Béla Genge

Orcid: 0000-0003-1390-479X

According to our database1, Béla Genge authored at least 78 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Exploring Trust Modeling and Management Techniques in the Context of Distributed Wireless Networks: A Literature Review.
IEEE Access, 2023

A Differential Privacy-Based Approach for Protecting Crowdsourced WiFi RSS Data.
Proceedings of the 19th IEEE International Conference on Intelligent Computer Communication and Processing, 2023

LOKI-2: An Improved Lightweight Cryptographic Key Distribution Protocol for Automotive Systems.
Proceedings of the 19th IEEE International Conference on Intelligent Computer Communication and Processing, 2023

A Key to Embedded System Security: Locking and Unlocking Secrets with a Trusted Platform Module.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2022
Integrating Human Factors in the Visualisation of Usable Transparency for Dynamic Risk Assessment.
Inf., 2022

Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525.
Int. J. Crit. Infrastructure Prot., 2022

VetaDetect: Vehicle tampering detection with closed-loop model ensemble.
Int. J. Crit. Infrastructure Prot., 2022

2020
Hybrid Hyper-parameter Optimization for Collaborative Filtering.
Proceedings of the 22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2020

Efficient Conversion Prediction in E-Commerce Applications with Unsupervised Learning.
Proceedings of the 28th International Conference on Software, 2020

MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks.
Proceedings of the 2020 IFIP Networking Conference, 2020

LOKI: A Lightweight Cryptographic Key Distribution Protocol for Controller Area Networks.
Proceedings of the 16th IEEE International Conference on Intelligent Computer Communication and Processing, 2020

Locality sensitive hashing for tampering detection in automotive systems.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Cyberattack Detection and Response.
J. Univers. Comput. Sci., 2019

Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems.
Int. J. Crit. Infrastructure Prot., 2019

On the practical integration of anomaly detection techniques in industrial control applications.
Int. J. Crit. Infrastructure Prot., 2019

Engineering security-aware control applications for data authentication in smart industrial cyber-physical systems.
Future Gener. Comput. Syst., 2019

A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems.
Autom., 2019

Anomaly Detection in Aging Industrial Internet of Things.
IEEE Access, 2019

A Multi-Model-based Approach to Detect Cyber Stealth Attacks in Industrial Internet of Things.
Proceedings of the 2019 International Conference on Software, 2019

Circle Map for Internet of Things Networks.
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019

A Security-Enhanced Interoperability Middleware for the Internet of Things.
Proceedings of the 7th International Symposium on Digital Forensics and Security, 2019

Using Side-Channels to Detect Abnormal Behavior in Industrial Control Systems.
Proceedings of the 15th IEEE International Conference on Intelligent Computer Communication and Processing, 2019

From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

2018
A Testbed for Performing Security Experiments with Software-Defined Industrial Control Systems.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

2017
Designing Optimal and Resilient Intrusion Detection Architectures for Smart Grids.
IEEE Trans. Smart Grid, 2017

Cyber-Security-Aware Network Design of Industrial Control Systems.
IEEE Syst. J., 2017

Using Sensitivity Analysis and Cross-Association for the Design of Intrusion Detection Systems in Industrial Cyber-Physical Systems.
IEEE Access, 2017

Cross-layer anomaly detection in industrial cyber-physical systems.
Proceedings of the 25th International Conference on Software, 2017

Sensor data validation and abnormal behavior detection in the Internet of Things.
Proceedings of the 2017 16th RoEduNet Conference: Networking in Education and Research (RoEduNet), 2017

Optimally scheduled interventions in the presence of vulnerabilities for modern cyber-physical systems.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Design, verification and implementation of a lightweight remote attestation protocol for process control systems.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Software Defined Response and Network Reconfiguration for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XI, 2017

Enforcing End-to-End Security in Scada Systems via Application-Level Cryptography.
Proceedings of the Critical Infrastructure Protection XI, 2017

2016
ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services.
Secur. Commun. Networks, 2016

A framework for designing resilient distributed intrusion detection systems for critical infrastructures.
Int. J. Crit. Infrastructure Prot., 2016

Big Data Processing to Detect Abnormal Behavior in Smart Grids.
Proceedings of the Smart Grid Inspired Future Technologies, 2016

A hierarchical control plane for software-defined networks-based industrial control systems.
Proceedings of the 2016 IFIP Networking Conference, 2016

