Zobrazeno 1 - 10
of 1 437
pro vyhledávání: '"P. Tihanyi"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Rudolf Szentgyörgyi
Publikováno v:
Névtani Értesítő, Vol 38 (2023)
Personal names in the Foundation Deed of Tihany Abbey Part 3: Relations between personal names and place names The 1055 Foundation Deed of Tihany Abbey, a precious linguistic record of the Hungarian language, includes several Hungarian place name
Externí odkaz:
https://doaj.org/article/5951b655e608422bab853f4e31b30c31
Autor:
Szentgyörgyi, Rudolf
Publikováno v:
Névtani Értesítő, Vol 38, Pp 9-18 (2016)
The 1055 Foundation Deed of Tihany Abbey, a precious linguistic record of the Hungarian language, includes several Hungarian place names and personal names inserted into the Latin text of the charter. Research in the last decade has primarily focused
Externí odkaz:
https://doaj.org/article/28a367b96afe48d599c80792851e374d
Integrating Deep Learning (DL) techniques in the Internet of Vehicles (IoV) introduces many security challenges and issues that require thorough examination. This literature review delves into the inherent vulnerabilities and risks associated with DL
Externí odkaz:
http://arxiv.org/abs/2407.16410
Autor:
Ferrag, Mohamed Amine, Alwahedi, Fatima, Battah, Ammar, Cherif, Bilel, Mechri, Abdechakour, Tihanyi, Norbert
This paper provides a comprehensive review of the future of cybersecurity through Generative AI and Large Language Models (LLMs). We explore LLM applications across various domains, including hardware design security, intrusion detection, software en
Externí odkaz:
http://arxiv.org/abs/2405.12750
This study provides a comparative analysis of state-of-the-art large language models (LLMs), analyzing how likely they generate vulnerabilities when writing simple C programs using a neutral zero-shot prompt. We address a significant gap in the liter
Externí odkaz:
http://arxiv.org/abs/2404.18353
Large Language Models (LLMs) are increasingly used across various domains, from software development to cyber threat intelligence. Understanding all the different fields of cybersecurity, which includes topics such as cryptography, reverse engineerin
Externí odkaz:
http://arxiv.org/abs/2402.07688
Autor:
Menezes, Rafael, Aldughaim, Mohannad, Farias, Bruno, Li, Xianzhiyu, Manino, Edoardo, Shmarov, Fedor, Song, Kunjian, Brauße, Franz, Gadelha, Mikhail R., Tihanyi, Norbert, Korovin, Konstantin, Cordeiro, Lucas C.
ESBMC implements many state-of-the-art techniques for model checking. We report on new and improved features that allow us to obtain verification results for previously unsupported programs and properties. ESBMC employs a new static interval analysis
Externí odkaz:
http://arxiv.org/abs/2312.14746
Autor:
Szentgyörgyi, Rudolf
Publikováno v:
Névtani Értesítő, Vol 38, Pp 249-252 (2016)
Externí odkaz:
https://doaj.org/article/042d058ee72b4657b1b0180b04cb7c26
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.