Levente

Results: 82



#Item
11

This paper was published at the 2016 Usenix Workshop on Advances in Security Education. Mentoring talent in IT security – A case study Levente Butty´an CrySyS Lab, BME Budapest, Hungary

Add to Reading List

Source URL: www.crysys.hu

- Date: 2016-07-20 01:34:46
    12Cyberwarfare / Computer security / Cybercrime / Malware / Rootkits / Cryptography / CrySyS Lab / Duqu / Stuxnet / Flame / Wiper / Ambient intelligence

    Introducing the CrySyS Lab Levente Buttyán Laboratory of Cryptography and System Security (CrySyS Lab) Department of Networked Systems and Services Budapest University of Technology and Economics www.crysys.hu

    Add to Reading List

    Source URL: www.crysys.hu

    Language: English - Date: 2016-07-26 04:36:44
    13Search algorithms / Game artificial intelligence / Combinatorial optimization / Routing algorithms / Data types / Minimax / A* search algorithm / Monte Carlo method / Tree traversal / UCT / Tree / Monte Carlo tree search

    Bandit based Monte-Carlo Planning Levente Kocsis and Csaba Szepesv´ari Computer and Automation Research Institute of the Hungarian Academy of Sciences, Kende u, 1111 Budapest, Hungary

    Add to Reading List

    Source URL: ggp.stanford.edu

    Language: English - Date: 2009-04-20 18:54:11
    14Cyberwarfare / Malware / Rootkits / Cryptography / CrySyS Lab / Duqu / Stuxnet / Flame / Wiper / Computer security / Communications security / Ambient intelligence

    Introducing the CrySyS Lab Levente Buttyán Laboratory of Cryptography and System Security (CrySyS Lab) Department of Networked Systems and Services Budapest University of Technology and Economics www.crysys.hu

    Add to Reading List

    Source URL: crysys.hu

    Language: English - Date: 2016-07-26 04:36:44
    15Game artificial intelligence / Monte Carlo tree search / Transposition table / Alphabeta pruning / Minimax / Game tree / Tree traversal / Computer Go / Monte Carlo method / UCT / Tree / General game playing

    Transpositions and Move Groups in Monte Carlo Tree Search Benjamin E. Childs, Member, IEEE, James H. Brodeur, and Levente Kocsis. Abstract— Monte Carlo search, and specifically the UCT (Upper Confidence Bounds applied

    Add to Reading List

    Source URL: www.csse.uwa.edu.au

    Language: English - Date: 2009-02-05 01:17:40
    16

    A Large-Scale Multipath Playground for Experimenters and Early Adopters Felicián Németh† , Balázs Sonkoly∗, Levente Csikor and András Gulyás† HSN Lab, Department of Telecommunications and Media Informatics Bud

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2013-07-12 13:18:44
      17

      FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources Aron Laszka1, Gabor Horvath2, Mark Felegyhazi2, and Levente Buttyan2 1:

      Add to Reading List

      Source URL: aronlaszka.com

      Language: English - Date: 2015-02-08 13:32:51
        18

        FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources Aron Laszka1 , Gabor Horvath2 , Mark Felegyhazi2 , and Levente Butty´an2 1 Institute for Software Integrated Systems (ISIS)

        Add to Reading List

        Source URL: aronlaszka.com

        Language: English - Date: 2014-11-20 15:28:39
          19

          Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality Aron Laszka1 , D´avid Szeszl´er2 , and Levente Butty´an1 1

          Add to Reading List

          Source URL: aronlaszka.com

          Language: English - Date: 2014-11-20 15:28:19
            20

            A A Survey of Interdependent Information Security Games ARON LASZKA1 , MARK FELEGYHAZI1 , LEVENTE BUTTYAN1,2 1 Laboratory of Cryptography and System Security (CrySyS Lab), Department of Networked

            Add to Reading List

            Source URL: aronlaszka.com

            Language: English - Date: 2014-11-20 15:28:40
              UPDATE