Tamás Holczer gave a talk titled “Attacking the Protocols of Electric Power Systems” on November 6, 2025, at the Defence and Information Assurance Workshop hosted by the Defence Academy of the United Kingdom. 🇬🇧
Tamás Holczer gave a talk titled “Attacking the Protocols of Electric Power Systems” on November 6, 2025, at the Defence and Information Assurance Workshop hosted by the Defence Academy of the United Kingdom. 🇬🇧
👏 A major recognition of his outstanding research on AI and cybersecurity!
🔗 nkfih.gov.hu/palyazoknak/...
👏 A major recognition of his outstanding research on AI and cybersecurity!
🔗 nkfih.gov.hu/palyazoknak/...
With this paper, Liu has officially met the publication requirements for the PhD degree — congratulations!
With this paper, Liu has officially met the publication requirements for the PhD degree — congratulations!
Shuaishuai Liu & Gergely Biczók: *Modeling interdependent privacy threats* – just accepted in the **International Journal of Information Security (Springer)**.
🔗 Preprint available: [https://arxiv.org/abs/2505.18386](arxiv.org/abs/2505.18386)
Shuaishuai Liu & Gergely Biczók: *Modeling interdependent privacy threats* – just accepted in the **International Journal of Information Security (Springer)**.
🔗 Preprint available: [https://arxiv.org/abs/2505.18386](arxiv.org/abs/2505.18386)
9/22 [NNHH] Buttyán: Cybersecurity Challenges
9/23 [ITBN] Pék: Cyber Competitions
10/1 [HUNOG] Ács: Security of LLMs
10/3 [Hacktivity] G. Fuchs: TLSH Attacks & Nagy: Linux Rootkits
10/25 [DSL] Koltai: AI Threats & Pék/Sándor: Binary Exploitation
10/28 [WITSEC] Koltai: AI Threats
9/22 [NNHH] Buttyán: Cybersecurity Challenges
9/23 [ITBN] Pék: Cyber Competitions
10/1 [HUNOG] Ács: Security of LLMs
10/3 [Hacktivity] G. Fuchs: TLSH Attacks & Nagy: Linux Rootkits
10/25 [DSL] Koltai: AI Threats & Pék/Sándor: Binary Exploitation
10/28 [WITSEC] Koltai: AI Threats
Ziyuan Huang, Gergely Biczók & Mingyan Liu: *Incentivizing Secure Software Development: The Role of Voluntary Audit and Liability Waiver* just accepted in **ACM Transactions on Privacy and Security**.
📄 [https://doi.org/10.1145/3765287](doi.org/10.1145/3765...)
Ziyuan Huang, Gergely Biczók & Mingyan Liu: *Incentivizing Secure Software Development: The Role of Voluntary Audit and Liability Waiver* just accepted in **ACM Transactions on Privacy and Security**.
📄 [https://doi.org/10.1145/3765287](doi.org/10.1145/3765...)
"Detect & Score" tackles both malicious client filtering and contribution scoring of the benign clients within federated learning — all while preserving privacy.
📍 Accepted at FLAsiaCCS, the FL workshop at top-tier security conf AsiaCCS.
dl.acm.org/doi/full/10....
"Detect & Score" tackles both malicious client filtering and contribution scoring of the benign clients within federated learning — all while preserving privacy.
📍 Accepted at FLAsiaCCS, the FL workshop at top-tier security conf AsiaCCS.
dl.acm.org/doi/full/10....
📄 Paper: doi.org/10.1016/j.fs...
🔌 Volatility plugin: github.com/CrySyS/ModXRef
💾 Dataset: www.crysys.hu/~rnagy/datas...
📄 Paper: doi.org/10.1016/j.fs...
🔌 Volatility plugin: github.com/CrySyS/ModXRef
💾 Dataset: www.crysys.hu/~rnagy/datas...