Search Results - "Bisztray, Tamás"

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Privacy-Preserving Password Cracking: How a Third Party can Crack our Password Hash Without Learning the Hash Value or the Cleartext by Tihanyi, Norbert, Bisztray, Tamas, Borsos, Bertalan, Raveau, Sebastien

    “…Using the computational resources of an untrusted third party to crack a password hash can pose a high number of privacy and security risks. The act of…”
    Get full text
    Journal Article
  2. 2

    The Suboptimal QLV Ratio May Indicate the Need for a Left Bundle Branch Area Pacing-Optimized Cardiac Resynchronization Therapy Upgrade by Ezer, Péter, Szűcs, Kitti, Lukács, Réka, Bisztray, Tamás, Vilmányi, Gábor, Szokodi, István, Komócsi, András, Kónyi, Attila

    Published in Journal of clinical medicine (26-09-2024)
    “…: The QLV ratio (QLV/baseline QRS width) is an established intraoperative-measurable parameter during cardiac resynchronization therapy (CRT) device…”
    Get full text
    Journal Article
  3. 3

    Privacy Impact Assessment: Comparing methodologies with a focus on practicality by Bisztray, Tamas, Gruschka, Nils

    Published 14-10-2021
    “…NordSec 2019. Lecture Notes in Computer Science, vol 11875. Springer, Cham Privacy and data protection have become more and more important in recent years…”
    Get full text
    Journal Article
  4. 4

    LLMs in Web Development: Evaluating LLM-Generated PHP Code Unveiling Vulnerabilities and Limitations by Tóth, Rebeka, Bisztray, Tamas, Erdodi, László

    Published 21-04-2024
    “…This study evaluates the security of web application code generated by Large Language Models, analyzing 2,500 GPT-4 generated PHP websites. These were deployed…”
    Get full text
    Journal Article
  5. 5

    Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext by Tihanyi, Norbert, Bisztray, Tamas, Borsos, Bertalan, Raveau, Sebastien

    Published 14-06-2023
    “…Using the computational resources of an untrusted third party to crack a password hash can pose a high number of privacy and security risks. The act of…”
    Get full text
    Journal Article
  6. 6

    CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge by Tihanyi, Norbert, Ferrag, Mohamed Amine, Jain, Ridhi, Bisztray, Tamas, Debbah, Merouane

    “…Large Language Models (LLMs) are increasingly used across various domains, from software development to cyber threat intelligence. Understanding all the…”
    Get full text
    Conference Proceeding
  7. 7

    Emerging Biometric Modalities and their Use: Loopholes in the Terminology of the GDPR and Resulting Privacy Risks by Bisztray, Tamas, Gruschka, Nils, Bourlai, Thirimachos, Fritsch, Lothar

    Published 23-11-2022
    “…2021 International Conference of the Biometrics Special Interest Group (BIOSIG), 2021, pp. 1-5, Technological advancements allow biometric applications to be…”
    Get full text
    Journal Article
  8. 8

    Do Neutral Prompts Produce Insecure Code? FormAI-v2 Dataset: Labelling Vulnerabilities in Code Generated by Large Language Models by Tihanyi, Norbert, Bisztray, Tamas, Ferrag, Mohamed Amine, Jain, Ridhi, Cordeiro, Lucas C

    Published 28-04-2024
    “…This study provides a comparative analysis of state-of-the-art large language models (LLMs), analyzing how likely they generate vulnerabilities when writing…”
    Get full text
    Journal Article
  9. 9

    The FormAI Dataset: Generative AI in Software Security Through the Lens of Formal Verification by Tihanyi, Norbert, Bisztray, Tamas, Jain, Ridhi, Ferrag, Mohamed Amine, Cordeiro, Lucas C, Mavroeidis, Vasileios

    Published 28-03-2024
    “…PROMISE 2023: Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering December 2023 Pages 33 to 43…”
    Get full text
    Journal Article
  10. 10

    Emerging Biometric Modalities and their Use: Loopholes in the Terminology of the GDPR and Resulting Privacy Risks by Bisztray, Tamas, Gruschka, Nils, Bourlai, Thirimachos, Fritsch, Lothar

    “…Technological advancements allow biometric applications to be more omnipresent than in any other time before. This paper argues that in the current EU data…”
    Get full text
    Conference Proceeding
  11. 11

    CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge by Tihanyi, Norbert, Ferrag, Mohamed Amine, Jain, Ridhi, Bisztray, Tamas, Debbah, Merouane

    Published 12-02-2024
    “…Large Language Models (LLMs) are increasingly used across various domains, from software development to cyber threat intelligence. Understanding all the…”
    Get full text
    Journal Article
  12. 12

    Dynamic Intelligence Assessment: Benchmarking LLMs on the Road to AGI with a Focus on Model Confidence by Tihanyi, Norbert, Bisztray, Tamas, Dubniczky, Richard A, Toth, Rebeka, Borsos, Bertalan, Cherif, Bilel, Ferrag, Mohamed Amine, Muzsai, Lajos, Jain, Ridhi, Marinelli, Ryan, Cordeiro, Lucas C, Debbah, Merouane

    Published 20-10-2024
    “…As machine intelligence evolves, the need to test and compare the problem-solving abilities of different AI models grows. However, current benchmarks are often…”
    Get full text
    Journal Article