Følg
Tamas Bisztray
Tamas Bisztray
Postdoctoral Researcher at University of Oslo
Verifisert e-postadresse på ifi.uio.no - Startside
Tittel
Sitert av
Sitert av
År
The formai dataset: Generative ai in software security through the lens of formal verification
N Tihanyi, T Bisztray, R Jain, MA Ferrag, LC Cordeiro, V Mavroeidis
Proceedings of the 19th International Conference on Predictive Models and …, 2023
592023
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge
N Tihanyi, MA Ferrag, R Jain, T Bisztray, M Debbah
2024 IEEE International Conference on Cyber Security and Resilience (CSR), 2024
43*2024
Privacy impact assessment: comparing methodologies with a focus on practicality
T Bisztray, N Gruschka
Nordic Conference on Secure IT Systems, 3-19, 2019
302019
LLMs in Web Development: Evaluating LLM-Generated PHP Code Unveiling Vulnerabilities and Limitations
R Tóth, T Bisztray, L Erdődi
Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops: DECSoS …, 2024
152024
How secure is AI-generated code: a large-scale comparison of large language models
N Tihanyi, T Bisztray, MA Ferrag, R Jain, LC Cordeiro
Empirical Software Engineering 30 (2), 1-42, 2025
13*2025
The evolution of free-space quantum key distribution
T Bisztray, L Bacsardi
Infocommunications Journal 10 (1), 22-30, 2018
92018
Emerging biometric modalities and their use: Loopholes in the terminology of the GDPR and resulting privacy risks
T Bisztray, N Gruschka, T Bourlai, L Fritsch
2021 International Conference of the Biometrics Special Interest Group …, 2021
72021
Dynamic Intelligence Assessment: Benchmarking LLMs on the Road to AGI with a Focus on Model Confidence
N Tihanyi, T Bisztray, RA Dubniczky, R Toth, B Borsos, B Cherif, ...
2024 IEEE International Conference on Big Data, 2024
42024
FormAI Dataset: A Large Collection of AI-Generated C Programs and Their Vulnerability Classifications
N Tihanyi, T Bisztray, R Jain, MA Ferrag, LC Cordeiro, V Mavroeidis
IEEE Dataport, 2023
42023
Data protection impact assessment in identity control management with a focus on biometrics
T Bisztray, N Gruschka, V Mavroeidis, L Fritsch
Open Identity Summit 2020, 185-192, 2020
42020
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext
N Tihanyi, T Bisztray, B Borsos, S Raveau
IEEE Transactions on Information Forensics and Security, 2024
32024
Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities
MA Ferrag, F Alwahedi, A Battah, B Cherif, A Mechri, N Tihanyi, T Bisztray, ...
Internet of Things and Cyber-Physical Systems, 2025
12025
The Suboptimal QLV Ratio May Indicate the Need for a Left Bundle Branch Area Pacing-Optimized Cardiac Resynchronization Therapy Upgrade
P Ezer, K Szűcs, R Lukács, T Bisztray, G Vilmányi, I Szokodi, A Komócsi, ...
Journal of Clinical Medicine 13 (19), 5742, 2024
12024
Vulnerability Detection: From Formal Verification to Large Language Models and Hybrid Approaches: A Comprehensive Overview
N Tihanyi, T Bisztray, MA Ferrag, B Cherif, RA Dubniczky, R Jain, ...
arXiv preprint arXiv:2503.10784, 2025
2025
CASTLE: Benchmarking Dataset for Static Code Analyzers and LLMs towards CWE Detection
RA Dubniczky, KZ Horvát, T Bisztray, MA Ferrag, LC Cordeiro, N Tihanyi
arXiv preprint arXiv:2503.09433, 2025
2025
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–15