Zobrazeno 1 - 10
of 87
pro vyhledávání: '"Bela Genge"'
Publikováno v:
IEEE Access, Vol 11, Pp 106803-106832 (2023)
Trust Modelling and Management (TMM) techniques are frequently applied in ad-hoc Distributed Wireless Networks (DWNs) to stimulate and improve cooperation between network nodes. TMM facilitate DWNs in building a trust network that assures reliability
Externí odkaz:
https://doaj.org/article/a529d6fb18454b848ed576e316028292
Autor:
Peter Szabo, Bela Genge
Publikováno v:
Journal of Communications Software and Systems, Vol 17, Iss 2, Pp 134-142 (2021)
In 2020 we have witnessed the dawn of machine learning enabled user experience. Now we can predict how users will use an application. Research progressed beyond recommendations, and we are ready to predict user events. Whenever a human interacts with
Externí odkaz:
https://doaj.org/article/a276bd46653f4f0cbd927f162d9aac02
Publikováno v:
IEEE Access, Vol 7, Pp 74217-74230 (2019)
The Industrial Internet of Things (IIoT) have been designed to perform a more agile and efficient automation, control, and orchestration of future industrial systems while improving the energy efficiency in smart factories. Unfortunately, while the b
Externí odkaz:
https://doaj.org/article/c10daf4f5e884580a79572dfb68bfeab
Publikováno v:
Information, Vol 13, Iss 7, p 340 (2022)
Modern technology and the digitisation era accelerated the pace of data generation and collection for various purposes. The orchestration of such data is a daily challenge faced by even experienced professional users in the context of Internet of Thi
Externí odkaz:
https://doaj.org/article/4d569f55742341fe90ed6ac965bf8709
Autor:
Piroska Haller, Bela Genge
Publikováno v:
IEEE Access, Vol 5, Pp 9336-9347 (2017)
The fourth industrial revolution, also known as Industry 4.0, brings many advantages including innovative applications and services, new technologies and advanced features, increased operational benefits, and reduced installation costs. However, this
Externí odkaz:
https://doaj.org/article/9c1df42f4e4d474386674b94734bdd67
Publikováno v:
Journal of Universal Computer Science, Vol 25, Iss 11, Pp 1394-1395 (2019)
Externí odkaz:
https://doaj.org/article/4a5d9d7cd6064659804f98ce5abaed89
Autor:
Bela, Genge, Piroska, Haller
Publikováno v:
International Journal of Computer Networks & Communications (IJCNC) Vol.3, No.1, January 2011
Application-layer multicast implements the multicast functionality at the application layer. The main goal of application-layer multicast is to construct and maintain efficient distribution structures between endhosts. In this paper we focus on the i
Externí odkaz:
http://arxiv.org/abs/1101.5791
Publikováno v:
Acta Universitatis Sapientiae - Electrical and Mechanical Engineering, Vol. 1, pp. 113-123, 2009 (ISSN 2065-5916)
We propose a certificate-based single sign-on mechanism in distributed systems. The proposed security protocols and authentication mechanisms are integrated in a middleware. The novelty of our middleware lies on the use of XPCOM components, this way
Externí odkaz:
http://arxiv.org/abs/0909.1640
Autor:
Bela, Genge, Piroska, Haller
Publikováno v:
Acta Universitatis Sapientiae - Electrical and Mechanical Engineering, Vol. 1, pp. 105-112, 2009 (ISSN 2065-5916)
Web services use tokens provided by the WS-Security standard to implement security protocols. We propose several extensions to the WS-Security standard, including name types, key and random number extensions. The extensions are used to implement exis
Externí odkaz:
http://arxiv.org/abs/0909.1639
Publikováno v:
Applied Sciences; Volume 13; Issue 6; Pages: 3409
Advanced Persistent Threats (APTs) represent a complex series of techniques directed against a particular organization, where the perpetrator is able to hide its presence for a longer period of time (e.g., months, years). Previous such attacks have d