Search Results - "Bisztray, Tamás"
-
1
Privacy-Preserving Password Cracking: How a Third Party can Crack our Password Hash Without Learning the Hash Value or the Cleartext
Published in IEEE transactions on information forensics and security (2024)“…Using the computational resources of an untrusted third party to crack a password hash can pose a high number of privacy and security risks. The act of…”
Get full text
Journal Article -
2
The Suboptimal QLV Ratio May Indicate the Need for a Left Bundle Branch Area Pacing-Optimized Cardiac Resynchronization Therapy Upgrade
Published in Journal of clinical medicine (26-09-2024)“…: The QLV ratio (QLV/baseline QRS width) is an established intraoperative-measurable parameter during cardiac resynchronization therapy (CRT) device…”
Get full text
Journal Article -
3
Privacy Impact Assessment: Comparing methodologies with a focus on practicality
Published 14-10-2021“…NordSec 2019. Lecture Notes in Computer Science, vol 11875. Springer, Cham Privacy and data protection have become more and more important in recent years…”
Get full text
Journal Article -
4
LLMs in Web Development: Evaluating LLM-Generated PHP Code Unveiling Vulnerabilities and Limitations
Published 21-04-2024“…This study evaluates the security of web application code generated by Large Language Models, analyzing 2,500 GPT-4 generated PHP websites. These were deployed…”
Get full text
Journal Article -
5
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext
Published 14-06-2023“…Using the computational resources of an untrusted third party to crack a password hash can pose a high number of privacy and security risks. The act of…”
Get full text
Journal Article -
6
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge
Published in 2024 IEEE International Conference on Cyber Security and Resilience (CSR) (02-09-2024)“…Large Language Models (LLMs) are increasingly used across various domains, from software development to cyber threat intelligence. Understanding all the…”
Get full text
Conference Proceeding -
7
Emerging Biometric Modalities and their Use: Loopholes in the Terminology of the GDPR and Resulting Privacy Risks
Published 23-11-2022“…2021 International Conference of the Biometrics Special Interest Group (BIOSIG), 2021, pp. 1-5, Technological advancements allow biometric applications to be…”
Get full text
Journal Article -
8
Do Neutral Prompts Produce Insecure Code? FormAI-v2 Dataset: Labelling Vulnerabilities in Code Generated by Large Language Models
Published 28-04-2024“…This study provides a comparative analysis of state-of-the-art large language models (LLMs), analyzing how likely they generate vulnerabilities when writing…”
Get full text
Journal Article -
9
The FormAI Dataset: Generative AI in Software Security Through the Lens of Formal Verification
Published 28-03-2024“…PROMISE 2023: Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering December 2023 Pages 33 to 43…”
Get full text
Journal Article -
10
Emerging Biometric Modalities and their Use: Loopholes in the Terminology of the GDPR and Resulting Privacy Risks
Published in 2021 International Conference of the Biometrics Special Interest Group (BIOSIG) (01-09-2021)“…Technological advancements allow biometric applications to be more omnipresent than in any other time before. This paper argues that in the current EU data…”
Get full text
Conference Proceeding -
11
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge
Published 12-02-2024“…Large Language Models (LLMs) are increasingly used across various domains, from software development to cyber threat intelligence. Understanding all the…”
Get full text
Journal Article -
12
Dynamic Intelligence Assessment: Benchmarking LLMs on the Road to AGI with a Focus on Model Confidence
Published 20-10-2024“…As machine intelligence evolves, the need to test and compare the problem-solving abilities of different AI models grows. However, current benchmarks are often…”
Get full text
Journal Article