Suivre
Tamas Bisztray
Tamas Bisztray
Postdoctoral Researcher at University of Oslo
Adresse e-mail validée de ifi.uio.no - Page d'accueil
Titre
Citée par
Citée par
Année
The formai dataset: Generative ai in software security through the lens of formal verification
N Tihanyi, T Bisztray, R Jain, MA Ferrag, LC Cordeiro, V Mavroeidis
Proceedings of the 19th International Conference on Predictive Models and …, 2023
562023
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge
N Tihanyi, MA Ferrag, R Jain, T Bisztray, M Debbah
2024 IEEE International Conference on Cyber Security and Resilience (CSR), 2024
31*2024
Privacy impact assessment: comparing methodologies with a focus on practicality
T Bisztray, N Gruschka
Nordic Conference on Secure IT Systems, 3-19, 2019
282019
LLMs in Web Development: Evaluating LLM-Generated PHP Code Unveiling Vulnerabilities and Limitations
R Tóth, T Bisztray, L Erdődi
Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops: DECSoS …, 2024
102024
The evolution of free-space quantum key distribution
T Bisztray, L Bacsardi
Infocommunications Journal 10 (1), 22-30, 2018
92018
Emerging biometric modalities and their use: Loopholes in the terminology of the GDPR and resulting privacy risks
T Bisztray, N Gruschka, T Bourlai, L Fritsch
2021 International Conference of the Biometrics Special Interest Group …, 2021
72021
Do neutral prompts produce insecure code? formai-v2 dataset: Labelling vulnerabilities in code generated by large language models
N Tihanyi, T Bisztray, MA Ferrag, R Jain, LC Cordeiro
arXiv preprint arXiv:2404.18353, 2024
62024
Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics
T Bisztray, N Gruschka, V Mavroeidis, L Fritsch
Open Identity Summit 2020, 185-192, 2020
42020
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext
N Tihanyi, T Bisztray, B Borsos, S Raveau
IEEE Transactions on Information Forensics and Security, 2024
32024
FormAI Dataset: A Large Collection of AI-Generated C Programs and Their Vulnerability Classifications
N Tihanyi, T Bisztray, R Jain, MA Ferrag, LC Cordeiro, V Mavroeidis
IEEE Dataport, 2023
32023
Dynamic Intelligence Assessment: Benchmarking LLMs on the Road to AGI with a Focus on Model Confidence
N Tihanyi, T Bisztray, RA Dubniczky, R Toth, B Borsos, B Cherif, ...
arXiv preprint arXiv:2410.15490, 2024
22024
How secure is AI-generated code: a large-scale comparison of large language models
N Tihanyi, T Bisztray, MA Ferrag, R Jain, LC Cordeiro
Empirical Software Engineering 30 (2), 1-42, 2025
12025
The Suboptimal QLV Ratio May Indicate the Need for a Left Bundle Branch Area Pacing-Optimized Cardiac Resynchronization Therapy Upgrade
P Ezer, K Szűcs, R Lukács, T Bisztray, G Vilmányi, I Szokodi, A Komócsi, ...
Journal of Clinical Medicine 13 (19), 5742, 2024
12024
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–13