A Methodology for Monitoring and Control Network Design.
Proceedings of the Critical Information Infrastructures Security, 2016

2015
A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures.
Int. J. Crit. Infrastructure Prot., 2015

Experimental assessment of network design approaches for protecting industrial control systems.
Int. J. Crit. Infrastructure Prot., 2015

Non-Intrusive Historical Assessment of Internet-Facing Services in the Internet of Things.
Proceedings of the International Conference on Recent Achievements in Mechatronics, 2015

A clustering-based approach to detect cyber attacks in process control systems.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

Resilience in the Internet of Things: The Software Defined Networking approach.
Proceedings of the IEEE International Conference on Intelligent Computer Communication and Processing, 2015

A framework for testing stealthy attacks in energy grids.
Proceedings of the IEEE International Conference on Intelligent Computer Communication and Processing, 2015

Information flow and complex event processing of the sensor network communication.
Proceedings of the 6th IEEE International Conference on Cognitive Infocommunications, 2015

A Linear Programming Approach for K-Resilient and Reliability-Aware Design of Large-Scale Industrial Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 14th International Conference, 2015

2014
Physical process resilience-aware network design for SCADA systems.
Comput. Electr. Eng., 2014

Cyber-physical testbeds.
Commun. ACM, 2014

A connection pattern-based approach to detect network traffic anomalies in critical infrastructures.
Proceedings of the Seventh European Workshop on System Security, 2014

2013
EPIC: A Testbed for Scientifically Rigorous Cyber-Physical Security Experimentation.
IEEE Trans. Emerg. Top. Comput., 2013

Analysis of the effects of distributed denial-of-service attacks on MPLS networks.
Int. J. Crit. Infrastructure Prot., 2013

On the Use of Emulab Testbeds for Scientifically Rigorous Experiments.
IEEE Commun. Surv. Tutorials, 2013

Data fusion-base anomay detection in networked critical infrastructures.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
Impact of Network Infrastructure Parameters to the Effectiveness of Cyber Attacks Against Industrial Control Systems.
Int. J. Comput. Commun. Control, 2012

A cyber-physical experimentation environment for the security analysis of networked industrial control systems.
Comput. Electr. Eng., 2012

An Experimental Study on the Impact of Network Segmentation to the Resilience of Physical Processes.
Proceedings of the NETWORKING 2012, 2012

Enabling the Exploration of Operating Procedures in Critical Infrastructures.
Proceedings of the Critical Infrastructure Protection VI, 2012

A method to construct network traffic models for process control systems.
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, 2012

AMICI: An Assessment Platform for Multi-domain Security Experimentation on Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2012

2011
Using Planetlab to Implement Multicast at the Application Level
CoRR, 2011

Using Soft Real-Time Simulation in a Hybrid Environment for Cyber-Physical Security Experiments.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011

Developing cyber-physical experimental capabilities for the security analysis of the future Smart Grid.
Proceedings of the 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies", 2011

Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection V, 2011

Investigating the Effect of Network Parameters on Coordinated Cyber Attacks against a Simulated Power Plant.
Proceedings of the Critical Information Infrastructure Security, 2011

2010
End-Host Distribution in Application-Layer Multicast: Main Issues and Solutions
CoRR, 2010

A Platform for Implementing Secure Wireless Ad Hoc Networks
CoRR, 2010

2009
Performance Evaluation of Security Protocols
CoRR, 2009

Certificate-based Single Sign-On Mechanism for Multi-Platform Distributed Systems
CoRR, 2009

Extending WS-Security to Implement Security Protocols for Web Services
CoRR, 2009

Automated Composition of Security Protocols
CoRR, 2009

Term-based composition of security protocols
CoRR, 2009

Component based platform for multimedia applications
CoRR, 2009

Informal specification-based performance evaluation of security protocols
CoRR, 2009

Towards Automated Secure Web Service Execution.
Proceedings of the NETWORKING 2009, 2009

A syntactic approach for identifying multi-protocol attacks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Middleware for Automated Implementation of Security Protocols.
Proceedings of the Semantic Web: Research and Applications, 2009

2008
A Modeling Framework for Generating Security Protocol Specifications.
Proceedings of the SYNASC 2008, 2008

Constructing Security Protocol Specifications for Web Services.
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008


  Loading...