Intrusion detection system using self organizing map L Vokorokos, A Balaz, M Chovanec Acta Electrotechnica et Informatica 6 (1), 1-6, 2006 | 88 | 2006 |
Host-based intrusion detection system L Vokorokos, A Baláž 2010 IEEE 14th International Conference on Intelligent Engineering Systems …, 2010 | 63 | 2010 |
Application security through sandbox virtualization L Vokorokos, A Baláž, B Madoš Acta Polytechnica Hungarica 12 (1), 83-101, 2015 | 40 | 2015 |
Data acquisition in non-invasive brain-computer interface using emotiv epoc neuroheadset L Vokorokos, B Mados, N Ádám, A Baláz Acta Electrotechnica et Informatica 12 (1), 5, 2012 | 29 | 2012 |
Securing distributed computer systems using an advanced sophisticated hybrid honeypot technology E Chovancová, N Adám, A Baláž, E Pietriková, P Feciľak, S Šimoňák, ... Computing and Informatics 36 (1), 113-139, 2017 | 25 | 2017 |
Secure web server system resources utilization L Vokorokos, A Baláž, N Ádám Acta Polytechnica Hungarica 12 (2), 5-19, 2015 | 25 | 2015 |
Innovative operating memory architecture for computers using the data driven computation model L Vokorokos, B Madoš, N Ádám, A Baláž Acta Polytechnica Hungarica 10 (5), 63-79, 2013 | 24 | 2013 |
Distributed detection system of security intrusions based on partially ordered events and patterns L Vokorokos, A Baláž, M Chovanec Towards Intelligent Engineering and Information Technology, 389-403, 2009 | 23 | 2009 |
Artificial neural network based IDS N Ádám, B Madoš, A Baláž, T Pavlik 2017 IEEE 15th International Symposium on Applied Machine Intelligence and …, 2017 | 19 | 2017 |
Security sandbox based on RBAC model J Hurtuk, A Baláž, N Ádám 2016 IEEE 11th International Symposium on Applied Computational Intelligence …, 2016 | 18 | 2016 |
The impact of data representationson hardware based mlp network implementation N Ádám, A Baláž, E Pietriková, E Chovancová, P Feciľak Acta Polytechnica Hungarica 15 (2), 69-88, 2018 | 17 | 2018 |
MongoDB scheme analysis L Vokorokos, M Uchnár, A Baláž 2017 IEEE 21st International Conference on Intelligent Engineering Systems …, 2017 | 16 | 2017 |
ModSecurity IDMEF module A Baláž, N Ádám, E Pietrikova, B Madoš 2018 IEEE 16th World Symposium on Applied Machine Intelligence and …, 2018 | 15 | 2018 |
Peer to peer system deployment B Anton, A Norbert Acta Electrotech. Inform 16, 11-14, 2016 | 15 | 2016 |
Forensic analysis of compromised systems A Baláž, R Hlinka 2012 IEEE 10th International Conference on Emerging eLearning Technologies …, 2012 | 15 | 2012 |
Potential of low cost motion sensors compared to programming environments J Mihaľov, E Pietriková, A Baláž, B Madoš, N Ádám Acta Polytechnica Hungarica 15 (6), 155-177, 2018 | 14 | 2018 |
Intrusion detection architecture utilizing graphics processors L Vokorokos, A Baláž, B Madoš Acta Informatica Pragensia 1 (1), 50-59, 2013 | 12 | 2013 |
Intrusion detection with early recognition of encrypted application M Augustin, A Balaz Intelligent Engineering Systems (INES), 2011 15th IEEE International …, 2011 | 12 | 2011 |
Architecture of multi-core computer with data driven computation model L VOKOROKOS, B MADOŠ, A BALÁŽ, N ÁDÁM Acta Electrotechnica et Informatica 10 (4), 20-23, 2010 | 12 | 2010 |
High-Performance Intrusion Detection System for Security Threats Identification in Computer Networks L Vokorokos, N Ádám, A Baláž, J Perháč Computer Science and Technology Research Survey 4 (4), 54-61, 2009 | 11 | 2009 |