Secure systems

 

Journal papers, book chapters:

 

L Buttyán, L Czap, I Vajda. Detection and Recovery From Pollution Attacks in Coding Based Distributed Storage Schemes. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 8:(6) pp. 824-838. (2011)
I Askoxylakis, B Bencsáth, L Buttyán, L Dóra, V Siris, D Szili, I Vajda. Securing Multi-operator Based QoS-aware Mesh Networks: Requirements and Design Options. WIRELESS COMMUNICATIONS & MOBILE COMPUTING 10:(5) pp. 622-646. (2010) Special Issue on QoS and Security in Wireless Networks
L. Buttyán, L. Dóra, M. Félegyházi, I. Vajda. Barter Trade Improves Message Delivery in Opportunistic Networks. AD HOC NETWORKS 8:(1) pp. 1-14. (2010)
L. Buttyán, P. Schaffer, I. Vajda. CORA: Correlation-based Resilient Aggregation in Sensor Networks. AD HOC NETWORKS 7:(6) pp. 1035-1050. (2009)
L. Buttyán, I. Vajda, P. Schaffer. Resilient Aggregation: Statistical Approaches. In: N.P.Mahalik (edit.) Sensor Networks and Configuration: Fundamentals, Standards, Platforms, and Applications. Heidelberg: Springer-Verlag, 2007. pp. 211-236.
B. Bencsáth, I. Vajda.  Efficient Directory Harvest Attacks and Countermeasures. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY 5:(3) pp. 264-273. (2007)
I. Vajda, B. Bencsáth. Internet Denial of Service attacks in game theoretical model. ALKALMAZOTT MATEMATIKAI LAPOK 23:(2) pp. 335-348. (2006)

I.Zs.Bertat, L. Buttyán, I. Vajda. Standards for Product Security Assessment: Chapter 54, vol. 1. In: Hossein Bidgoli (szerk.) IT Security Handbook. Hoboken: John Wiley & Sons, 2006. pp. 931-958.

L. Buttyan, L. Dora, I. Vajda. Statistical wormhole detection in sensor networks. LECTURE NOTES IN COMPUTER SCIENCE 3813: pp. 128-141. (2005) ED: Molva, R; Tsudik, G; Westhoff, D : LECTURE NOTES IN COMPUTER SCIENCE


 

Conference publications:

L. Czap, L. Buttyán, I. Vajda. Securing Coding Based Distributed Storage in Wireless Sensor Networks.In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Networks: MASS 2008. Atlanta, USA. 2008.09.29-2008.10.02. pp. 821
L. Buttyán, L. Dóra, M. Félegyházi, I. Vajda. Barter-based cooperation in delay-tolerant personal wireless networks. In: Marco Conti, Silvia Giordano, Ioannis Stavrakakis (edit.) The First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications. Helsinki, Finnland, 2007.06.18. (IEEE, IEEE Comp Soc, Univ Texas Arlington) 6 p. Paper AOC-370.
P. Schaffer, I. Vajda. CORA: Correlation-based Resilient Aggregation in Sensor Networks.In: 10th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM). Chania, Greece, 2007.10.22-2007.10.26. ACM Press, pp. 373-376.
L. Buttyán, T. Holczer, I. Vajda. Providing Location Privacy in Automated Fare Collection Systems. In: Proc. of 15th IST Mobile and Wireless Communications Summit. Myconos, Greece, 2006.06.04-2006.06.08. pp. 1-2.
L. Buttyán, P. Schaffer, I. Vajda. Resilient Aggregation with Attack Detection in Sensor Networks. In: Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on. Pisa, Italy, 2006.03.13-2006.03.17. IEEE Computer Society Press, pp. 332-336.
L. Buttyán, P. Schaffer, I. Vajda. RANBAR: RANSAC-Based Resilient Aggregation in Sensor Networks.In: Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN). Alexandria, USA, 2006.10.30. ACM Press, pp. 83-90.

B. Bencsáth, I. Vajda. Efficient Directory Harvest Attacks.In: McQuay William, Smari Waleed W. Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems. Saint Louis, USA, 2005.05.15-2005.05.20. IEEE Computer Society Press, pp. 62-68. 

I.Zs. Berta, I. Vajda. Documents from Malicious Terminals. In: Bioengineered and Bioinspired Systems: SPIE's Microtechnologies for the New Millenium 2003. Grand Canaria, Spain, 2003.05.19-2003.05.21. SPIE, pp. 325-336.
B. Bencsáth, L. Buttyán, I. Vajda. A game based analysis of the client puzzle approach to defend against DoS attacks. In: Proceedings of SoftCOM 2003 11. International conference on software, telecommunications and computer networks. Split, Hroatia, 2003.10.06-2003.10.10. Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, University of Split, pp. 763-767.
B. Bencsáth, I. Vajda. Collecting randomness from the net. In: Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security 2001. Darmstadt, Deutchland, 2001. IFIP, pp. 105-111. (IFIP Conference Proceedings; 192.)
B. Bencsáth, I. Vajda. Protection Against DDoS Attacks Based On Traffic Level Measurements. In: Waleed W Smari William McQuay 2004 International Symposium on Collaborative Technologies and Systems. San Diego, USA, 2004.04.18-2004.04.22. The Society for Modeling and Simulation International, pp. 22-28. Simulation series vol 36. no. 1.