 10.3390/computers13010022 UR - https://m2.mtmt.hu/api/publication/34499921 ID - 34499921 AB - With the evolution of software systems, their size and complexity are rising rapidly. Identifying vulnerabilities as early as possible is crucial for ensuring high software quality and security. Just-in-time (JIT) vulnerability prediction, which aims to find vulnerabilities at the time of commit, has increasingly become a focus of attention. In our work, we present a comparative study to provide insights into the current state of JIT vulnerability prediction by examining three candidate models: CC2Vec, DeepJIT, and Code Change Tree. These unique approaches aptly represent the various techniques used in the field, allowing us to offer a thorough description of the current limitations and strengths of JIT vulnerability prediction. Our focus was on the predictive power of the models, their usability in terms of false positive (FP) rates, and the granularity of the source code analysis they are capable of handling. For training and evaluation, we used two recently published datasets containing vulnerability-inducing commits: ProjectKB and Defectors. Our results highlight the trade-offs between predictive accuracy and operational flexibility and also provide guidance on the use of ML-based automation for developers, especially considering false positive rates in commit-based vulnerability prediction. These findings can serve as crucial insights for future research and practical applications in software security. LA - English DB - MTMT ER - TY - JOUR AU - Sabetta, Antonino AU - Ponta, Serena Elisa AU - Lozoya, Rocio Cabrera AU - Bezzi, Michele AU - Sacchetti, Tommaso AU - Greco, Matteo AU - Balogh, Gergő AU - Hegedűs, Péter AU - Ferenc, Rudolf AU - Paramitha, Ranindya AU - Pashchenko, Ivan AU - Papotti, Aurora AU - Milánkovich, Ákos AU - Massacci, Fabio TI - Known Vulnerabilities of Open Source Projects: Where Are the Fixes? JF - IEEE SECURITY & PRIVACY J2 - IEEE SECUR PRIV VL - 22 PY - 2024 IS - 2 SP - 49 EP - 59 PG - 11 SN - 1540-7993 DO - 10.1109/MSEC.2023.3343836 UR - https://m2.mtmt.hu/api/publication/34499877 ID - 34499877 LA - English DB - MTMT ER - TY - JOUR AU - Péter, Róbert AU - Szántó, Zsolt AU - Biacsi, Zoltán AU - Berend, Gábor AU - Bilicki, Vilmos TI - Multilingual Analysis and Visualization of Bibliographic Metadata and Texts with the AVOBMAT Research Tool JF - Journal of Open Humanities Data VL - 10 PY - 2024 PG - 10 SN - 2059-481X DO - 10.5334/johd.175 UR - https://m2.mtmt.hu/api/publication/34431216 ID - 34431216 LA - English DB - MTMT ER - TY - CHAP AU - Alexin, Zoltán ED - Répás, József TI - Milyen támadások fenyegetik az egészségügyi adatok bizalmasságát? T2 - I. Alverad-Bánki Nemzetközi Kiberbiztonsági Konferencia PB - Óbudai Egyetem CY - Budapest SN - 9789634493440 PY - 2023 SP - 56 EP - 56 PG - 1 UR - https://m2.mtmt.hu/api/publication/34532466 ID - 34532466 LA - Hungarian DB - MTMT ER - TY - CHAP AU - Alexin, Zoltán ED - Répás, József TI - What sorts of attacks are threatening the confidentiality of medical data? T2 - I. Alverad-Bánki Nemzetközi Kiberbiztonsági Konferencia PB - Óbudai Egyetem CY - Budapest SN - 9789634493440 PY - 2023 SP - 57 EP - 57 PG - 1 UR - https://m2.mtmt.hu/api/publication/34532434 ID - 34532434 LA - English DB - MTMT ER -