Authors: Jeges, ErnőAff3, Hornák, ZoltánAff3, Eberhardt, GergelyAff4, Nagy, ZoltánAff4
Contributors: Gorodetsky, Vladimir, editorAff1, Kotenko, Igor, editorAff1, Skormin, Victor A., editorAff2
Superior Title: Computer Network Security : Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings. 1:408-413
Authors: Tóth, GergelyAff4, Hornák, ZoltánAff4
Contributors: Fischer-Hübner, Simone, editorAff1, Rannenberg, Kai, editorAff2, Yngström, Louise, editorAff3, Lindskog, Stefan, editorAff1
Superior Title: Security and Privacy in Dynamic Environments : Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22–24 May 2006, Karlstad, Sweden. 201:483-492
Authors: Jeges, ErnőAff19, Hornák, ZoltánAff19, Körmöczi, CsabaAff20
Contributors: Hutchison, David, editorAff1, Kanade, Takeo, editorAff2, Kittler, Josef, editorAff3, Kleinberg, Jon M., editorAff4, Mattern, Friedemann, editorAff5, Mitchell, John C., editorAff6, Naor, Moni, editorAff7, Nierstrasz, Oscar, editorAff8, Pandu Rangan, C., editorAff9, Steffen, Bernhard, editorAff10, Sudan, Madhu, editorAff11, Terzopoulos, Demetri, editorAff12, Tygar, Dough, editorAff13, Vardi, Moshe Y., editorAff14, Weikum, Gerhard, editorAff15, Gorodetsky, Vladimir, editorAff16, Kotenko, Igor, editorAff17, Skormin, Victor, editorAff18
Superior Title: Computer Network Security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings. 3685:430-435
Authors: Tóth, GergelyAff18, Hornák, ZoltánAff18
Contributors: Hutchison, David, editorAff1, Kanade, Takeo, editorAff2, Kittler, Josef, editorAff3, Kleinberg, Jon M., editorAff4, Mattern, Friedemann, editorAff5, Mitchell, John C., editorAff6, Naor, Moni, editorAff7, Nierstrasz, Oscar, editorAff8, Pandu Rangan, C., editorAff9, Steffen, Bernhard, editorAff10, Sudan, Madhu, editorAff11, Terzopoulos, Demetri, editorAff12, Tygar, Dough, editorAff13, Vardi, Moshe Y., editorAff14, Weikum, Gerhard, editorAff15, Martin, David, editorAff16, Serjantov, Andrei, editorAff17
Superior Title: Privacy Enhancing Technologies : 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004. Revised Selected Papers. 3424:226-241
Authors: Bődön, Ferenc, Hornák, Zoltán
Superior Title: Periodica Polytechnica Electrical Engineering (Archives); Vol. 49 No. 1-2 (2005); 3-23 ; 1587-3781 ; 0324-6000
Subject Terms: data mining, episode mining, computer security, remote supervision system
File Description: application/pdf
Availability: https://pp.bme.hu/ee/article/view/909
Authors: Kuhlmann, D., Weber, A., Beliakova, Irina, Boettcher, Alexander, Brandl, Hans, Braunwart, Hubert, Bussani, Anthony, Çetin, Görkem, Dalton, Chris I., Delfs, Eckhard, Dietrich, Kurt, Drahtmüller, Roman, Erol, Volkan, Evgeniev, Ivan, Findeisen, Ralf, Gallery, E. M., Güngören, Bora, Herzog, Pete, Hornak, Zoltan, Imamoglu, Kadir, Jansen, Bernhard, Jennings, David, Kauer, Bernhard, Landfermann, Rainer, Lenk, Matthias, Lipp, Peter, Loehr, Hans, Lo Presti, Stephane, Plaquin, David, Puccetti, Armand, Ramasamy, Harigovind, Ramunno, Gianluca, Schreiner, Florian, Schunter, Matthias, Stueble, Christian, Tóth, Gergely, Trifonov, Ventcislav, Warg, Alexander, Weber, Dirk, Weinhold, Carsten, Wespi, Andreas
Subject Terms: ddc:600, Technology, info:eu-repo/classification/ddc/600
Availability: https://publikationen.bibliothek.kit.edu/1000102745
Authors: Jeges, Erno, Kispal, Istvan, Hornak, Zoltan
Superior Title: 2008 Conference on Human System Interactions
Authors: Toth, Ervin, Hornak, Zoltan, Toth, Gergely
Superior Title: 2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX
Authors: Tóth, Gergely, Kőszegi, Gábor, Hornák, Zoltán
Superior Title: Proceedings of the 1st European Workshop on System Security
Availability: https://doi.org/10.1145/1355284.1355291
Authors: Toth, Ervin, Hornak, Zoltan, Toth, Gergely
Superior Title: International Journal of Critical Computer-Based Systems ; volume 1, issue 1/2/3, page 148 ; ISSN 1757-8779 1757-8787
Subject Terms: General Computer Science
Availability: https://doi.org/10.1504/ijccbs.2010.031711
Authors: Endrődi Csilla, Hornák Zoltán
Subject Terms: 01. Természettudományok, 01.02. Számítás- és információtudomány
File Description: part
Relation: http://acta.bibl.u-szeged.hu/59650/1/cscs_2002_027-028.pdf; Endrődi Csilla; Hornák Zoltán: Efficiency analysis and comparison of public key algorithms : [abstract].
Authors: Hornák Zoltán, Selényi Endre
Subject Terms: 01. Természettudományok, 01.02. Számítás- és információtudomány
File Description: part
Relation: http://acta.bibl.u-szeged.hu/59600/1/cscs_2000_049.pdf; Hornák Zoltán; Selényi Endre: Effective virus scanning algorithms : [abstract].
Authors: Tóth, Gergely, Kőszegi, Gábor, Hornák, Zoltán
Superior Title: Proceedings of the 1st European Workshop: System Security; 3/31/2008, p35-39, 5p
Authors: Gorodetsky, Vladimir, Kotenko, Igor, Skormin, Victor A., Jeges, Ernö, Hornák, Zoltán, Eberhardt, Gergely, Nagy, Zoltán
Superior Title: Computer Network Security (9783540739852); 2007, p408-413, 6p
Authors: Fischer-Hübner, Simone, Rannenberg, Kai, Yngström, Louise, Lindskog, Stefan, Tóth, Gergely, Hornák, Zoltán
Superior Title: Security & Privacy in Dynamic Environments; 2006, p483-492, 10p
Authors: Gorodetsky, Vladimir, Kotenko, Igor, Skormin, Victor, Jeges, Ernő, Hornák, Zoltán, Körmöczi, Csaba
Superior Title: Computer Network Security (9783540291138); 2005, p430-435, 6p
Authors: Martin, David, Serjantov, Andrei, Tóth, Gergely, Hornák, Zoltán
Superior Title: Privacy Enhancing Technologies; 2005, p226-241, 16p