Vilmos Bilicki

Orcid: 0000-0002-7793-2661

According to our database1, Vilmos Bilicki authored at least 16 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Impact of the Web Data Access Object (WebDAO) Design Pattern on Productivity.
Comput., July, 2023

The Actigraphy-Based Identification of Premorbid Latent Liability of Schizophrenia and Bipolar Disorder.
Sensors, January, 2023

A New Approach to Web Application Security: Utilizing GPT Language Models for Source Code Inspection.
Future Internet, 2023

2021
Access Control of EHR Records in a Heterogeneous Cloud Infrastructure.
Acta Cybern., 2021

Taxonomy for Trade-off Problem in Distributed Telemedicine Systems.
Acta Cybern., 2021

2019
Stunner: A Smart Phone Trace for Developing Decentralized Edge Systems.
Proceedings of the Distributed Applications and Interoperable Systems, 2019

2018
Detection of Respiratory Effort-Related Arousals Using a Hidden Markov Model and Random Decision Forest.
Proceedings of the Computing in Cardiology, 2018

2016

2014
Defining and understanding smartphone churn over the internet: A measurement study.
Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing, 2014

Wlab of University of Szeged at ImageCLEF 2014 Plant Identification Task.
Proceedings of the Working Notes for CLEF 2014 Conference, 2014

2013
Development of a Novel Semantic-Based System Integration Framework.
Proceedings of the 3rd Eastern European Regional Conference on the Engineering of Computer Based Systems, 2013

2011
Scalable Stealth Mode P2P Overlays of Very Small Constant Degree.
ACM Trans. Auton. Adapt. Syst., 2011

Modeling Network-Level Impacts of P2P Flows.
Proceedings of the 19th International Euromicro Conference on Parallel, 2011

2010
Infrastructure aware applications
PhD thesis, 2010

2009
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat.
Proceedings of the Stabilization, 2009

Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local Approaches.
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009


  Loading...